CCNP,CCIE Security SCOR (350-701) Training Part-1/2
- Offered byUDEMY
CCNP,CCIE Security SCOR (350-701) Training Part-1/2 at UDEMY Overview
Duration | 34 hours |
Total fee | ₹389 |
Mode of learning | Online |
Credential | Certificate |
CCNP,CCIE Security SCOR (350-701) Training Part-1/2 at UDEMY Highlights
- Certificate of completion
- 34.5 hours on-demand video
- 97 downloadable resources
- 30-Day Money-Back Guarantee
- Full Lifetime Access
CCNP,CCIE Security SCOR (350-701) Training Part-1/2 at UDEMY Course details
- Course has been designed for anyone who wants to start learning Security
- This course is for students trying to obtain the CCNP and CCIE SCOR
- This course is for students trying to learn the CCNP Security
- Any Network or Security Engineer want to learn or polish their Skills.
- Learner will able to:
- Compare common security vulnerabilities
- Describe functions of the cryptography components
- Compare site-to-site VPN and remote access VPN deployment types
- Compare network security solutions that provide intrusion prevention
- Configure and verify network infrastructure security methods
- Device hardening of network infrastructure security devices
- The course describe identity management and secure network access, Network security solutions that provide intrusion prevention and firewall
- The course describe security intelligence authoring, sharing, and consumption, Interpret basic Python scripts used to call Cisco Security appliances APIs, Cloud service models: SaaS, PaaS, IaaS, Security assessment in the cloud, Patch management in the cloud, Describe the benefits of device compliance and application control
CCNP,CCIE Security SCOR (350-701) Training Part-1/2 at UDEMY Curriculum
CCNP, CCIE Security 350-701
Lecture-01:Introduction to CCNP Security SCOR.
Lecture-02:Confidentiality,Integrity & Availability.
Lecture-03:Common Network Security Terms Asset etc.
Lecture-04:On-Premises, Cloud and Malware Theory.
Lecture-05:SQL Database Injection Attack Theory and Lab.
Lecture-06:Cross Site Scripting Attack Theory and Lab.
Lecture-07:Phishing Social Engineer Engineering Attack Lab.
Lecture-08:Man-In-The-Middle Attack Theory and Lab.
Lecture-09:Denial Of Service (DoS) Attack Theory and Lab.
Lecture-10:Path Traversal Attack Theory and Lab.
Lecture-11:Buffer Overflow Attack Theory and Lab.
Lecture-12:Common Vulnerability Terms Theory.
Lecture-13:VLAN (Virtual Local Area Network) Theory.
Lecture-14:Layer 2 Attacks (DHCP Snooping) Theory & Lab.
Lecture-15:ARP (Address Resolution Protocol) Theory.
Lecture-16:ARP Poisoning or ARP Spoofing Attack Lab.
Lecture-17:MAC (Media Access Control Address) Theory.
Lecture-18:MAC (Media Access Control Address) Flooding Attack.
Lecture-19:Configure and Verify Port Security Theory & Lab.
Lecture-20:STP (Spanning Tree Protocols) Theory.
Lecture-21:STP Spanning Tree Protocols Attacks Labs.
Lecture-22:VLAN (Virtual Local Area Network) Hopping Attack Lab.
Lecture-23:Configure and Verify Storm Control Theory & Lab.
Lecture-24:Configure and Verify Private VLAN Theory & Lab.
Lecture-25:Configure and Verify VRF Lite Theory & Lab.
Lecture-26:Configure and Verify Management Plane Theory & Lab Part-1
Lecture-27:Configure and Verify Management Plane Theory & Lab Part-2
Lecture-28:Configure and Verify Control Plane Theory & Lab
Lecture-29:Introduction to Layer 2 and Layer 3 Data Plane.
Lecture-30:Introduction and Compare In-Band and Out-of-Band.
Lecture-31:Securing Routing Protocols (Authentication on RIP).
Lecture-32:Securing Routing Protocols (Authentication on EIGRP & OSPF).
Lecture-33:CDP, Risk, Reconnaissance and Flooding Attack.
Lecture-34:Introduction DNS,DNS Spoofing,DNS Caching & DNSSEC.
Lecture-35:Configure and Verify TFTP, FTP, SFTP and SCP.
Lecture-36:Configure and Verify SNMP Version 2 and SNMP Version 3.
Lecture-37:Configure and Verify Syslog (Logging) in Cisco Router.
Lecture-38:Introduction & Concept of Network Time Protocol (NTP).
Lecture-39:Configure and Verify Network Time Protocol and Security.
Lecture-40:Introduction and Concept of Cryptography & Terminologies.
Lecture-41:Introduction & Concept of Symmetric & Asymmetric Encryption.
Lecture-42:Introduction and Concept of Cryptography Hash (SHA, MD5).
Lecture-43:Introduction and Concept of Virtual Private Network VPN.
Lecture-44:Introduction and Concept of IPSec Protocols Features.
Lecture-45:Introduction and Concept of Diffie-Hellman (DH).
Lecture-46:Introduction and Concept of SSL/TLS and Handshake.
Lecture-47:Introduction and Concept of IKE, Versions & Modes.
Lecture-48:Internet Key Exchange IKE Phase 1 two Modes Lab.
Lecture-49:Configure and Verify Site to Site IPSec VPN Routers.
Lecture-50:Troubleshoot Site to Site IPSec VPN on Cisco Routers.
Lecture-51:VPN ISAKMP Policy,Encryption Domain,Crypto Maps.
Lecture-52:Configure and Verify NAT-T (Traversal) on Routers.
Lecture-53:Concept of Dynamic Multi-point Virtual Private Network.
Lecture-54:Configure and Verify Dynamic Multipoint VPN Phase-1 Lab.
Lecture-55:Configure and Verify Client-Based Remote-Access VPN Lab.
Lecture-56:Introduction & Concept of FlexVPN (Virtual Private Network).
Lecture-57:FlexVPN Flexible Virutal Private Network SVTI Lab.
Lecture-58:Site-to-Site & Remote VNP High Availability Considerations.
Lecture-59:PKI (Public Key Infrastructure) Theory and Lab.
Lecture-60:Introduction to Firewall Technologies and Types.
Lecture-61:Introduction to Cisco ASA Firewall,Features & Services.
Lecture-62:Install Cisco ASA Clustering Enable Firewall in GNS3.
Lecture-63:Install Cisco ASA Clustering Enable Firewall in EVE NG.
Lecture-64:Cisco ASA Firewall Basic Commands and Configuration.
Lecture-65:Device Management In Cisco ASA Firewall Console.
Lecture-66:Device Management In Cisco ASA Firewall SSH.
Lecture-67:Device Management In Cisco ASA Firewall ASDM
Lecture-68:Device Management In Cisco ASA Firewall TFTP.
Lecture-69:Device Management In Cisco ASA Firewall FTP.
Lecture-70:Security Levels and Zoning in Cisco ASA Firewall.
Lecture-71:Implement Access Control Lists in Cisco ASA Firewall.
Lecture-72:Configure and Verify Extended ACLs in Cisco ASA Firewall.
Lecture-73:Configure and Verify Infrastructure ACLs in Cisco ASA.
Lecture-74:Configure and Verify Time-Based ACLs in Cisco ASA Firewall.
Lecture-75:Configure and Verify Standard ACLs in Cisco ASA Firewall.
Lecture-76:Configure and Verify Object Groups ACLs in Cisco ASA Firewall.
Lecture-77:Introduction and Theory of NAT and PAT in Cisco ASA Firewall.
Lecture-78:Creating Lab Topology for NAT and PAT for Cisco ASA Firewall.
Lecture-79:Configure and Verify Static NAT in Cisco ASA Firewall.
Lecture-80:Configure and Verify Static PAT in Cisco ASA Firewall.
Lecture-81:Configure and Verify Dynamic NAT in Cisco ASA Firewall.
Lecture-82:Configure and Verify Dynamic PAT in Cisco ASA Firewall.
Lecture-83:Configure and Verify Identity NAT in Cisco ASA Firewall.
Lecture-84:Configure and Verify Policy NAT in Cisco ASA Firewall.
Lecture-85:Configure and Verify Transparent Firewall Cisco ASA Firewall.
Lecture-86:Introduction and Concept of Cisco Firepower (FTD and FMC).
Lecture-87:Install and Add Cisco FTD 6.2.3-83 on EVE-NG.
Lecture-88:Install and Add Cisco FMC 6.2.3-83 on EVE-NG.
Lecture-89:Firepower Thread Defense FTD First Time Configuration.
Lecture-90:How to Configure and Add Manager in Cisco FTD.
Lecture-91:Firepower Management Center FMC First Time Configuration.
Lecture-92:Firepower Management Center FMC First Time Login Setup.
Lecture-93:Enable Evaluation Smart Licenses in Cisco FMC.
Lecture-94:How Integrate Cisco FTD Firewall with Cisco FMC.
EVE-NG Installation, Configuration & Images