Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)
Introduction
0.0.0 Course Introduction (2:39)
Answering your questions (1:53)
1.1.0 Lesson 1: Common Threats
1.0.0 Fundamental Security Concepts (0:30)
1.1.0 Common Threats (0:14)
1.1.1 On-Premise Threats (8:43)
1.1.2 Cloud-Based Threats (7:42)
1.1.3 Lesson 1 Quiz
1.2.0 Lesson 2: Common Vulnerabilities
1.2.0 Common Vulnerabilities (0:20)
1.2.1 Software Vulnerabilities (4:49)
1.2.2 SQL Injection (6:47)
1.2.3 Buffer Overflow (5:13)
1.2.4 Cross-site Request Forgery (5:07)
1.2.5 Lesson 2 Quiz
1.3.0 Lesson 3: Cryptography Components
1.3.0 Cryptography Components (0:23)
1.3.1 Hashing (5:44)
1.3.2 Encryption (5:19)
1.3.3 Public Key Infrastructure (PKI) (5:54)
1.3.4 IPsec (10:02)
1.3.5 NAT-T for IPsec (4:23)
1.3.6 Pre-Shared Key Authentication (7:18)
1.3.7 Lesson 3 Quiz
1.4.0 Lesson 4: Virtual Private Networks
1.4.0 Virtual Private Networks (0:27)
1.4.1 Site-to-Site VPN (14:12)
1.4.2 Remote Access VPNs (10:35)
1.4.3 sVTI-based VPN (9:20)
1.4.4 DMVPN (24:34)
1.4.5 FlexVPN (5:20)
1.4.6 Lesson 4 Quiz
1.5.0 Lesson 5: SDN Architecture
1.5.0 SDN Architecture (0:26)
1.5.1 Cisco DNA Center Overview (7:38)
1.5.2 Cisco DNA Center and vManage APIs (6:21)
1.5.3 Python Scripts (8:23)
1.6.0 Module 1 Summary
1.6.0 Module 1 Summary (0:33)
2.1.0 Lesson 1: Network Security Solutions
2.0.0 Network Security (0:52)
2.1.0 Network Security Solutions (0:27)
2.1.1 IPS and Firewall Solutions (4:36)
2.1.2 Deployment Models and Architectures (8:21)
2.1.3 Device Hardening (5:09)
2.1.4 Device Management Security (5:59)
2.1.5 NetFlow (7:15)
2.1.6 SNMPv3 (16:14)
2.1.7 Role-based CLI Access (7:57)
2.1.8 NTP with Authentication (5:32)
2.1.9 Lesson 1 Quiz
Module 2
2.2.0 Layer 2 Security (0:21)
2.2.1 VLANs (13:06)
2.2.2 VRF-lite (22:06)
2.2.3 Port Security (5:40)
2.2.4 DHCP Snooping (8:04)
2.2.5 Dynamic ARP Inspection (4:06)
2.2.6 Storm Control (7:05)
2.2.7 PVLANs (8:56)
2.2.8 Lesson 2 Quiz
2.3.0 Lesson 3: AAA Security
2.3.0 AAA Security (0:27)
2.3.1 TACACS+ and RADIUS (25:06)
2.3.2 dACL (5:08)
2.3.3 Lesson 3 Quiz
2.4.0 Module 2 Summary
2.4.0 Module 2 Summary (0:45)
3.1.0 Lesson 1: Cloud Environments
3.0.0 Cloud Security (0:34)
3.1.0 Cloud Environments (0:25)
3.1.1 Public, Private, Hybrid and Community Clouds (8:04)
3.1.2 Cloud Service Models- Saas, Paas, and Iaas (5:38)
3.1.3 Customer vs. Provider Responsibility (4:59)
3.1.4 Lesson 1 Quiz
3.2.0 Lesson 2: Security Considerations
3.2.0 Security Considerations (0:36)
3.2.1 Patch Management (3:41)
3.2.2 Security Assessments (4:44)
3.2.3 Cloud-Delivered Security Solutions (7:21)
3.2.4 DevSecOps (5:06)
3.2.5 Application and Data Security (4:31)
3.2.6 Policy Management (6:07)
3.2.7 Cloud Logging and Monitoring (4:46)
3.2.8 Cloud Application and Workload Security (4:16)
3.2.9 Lesson 2 Quiz
3.3.0 Module 3 Summary
3.3.0 Module 3 Summary (0:41)
4.1.0 Lesson 1: Web Security
4.0.0 Content Security (0:35)
4.1.0 Web Security (0:24)
4.1.1 Secure Internet Gateway (11:30)
4.1.2 Blacklisting (5:42)
4.1.3 URL Filtering and Categorization (4:43)
4.1.4 Malware Scanning (3:29)
4.1.5 Web Application Filtering (2:40)
4.1.6 TLS Decryption (5:10)
4.1.7 Traffic Redirection (2:48)
4.1.8 User Authentication (7:01)
4.1.9 Lesson 1 Quiz
4.2.0 Lesson 2: Email Security
4.2.0 Email Security (0:24)
4.2.1 SPAM Filtering (9:13)
4.2.2 Data Loss Prevention (9:52)
4.2.3 Email Encryption (9:28)
4.2.4 Email Blacklisting (4:40)
4.2.5 Antimalware Filtering (5:22)
4.2.6 Lesson 2 Quiz
4.3.0 Lesson 3: Cisco Umbrella
4.3.0 Cisco Umbrella (0:29)
4.3.1 Cisco Umbrella Overview (8:40)
4.3.2 Identities (5:11)
4.3.3 URL Content Settings (6:01)
4.3.4 Destination Lists (3:55)
4.3.5 Cisco Umbrella Reporting (4:37)
4.3.6 Lesson 3 Quiz
4.4.0 Module 4 Summary
4.4.0 Module 4 Summary (0:24)
5.1.0 Lesson 1: Endpoint Security Fundamentals
5.0.0 Endpoint Protection (0:41)
5.1.0 Endpoint Security Fundamentals (0:29)
5.1.1 Antimalware (6:08)
5.1.2 Retrospective Security (4:59)
5.1.3 Indication of Compromise (IOC) (7:04)
5.1.4 Antivirus (4:22)
5.1.5 Dynamic File Analysis (4:39)
5.1.6 Lesson 1 Quiz
5.2.0 Management Considerations
5.2.0 Management Considerations (0:25)
5.2.1 Endpoint Device Management (3:50)
5.2.2 Asset Inventory (6:43)
5.2.3 Mobile Device Management (7:17)
5.2.4 Lesson 3 Quiz
5.3.0 Protection Strategies
5.3.0 Protection Strategies (0:19)
5.3.1 Multifactor Authentication (5:18)
5.3.2 Endpoint Posture Assessment (6:01)
5.3.3 Endpoint Patching (5:16)
5.3.4 Lesson 3 Quiz
5.4.0 Module 5 Summary
5.4.0 Module 5 Summary (0:36)
6.1.0 Lesson 1: Network Identity Management
6.0.0 Secure Access (0:36)
6.1.0 Network Identity Management (0:22)
6.1.1 Guest Services (6:48)
6.1.2 Profiling (7:32)
6.1.3 BYOD (5:52)
6.1.4 Lesson 1 Quiz
6.2.0 Lesson 2: Configuring Secure Access
6.2.0 Configure Secure Access (0:14)
6.2.1 802.1x (11:11)
6.2.2 MAB (4:56)
6.2.3 WebAuth (7:43)
6.2.4 Lesson 2 Quiz
6.3.0 Lesson 3: Exfiltration Techniques
6.3.0 Exfiltration Techniques (0:26)
6.3.1 DNS Tunneling (3:15)
6.3.2 HTTPS (3:50)
6.3.3 Email (3:12)
6.3.4 File Transfer Protocols (3:54)
6.3.5 ICMP (4:08)
6.3.6 NTP (3:34)
6.3.7 Lesson 3 Quiz
6.4.0 Cisco Security Products
6.4.0 Cisco Security Products (0:25)
6.4.1 Cisco Stealthwatch (6:58)
6.4.2 Cisco Stealthwatch Cloud (5:53)
6.4.3 Cisco pxGrid (4:10)
6.4.4 Cisco CTA and ETA (6:23)
6.4.5 Cisco AnyConnect Network Visibility Module (3:26)
6.4.6 Lesson 4 Quiz
6.5.0 Module 6 Summary
6.5.0 Module 6 Summary (0:32)
Teach online with
6.2.0 Configure Secure Access
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock