Szkolenia i certyfikaty CISCO

Unikalne połączenie szerokiej wiedzy i praktyki inżynierskiej.
Ucz się bezpośrednio od najlepszych wykładowców.

Nagrody dla instruktorów CISCO

Nasi instruktorzy poraz kolejny zostali wyróżnieni przez Cisco.

Jacek Szewczyk otrzymał nagrodę The Distinguished Instructor Award
jako jeden z trzydziestu najbardziej wpływowych instruktorów na całym świecie,
którzy edukują na najwyższym poziomie w wielu dziedzinach Cisco.
Jacek prowadzi szkolenia z Enterprise Networking, Service Provider i Collaboration.

Marcin Gorol otrzymał nagrodę Instructor Excellence Award w dziedzinie Security.

Dodam że naszemu trzeciemu instruktorowi też niczego nie brakuje.
Łukasz Daczkowski szkoli z technologii Enterprise Wireless.

Recertyfikacja CISCO

Biorąc udział w szkoleniach certyfikowanych Cisco w naszym ośrodku zbierasz punkty w programie Cisco Continuing Education.

Już dwa odbyte szkolenia uprawniają do przedłużenia certyfikacji na poziomie CCNP oraz CCIE.
Więcej szczegółów na stronie Cisco Continuing Education

Cisco Learning Credits

Kredyty szkoleniowe CLC wróciły do łask i znów możesz płacić za szkolenia u wybranych Partnerów Szkoleniowych. Zapłacisz również w naszym ośrodku.

Więcej szczegółów na stronie Cisco Learning Credits

najbliższe szkolenia

23.09.2024 - 27.09.2024

ENSDWI - Implementing Cisco SD-WAN Solutions


30.09.2024 - 04.10.2024

CCNA - Implementing and Administering Cisco Solutions


07.10.2024 - 11.10.2024

SCOR (NEW) - Implementing and Operating Cisco Security Core Technologies


Zobacz wszystkie

najbliższe szkolenia

Zobacz wszystkie

SCOR (NEW) 2.0

Implementing and Operating Cisco Security Core Technologies
Termin:

od 07.10.2024 do 11.10.2024

Cena: 7500 PLN netto

Lokalizacja:

Zdalne

Rejestracja on-line Formularz kontaktowy
Termin:

od 25.11.2024 do 29.11.2024

Cena: 7500 PLN netto

Lokalizacja:

Zdalne

Rejestracja on-line Formularz kontaktowy

Typ: Szkolenie z instruktorem w jęz. polskim

Czas trwania (dni): 5

Instruktor: Marcin Gorol

Cena: 7500 PLN netto

Szkolenie Implementing and Operating Cisco Security Core Technologies (SCOR) pomaga opanować umiejętności i technologie potrzebne do wdrożenia podstawowych rozwiązań bezpieczeństwa Cisco. Szkolenie to przygotuje Cię do zapewnienia zaawansowanej ochrony przed atakami cyberbezpieczeństwa i przygotuje Cię do pełnienia ról związanych z bezpieczeństwem na wyższym poziomie.

Szkolenie przygotowuje do egzaminu 350-701 SCOR v1.0. Po jego zdaniu można uzyskać certyfikat Cisco Certified Specialist – Security Core i spełnić wymóg egzaminu podstawowego dla certyfikatów Cisco Certified Network Professional (CCNP) Security i Cisco Certified Internetwork Expert (CCIE) Security. Szkolenie to zapewnia również 64 punkty Continuing Education (CE) w celu ponownej certyfikacji.

 

The Implementing and Operating Cisco Security Core Technologies (SCOR) training helps you master the skills and technologies needed to implement core Cisco security solutions. This training will ready you to provide advanced threat protection against cybersecurity attacks and prepare you for senior-level security roles.   

This training prepares you for the 350-701 SCOR v1.0 exam. If passed, you earn the Cisco Certified Specialist – Security Core certification and satisfy the core exam requirement for the Cisco Certified Network Professional (CCNP) Security and Cisco Certified Internetwork Expert (CCIE) Security certifications. This training also earns you 64 Continuing Education (CE) credits towards recertification. 


 
How You’ll Benefit

This training will help you: 

  • Gain hands-on experience implementing core security technologies and learn best practices using Cisco security solutions 
  • Qualify for professional and expert-level security job roles 
  • Prepare for the 350-701 SCOR v1.0 exam  
  • Earn 64 CE credits towards recertification


 
Who Should Enroll

  • Security Engineers 
  • Network Engineers 
  • Network Designers 
  • Network Administrators 
  • Systems Engineers 
  • Consulting Systems Engineers 
  • Technical Solutions Architects 
  • Cisco Integrators and Partners 
  • Network Managers 
  • Program Managers 
  • Project Managers 


 
What to Expect in the Exam

Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) v1.0 is a 120-minute exam associated with the Cisco Certified Specialist – Security Core certification and satisfies the core exam requirement for the CCNP Security and CCIE Security certifications. 

This exam tests your knowledge of implementing and operating core security technologies, including:  

  • Network security 
  • Cloud security 
  • Content security 
  • Endpoint protection and detection 
  • Secure network access 
  • Visibility and enforcement 


 
Course Objectives

  • Describe information security concepts and strategies within the network 
  • Describe security flaws in the transmission protocol/internet protocol (TCP/IP) and how they can be used to attack networks and hosts 
  • Describe network application-based attacks 
  • Describe how various network security technologies work together to guard against attacks 
  • Implement access control on Cisco Secure Firewall Adaptive Security Appliance (ASA) 
  • Deploy Cisco Secure Firewall Threat Defense basic configurations 
  • Deploy Cisco Secure Firewall Threat Defense IPS, malware, and fire policies 
  • Deploy Cisco Secure Email Gateway basic configurations 
  • Deploy Cisco Secure Email Gateway policy configurations 
  • Describe and implement basic web content security features and functions provided by Cisco Secure Web Appliance 
  • Describe various attack techniques against the endpoints 
  • Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console 
  • Provide basic understanding of endpoint security and be familiar with common endpoint security technologies 
  • Describe Cisco Secure Endpoint architecture and basic features 
  • Describe Cisco Secure Network Access solutions 
  • Describe 802.1X and extensible authentication protocol (EAP) authentication 
  • Configure devices for 802.1X operations 
  • Introduce VPNs and describe cryptography solutions and algorithms 
  • Describe Cisco secure site-to-site connectivity solutions 
  •  Deploy Cisco Internetwork Operating System (Cisco IOS®) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs 
  • Configure point-to-point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense 
  • Describe Cisco secure remote access connectivity solutions 
  • Deploy Cisco secure remote access connectivity solutions 
  • Provide an overview of network infrastructure protection controls 
  • Examine various defenses on Cisco devices that protect the control plane 
  • Configure and verify Cisco IOS software layer 2 data plane controls 
  • Configure and verify Cisco IOS software and Cisco ASA layer 3 data plane controls 
  • Examine various defenses on Cisco devices that protect the management plane 
  • Describe the baseline forms of telemetry recommended for network infrastructure and security devices 
  • Describe deploying Cisco Secure Network Analytics 
  • Describe basics of cloud computing and common cloud attacks 
  • Describe how to secure cloud environment 
  • Describe the deployment of Cisco Secure Cloud Analytics 
  • Describe basics of software-defined networks and network programmability 


 
Course Prerequisites

There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are: 

  • Familiarity with Ethernet and TCP/IP networking 
  • Working knowledge of the Windows operating system 
  • Working knowledge of Cisco IOS networking and concepts 
  • Familiarity with basics of networking security concepts 

These skills can be found in the following Cisco Learning Offering:   

  • Implementing and Administering Cisco Solutions (CCNA®) 


 
Course Outline

  1. Network Security Technologies 
  2. Cisco Secure Firewall ASA Deployment 
  3. Cisco Secure Firewall Threat Defense Basics 
  4. Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies 
  5. Cisco Secure Email Gateway Basics 
  6. Cisco Secure Email Policy Configuration 
  7. Cisco Secure Web Appliance Deployment 
  8. VPN Technologies and Cryptography Concepts 
  9. Cisco Secure Site-to-Site VPN Solutions 
  10. Cisco IOS VTI-Based Point-to-Point IPsec VPNs 
  11. Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense 
  12. Cisco Secure Remote-Access VPN Solutions 
  13. Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense 
  14. Describing Information Security Concepts 
  15. Describe Common TCP/IP Attacks 
  16. Describe Common Network Application Attacks 
  17. Common Endpoint Attacks 
  18. Cisco Umbrella Deployment 
  19. Endpoint Security Technologies 
  20. Cisco Secure Endpoint 
  21. Cisco Secure Network Access Solutions 
  22. 802.1X Authentication 
  23. 802.1X Authentication Configuration 
  24. Network Infrastructure Protection 
  25. Control Plane Security Solutions 
  26. Layer 2 Data Plane Security Controls 
  27. Layer 3 Data Plane Security Controls 
  28. Management Plane Security Controls 
  29. Traffic Telemetry Methods 
  30. Cisco Secure Network Analytics Deployment 
  31. Cloud Computing and Cloud Security 
  32. Cloud Security 
  33. Cisco Secure Cloud Analytics Deployment 
  34. Software-Defined Networking 


 
Lab Outline

  1. Configure Network Settings and NAT on Cisco Secure Firewall ASA 
  2. Configure Cisco Secure Firewall ASA Access Control Policies 
  3. Configure Cisco Secure Firewall Threat Defense NAT 
  4. Configure Cisco Secure Firewall Threat Defense Access Control Policy 
  5. Configure Cisco Secure Firewall Threat Defense Discovery and IPS Policy 
  6. Configure Cisco Secure Firewall Threat Defense Malware and File Policy 
  7. Configure Listener, HAT, and RAT on Cisco Secure Email Gateway 
  8. Configure Cisco Secure Email Policies 
  9. Configure Proxy Services, Authentication, and HTTPS Decryption 
  10. Enforce Acceptable Use Control and Malware Protection 
  11. Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel  
  12. Configure Point-to-Point VPN between Cisco Secure Firewall Threat Defense Devices 
  13. Configure Remote Access VPN on the Cisco Secure Firewall Threat Defense 
  14. Examine Cisco Umbrella Dashboard and DNS Security 
  15. Explore Cisco Umbrella Secure Web Gateway and Cloud-Delivered Firewall 
  16. Explore Cisco Umbrella CASB Funtionalities 
  17. Explore Cisco Secure Endpoint 
  18. Perform Endpoint Analysis Using Cisco Secure Endpoint Console 
  19. Explore File Ransomware Protection by Cisco Secure Endpoint Console 
  20. Explore Secure Network Analytics v7.4.2 
  21. Explore Global Threat Alerts Integration and ETA Cryptographic Audit 
  22. Explore Cloud Analytics Dashboard and Operations 
  23. Explore Secure Cloud Private and Public Cloud Monitoring