Курс Cisco SCOR 1.0
Ciscohttps://www.atraining.ru/img/course/Cisco/SCOR/1.0.png
Implementing and Operating Cisco Security Core Technologies
Даты ближайших онлайн-курсов
- В данный момент в расписании нет ближайших занятий. Возможно индивидуальное обучение - оставьте нам запрос на курс - мы обязательно ответим и уточним детали.
Нужен для получения статусов
- Сертификация CCNP Security - Cisco Certified Network Professional Security
Подготавливает к сдаче сертификационных экзаменов
- Экзамен 350-701
Ограничение участия
В данном курсе могут принимать участие только обладатели активной на дату начала события подписки Knowledge Assurance. Обычно так делается, если курс/вебинар требует предварительной подготовки.
Программа курса SCOR 1.0
Модуль 1 - Describing Information Security Concepts
- Information Security Overview
- Assets, Vulnerabilities, and Countermeasures
- Managing Risk
- Vulnerability Assessment
- Understanding CVSS
Модуль 2 - Describing Common TCP/IP Attacks
- Legacy TCP/IP Vulnerabilities
- IP Vulnerabilities
- ICMP Vulnerabilities
- TCP Vulnerabilities
- UDP Vulnerabilities
- Attack Surface and Attack Vectors
- Reconnaissance Attacks
- Access Attacks
- Man-In-The-Middle Attacks
- Denial of Service and Distributed Denial of Service Attacks
- Reflection and Amplification Attacks
- Spoofing Attacks
- DHCP Attacks
Модуль 3 - Describing Common Network Application Attacks
- Password Attacks
- DNS-Based Attacks
- DNS Tunneling
- Web-Based Attacks
- HTTP 302 Cushioning
- Command Injections
- SQL Injections
- Cross-Site Scripting and Request Forgery
- Email-Based Attacks
Модуль 4 - Describing Common Endpoint Attacks
- Buffer Overflow
- Malware
- Reconnaissance Attack
- Gaining Access and Control
- Gaining Access via Social Engineering
- Gaining Access via Web-Based Attacks
- Exploit Kits and Rootkits
- Privilege Escalation
- Post-Exploitation Phase
- Angler Exploit Kit
Модуль 5 - Describing Network Security Technologies
- Defense-in-Depth Strategy
- Defending Across the Attack Continuum
- Network Segmentation and Virtualization Overview
- Stateful Firewall Overview
- Security Intelligence Overview
- Threat Information Standardization
- Network-Based Malware Protection Overview
- IPS Overview
- Next Generation Firewall Overview
- Email Content Security Overview
- Web Content Security Overview
- Threat Analytic Systems Overview
- DNS Security Overview
- Authentication, Authorization, and Accounting Overview
- Identity and Access Management Overview
- Virtual Private Network Technology Overview
- Network Security Device Form Factors Overview
Модуль 6 - Deploying Cisco ASA Firewall
- Cisco ASA Deployment Types
- Cisco ASA Interface Security Levels
- Cisco ASA Objects and Object Groups
- Network Address Translation
- Configure Network Settings and NAT on Cisco ASA
- Cisco ASA Interface ACLs
- Cisco ASA Global ACLs
- Cisco ASA Advanced Access Policies
- Configure Cisco ASA Access Control Policies
- Cisco ASA High Availability Overview
Модуль 7 - Deploying Cisco Firepower Next-Generation Firewall
- Cisco Firepower NGFW Deployments
- Cisco Firepower NGFW Packet Processing and Policies
- Cisco Firepower NGFW Objects
- Cisco Firepower NGFW NAT
- Configure Cisco Firepower NGFW NAT
- Cisco Firepower NGFW Prefilter Policies
- Cisco Firepower NGFW Access Control Policies
- Cisco Firepower NGFW Security Intelligence
- Configure Cisco Firepower NGFW Access Control Policy
- Cisco Firepower NGFW Discovery Policies
- Cisco Firepower NGFW IPS Policies
- Configure Cisco Firepower NGFW Discovery and IPS Policy
- Cisco Firepower NGFW Malware and File Policies
- Configure Cisco NGFW Malware and File Policy
Модуль 8 - Deploying Email Content Security
- Cisco Email Content Security Overview
- SMTP Overview
- Email Pipeline Overview
- Public and Private Listeners
- Host Access Table Overview
- Recipient Access Table Overview
- Configure Listener, HAT, and RAT on Cisco ESA
- Mail Policies Overview
- Protection Against Spam and Graymail
- Antivirus and Anti-malware Protection
- Outbreak Filters
- Content Filters
- Data Loss Prevention
- Email Encryption
- Configure Mail Policies
Модуль 9 - Deploying Web Content Security
- Cisco WSA Overview
- Deployment Options
- Network Users Authentication
- HTTPS Traffic Decryption
- Configure Proxy Services, Authentication, and HTTPS Decryption
- Access Policies and Identification Profiles
- Acceptable Use Controls Settings
- Anti-Malware Protection
- Enforce Acceptable Use Control and Malware Protection
Модуль 10 - Deploying Cisco Umbrella
- Cisco Umbrella Architecture
- Deploying Cisco Umbrella
- Cisco Umbrella Roaming Client
- Managing Cisco Umbrella
- Cisco Umbrella Investigate Overview
- Examine the Umbrella Dashboard
- Examine Cisco Umbrella Investigate
- Explore DNS Ransomware Protection by Cisco Umbrella
Модуль 11 - Explaining VPN Technologies and Cryptography Concepts
- VPN Definition
- VPN Types
- Secure Communication and Cryptographic Services
- Keys in Cryptography
- Public Key Infrastructure
Модуль 12 - Introducing Cisco Secure Site-to-Site VPN Solutions
- Site-to-Site VPN Topologies
- IPsec VPN Overview
- IPsec Static Crypto Maps
- IPsec Static Virtual Tunnel Interface
- Dynamic Multipoint VPN
- Cisco IOS FlexVPN
Модуль 13 - Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs
- Cisco IOS VTIs
- Static VTI Point-to-Point IPsec IKEv2 VPN Configuration
- Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel
Модуль 14 - Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW
- Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW
- Cisco ASA Point-to-Point VPN Configuration
- Cisco Firepower NGFW Point-to-Point VPN Configuration
- Configure Point-to-Point VPN Between the Cisco ASA and Cisco Firepower NGFW
Модуль 15 - Introducing Cisco Secure Remote Access VPN Solutions
- Remote Access VPN Components
- Remote Access VPN Technologies
- SSL Overview
Модуль 16 - Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW
- Remote Access Configuration Concepts
- Connection Profiles
- Group Policies
- Cisco ASA Remote Access VPN Configuration
- Cisco Firepower NGFW Remote Access VPN Configuration
- Configure Remote Access VPN on the Cisco Firepower NGFW
Модуль 17 - Explaining Cisco Secure Network Access Solutions
- Cisco Secure Network Access
- Cisco Secure Network Access Components
- AAA Role in Cisco Secure Network Access Solution
- Cisco Identity Services Engine
- Cisco TrustSec
Модуль 18 - Describing 802.1X Authentication
Модуль 19 - Configuring 802.1X Authentication
- Cisco Catalyst Switch 802.1X Configuration
- Cisco WLC 802.1X Configuration
- Cisco ISE 802.1X Configuration
- Supplicant 802.1X Configuration
- Cisco Central Web Authentication
Модуль 20 - Describing Endpoint Security Technologies
- Host-Based Personal Firewall
- Host-Based Anti-Virus
- Host-Based Intrusion Prevention System
- Application Whitelists and Blacklists
- Host-Based Malware Protection
- Sandboxing Overview
- File Integrity Checking
Модуль 21 - Deploying Cisco AMP for Endpoints
- Cisco AMP for Endpoints Architecture
- Cisco AMP for Endpoints Engines
- Retrospective Security with Cisco AMP
- Cisco AMP Device and File Trajectory
- Managing Cisco AMP for Endpoints
- Explore Cisco AMP for Endpoints
- Perform Endpoint Analysis Using AMP for Endpoints Console
- Explore File Ransomware Protection by Cisco AMP for Endpoints Console
Модуль 22 - Introducing Network Infrastructure Protection
- Identifying Network Device Planes
- Control Plane Security Controls
- Management Plane Security Controls
- Network Telemetry
- Layer 2 Data Plane Security Controls
- Layer 3 Data Plane Security Controls
Модуль 23 - Deploying Control Plane Security Controls
- Infrastructure ACLs
- Control Plane Policing
- Control Plane Protection
- Routing Protocol Security
Модуль 24 - Deploying Layer 2 Data Plane Security Controls
- Overview of Layer 2 Data Plane Security Controls
- VLAN-Based Attacks Mitigation
- STP Attacks Mitigation
- Port Security
- Private VLANs
- DHCP Snooping
- ARP Inspection
- Storm Control
- MACsec Encryption
Модуль 25 - Deploying Layer 3 Data Plane Security Controls
- Infrastructure Antispoofing ACLs
- Unicast Reverse Path Forwarding
- IP Source Guard
Модуль 26 - Deploying Management Plane Security Controls
- Cisco Secure Management Access
- Simple Network Management Protocol Version 3
- Secure Access to Cisco Devices
- AAA for Management Access
Модуль 27 - Deploying Traffic Telemetry Methods
- Network Time Protocol
- Device and Network Events Logging and Export
- Network Traffic Monitoring Using NetFlow
Модуль 28 - Deploying Cisco Stealthwatch Enterprise
- Cisco Stealthwatch Offerings Overview
- Cisco Stealthwatch Enterprise Required Components
- Flow Stitching and Deduplication
- Stealthwatch Enterprise Optional Components
- Stealthwatch Enterprise and ISE Integration
- Cisco Stealthwatch with Cognitive Analytics
- Cisco Encrypted Traffic Analytics
- Host Groups
- Security Events and Alarms
- Host, Role, and Default Policies
- Explore Cisco Stealthwatch Enterprise v6.9.3
- Explore CTA in Stealthwatch Enterprise v7.0
Модуль 29 - Describing Cloud and Common Cloud Attacks
- Evolution of Cloud Computing
- Cloud Service Models
- Security Responsibilities in Cloud
- Cloud Deployment Models
- Common Security Threats in Cloud
- Patch Management in the Cloud
- Security Assessment in the Cloud
Модуль 30 - Securing the Cloud
- Cisco Threat-Centric Approach to Network Security
- Cloud Physical Environment Security
- Application and Workload Security
- Cloud Management and API Security
- Network Function Virtualization (NFV) and Virtual Network Functions (VNF)
- Cisco NFV Examples
- Reporting and Threat Visibility in Cloud
- Cloud Access Security Broker
- Cisco CloudLock
- OAuth and OAuth Attacks
- Explore the Cisco Cloudlock Dashboard and User Security
- Explore Cisco Cloudlock Application and Data Security
Модуль 31 - Deploying Cisco Stealthwatch Cloud
- Cisco Stealthwatch Cloud for Public Cloud Monitoring
- Cisco Stealthwatch Cloud for Private Network Monitoring
- Cisco Stealthwatch Cloud Operations
- Explore Cisco Stealthwatch Cloud
- Explore Stealthwatch Cloud Alert Settings, Watchlists, and Sensors
Модуль 32 - Describing SDN
- Software-Defined Networking Concepts
- Network Programmability and Automation
- Cisco Platforms and APIs
- Basic Python Scripts for Automation
Стандартная продолжительность занятий
10 дней
Фактическая продолжительность может быть иной - например субботние курсы обычно читаются дольше. Для уточнения информации по конкретной группе посмотрите расписание.
Что после курса?
- Подключиться к программе Knowledge Assurance и получить доступ к видеозаписям курсов и вебинаров плюс скидку на участие в онлайн-курсах.
- Зарегистрироваться в личном профиле студента учебного центра Advanced Training, чтобы получить доступ к бесплатным курсам и загрузке записей.
- Самому сделать домашнюю сетевую лабораторию для практики, бесплатно и не покупая/арендуя оборудование - про это у нас есть отдельная страница.
- Получить сертификат Advanced Training, который будет доступен по прямой ссылке и может быть распечатан в бумажном виде.
- Почитать интересные технические статьи на нашей Knowledge Base