Montreal College of Information Technology
Collège des technologies de l’information de Montréal English flagEN FlagFR

CERTIFICATES

Implementing and Operating Cisco Security Core Technologies (CCNP)
Overview

With this certificate, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. Get extensive hands-on experience deploying Cisco Firepower® Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. 

The Implementing and Operating Cisco Security Core Technologies (CCNP) course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and senior-level security roles.

​Class Schedule: Monday, Wednesday and Friday (6PM to 9PM)

Who Should Apply

This course is designed for anyone seeking a CCNP certification. The course also provides foundational knowledge for all support technicians involved in the basic installation, operation, and verification of Cisco networks.

Applicants with a background in the following are best suited for the certification:

  • Cisco Integrators and Partners
  • Consulting Systems Engineer
  • Network Administrator
  • Network Designer
  • Network Engineer
  • Network Manager
  • Security Engineer
  • Systems Engineer
  • Technical Solutions Architect
Implementing and Operating Cisco Security Core Technologies (CCNP)
Dwany H

Big Data Developer

Implementing and Operating Cisco Security Core Technologies (CCNP)
Rosana Neishabouri

Data Analyst at Lamour

Implementing and Operating Cisco Security Core Technologies (CCNP)
Sihame B

BI Developer

Implementing and Operating Cisco Security Core Technologies (CCNP)
Azemat Imani

Software Testing Specialist at W3Care

Eligibility and Requirements

To fully benefit from this course, you should have the following knowledge and skills:

  • Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA®) v1.0 course
  • Familiarity with Ethernet and TCP/IP networking
  • Working knowledge of the Windows operating system
  • Working knowledge of Cisco IOS networking and concepts
  • Familiarity with basics of networking security concepts

These courses are recommended to help you meet these prerequisites:

  • Implementing and Administering Cisco Solutions (CCNA)

SKILLS ACQUIRED

Describe information security concepts and strategies within the network

Describe common TCP/IP, network application, and endpoint attacks

Describe how various network security technologies work together to guard against attacks

Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall

Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance

Describe and implement web content security features and functions provided by Cisco Web Security Appliance

Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console

Introduce VPNs and describe cryptography solutions and algorithms

Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco Internetwork Operating System (Cisco IOS®) Virtual

Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW)

Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and Extensible Authentication Protocol (EAP) authentication

Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features

Examine various defenses on Cisco devices that protect the control and management plane

Configure and verify Cisco IOS software Layer 2 and Layer 3 data plane controls

Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions

Describe basics of cloud computing and common cloud attacks and how to secure cloud environment

COURSE OUTLINE

Implementing and Operating Cisco Security Core Technologies (CCNP)

-Information Security Overview
-Assets, Vulnerabilities, and Countermeasures
-Managing Risk

-Legacy TCP/IP Vulnerabilities
-IP Vulnerabilities
-Internet Control Message Protocol (ICMP) Vulnerabilities

-Password Attacks
-Domain Name System (DNS)-Based Attacks
-DNS Tunneling

-Buffer Overflow
-Malware
-Reconnaissance Attack

-Defense-in-Depth Strategy
-Defending Across the Attack Continuum
-Network Segmentation and Virtualization Overview

-Cisco ASA Deployment Types
-Cisco ASA Interface Security Levels
-Cisco ASA Objects and Object Groups

-Cisco Firepower NGFW Deployments
-Cisco Firepower NGFW Packet Processing and Policies
-Cisco Firepower NGFW Objects

-Cisco Email Content Security Overview
-Simple Mail Transfer Protocol (SMTP) Overview
-Email Pipeline Overview

-Cisco Web Security Appliance (WSA) Overview
-Deployment Options
-Network Users Authentication

-Cisco Umbrella Architecture
-Deploying Cisco Umbrella
-Cisco Umbrella Roaming Client

-VPN Definition
-VPN Types
-Secure Communication and Cryptographic Services

-Site-to-Site VPN Topologies
-IPsec VPN Overview
-IPsec Static Crypto Maps

-Cisco IOS VTIs
-Static VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN Configuration

-Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW
-Cisco ASA Point-to-Point VPN Configuration
-Cisco Firepower NGFW Point-to-Point VPN Configuration

-Remote Access VPN Components
-Remote Access VPN Technologies
-Secure Sockets Layer (SSL) Overview

-Remote Access Configuration Concepts
-Connection Profiles
-Group Policies

-Cisco Secure Network Access
-Cisco Secure Network Access Components
-AAA Role in Cisco Secure Network Access Solution

-802.1X and Extensible Authentication Protocol (EAP)
-EAP Methods
-Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications

-Cisco Catalyst® Switch 802.1X Configuration
-Cisco Wireless LAN Controller (WLC) 802.1X Configuration
-Cisco Identity Services Engine (ISE) 802.1X Configuration

-Host-Based Personal Firewall
-Host-Based Anti-Virus
-Host-Based Intrusion Prevention System
 

-Cisco AMP for Endpoints Architecture
-Cisco AMP for Endpoints Engines
-Retrospective Security with Cisco AMP

-Identifying Network Device Planes
-Control Plane Security Controls
-Management Plane Security Controls

-Infrastructure ACLs
-Control Plane Policing
-Control Plane Protection

-Overview of Layer 2 Data Plane Security Controls
-Virtual LAN (VLAN)-Based Attacks Mitigation
-Spanning Tree Protocol (STP) Attacks Mitigation

-Infrastructure Antispoofing ACLs
-Unicast Reverse Path Forwarding
-IP Source Guard

-Cisco Secure Management Access
-Simple Network Management Protocol Version 3
-Secure Access to Cisco Devices

-Network Time Protocol
-Device and Network Events Logging and Export
-Network Traffic Monitoring Using NetFlow

-Cisco Stealthwatch Offerings Overview
-Cisco Stealthwatch Enterprise Required Components
-Flow Stitching and Deduplication

-Evolution of Cloud Computing
-Cloud Service Models
-Security Responsibilities in Cloud

-Cisco Threat-Centric Approach to Network Security
-Cloud Physical Environment Security
-Application and Workload Security

-Cisco Stealthwatch Cloud for Public Cloud Monitoring
-Cisco Stealthwatch Cloud for Private Network Monitoring
-Cisco Stealthwatch Cloud Operations

-Software-Defined Networking Concepts
-Network Programmability and Automation
-Cisco Platforms and APIs

Earn MCIT Certification

Upon completing this course, you will receive an industry-recognized certificate from MCIT. This certificate helps you prepare yourself to confidently take the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam. Once you complete this exam, you will earn your official CCNP certification.

Why join MCIT?

  • Taught by Industry Expert Instructors
  • Real-Time, Hands-on Training
  • Post Graduation Job Placement
  • 24/7 Virtual Lab Access
  • Flexible Schedule (Evening and Weekend Class Times)
  • Vendor Authorized Trainings

INSTRUCTOR SPOTLIGHT

COMMUNITY TESTIMONIAL

At 47, I was working in retail and wanted a change in my life. At 48, with no prior experience, I got a job at a networking company thanks to my diploma from MCIT. I am so thankful for taking the leap which changed my life forever.

Vasilieos Nikiratas — Networking Student
  • Implementing and Operating Cisco Security Core Technologies (CCNP)
  • Implementing and Operating Cisco Security Core Technologies (CCNP)
  • Implementing and Operating Cisco Security Core Technologies (CCNP)
  • Implementing and Operating Cisco Security Core Technologies (CCNP)
  • Implementing and Operating Cisco Security Core Technologies (CCNP)

CALENDAR

— F.A.Q —

To register for a course, you can either call us or enter your request online and our administrative staff will call you with steps to register.
Definitely. Please feel free to contact our office, we will be more than happy to work with you to meet your training needs.
You can find most of the scheduling and pricing information on our website, or you can call our office for assistance.
Montreal College offers a new session every four months, i.e., in October (fall session), February (winter session) and June (summer session). Students are encouraged to register at least 2 to 16 weeks in advance. Please note that many programs fill up before the registration deadline.

Montreal College of Information Technology

Collège des TI de Montréal   

110-1255 Robert-Bourassa Blvd.
Montreal, Quebec H3B 3V8

+1 514-312-2383
.(JavaScript must be enabled to view this email address)