Montreal College of Information Technology
Collège des technologies de l’information de Montréal English flagEN FlagFR

CERTIFICATES

Implementing and Operating Cisco Security Core Technologies (CCNP)
OVERVIEW

With this certificate, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. Get extensive hands-on experience deploying Cisco Firepower® Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more.  The Implementing and Operating Cisco Security Core Technologies (CCNP) course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and senior-level security roles.

KEY FEATURES

  • Implementing and Operating Cisco Security Core Technologies (CCNP)

    Get trained by industry Experts

  • Implementing and Operating Cisco Security Core Technologies (CCNP)

    Project Based Learning

  • Implementing and Operating Cisco Security Core Technologies (CCNP)

    Learn while you Work

  • Implementing and Operating Cisco Security Core Technologies (CCNP)

    State of the Art Infrastructure

  • Implementing and Operating Cisco Security Core Technologies (CCNP)

    24/7 Lab access

COURSE OUTLINE

Implementing and Operating Cisco Security Core Technologies (CCNP)

-Information Security Overview
-Assets, Vulnerabilities, and Countermeasures
-Managing Risk

-Legacy TCP/IP Vulnerabilities
-IP Vulnerabilities
-Internet Control Message Protocol (ICMP) Vulnerabilities

-Password Attacks
-Domain Name System (DNS)-Based Attacks
-DNS Tunneling

-Buffer Overflow
-Malware
-Reconnaissance Attack

-Defense-in-Depth Strategy
-Defending Across the Attack Continuum
-Network Segmentation and Virtualization Overview

-Cisco ASA Deployment Types
-Cisco ASA Interface Security Levels
-Cisco ASA Objects and Object Groups

-Cisco Firepower NGFW Deployments
-Cisco Firepower NGFW Packet Processing and Policies
-Cisco Firepower NGFW Objects

-Cisco Email Content Security Overview
-Simple Mail Transfer Protocol (SMTP) Overview
-Email Pipeline Overview

-Cisco Web Security Appliance (WSA) Overview
-Deployment Options
-Network Users Authentication

-Cisco Umbrella Architecture
-Deploying Cisco Umbrella
-Cisco Umbrella Roaming Client

-VPN Definition
-VPN Types
-Secure Communication and Cryptographic Services

-Site-to-Site VPN Topologies
-IPsec VPN Overview
-IPsec Static Crypto Maps

-Cisco IOS VTIs
-Static VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN Configuration

-Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW
-Cisco ASA Point-to-Point VPN Configuration
-Cisco Firepower NGFW Point-to-Point VPN Configuration

-Remote Access VPN Components
-Remote Access VPN Technologies
-Secure Sockets Layer (SSL) Overview

-Remote Access Configuration Concepts
-Connection Profiles
-Group Policies

-Cisco Secure Network Access
-Cisco Secure Network Access Components
-AAA Role in Cisco Secure Network Access Solution

-802.1X and Extensible Authentication Protocol (EAP)
-EAP Methods
-Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications

-Cisco Catalyst® Switch 802.1X Configuration
-Cisco Wireless LAN Controller (WLC) 802.1X Configuration
-Cisco Identity Services Engine (ISE) 802.1X Configuration

-Host-Based Personal Firewall
-Host-Based Anti-Virus
-Host-Based Intrusion Prevention System
 

-Cisco AMP for Endpoints Architecture
-Cisco AMP for Endpoints Engines
-Retrospective Security with Cisco AMP

-Identifying Network Device Planes
-Control Plane Security Controls
-Management Plane Security Controls

-Infrastructure ACLs
-Control Plane Policing
-Control Plane Protection

-Overview of Layer 2 Data Plane Security Controls
-Virtual LAN (VLAN)-Based Attacks Mitigation
-Spanning Tree Protocol (STP) Attacks Mitigation

-Infrastructure Antispoofing ACLs
-Unicast Reverse Path Forwarding
-IP Source Guard

-Cisco Secure Management Access
-Simple Network Management Protocol Version 3
-Secure Access to Cisco Devices

-Network Time Protocol
-Device and Network Events Logging and Export
-Network Traffic Monitoring Using NetFlow

-Cisco Stealthwatch Offerings Overview
-Cisco Stealthwatch Enterprise Required Components
-Flow Stitching and Deduplication

-Evolution of Cloud Computing
-Cloud Service Models
-Security Responsibilities in Cloud

-Cisco Threat-Centric Approach to Network Security
-Cloud Physical Environment Security
-Application and Workload Security

-Cisco Stealthwatch Cloud for Public Cloud Monitoring
-Cisco Stealthwatch Cloud for Private Network Monitoring
-Cisco Stealthwatch Cloud Operations

-Software-Defined Networking Concepts
-Network Programmability and Automation
-Cisco Platforms and APIs

SKILLS ACQUIRED

WHO SHOULD APPLY?

Networking professionals who would like to advance their careers through accredited certifications in understanding & implementing a rage of Cisco's Security solutions .
Network Administrators seeking accreditation to augment their portfolios and ask for a bigger stake in the market.
Individuals with experience in troubleshooting and system maintenance segment & would like to advance into unified computing, data center switching, storage networking and cloud computing areas.
If you are enrolled in a Computer Science program this will help you prepare for the job market requirments.

ELIGIBILITY AND REQUIREMENTS

To fully benefit from this course, you should have the following knowledge and skills:
Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA®) v1.0 course, Familiarity with Ethernet and TCP/IP networking, Working knowledge of the Windows operating system, Working knowledge of Cisco IOS networking and concepts, Familiarity with basics of networking security concepts, These courses are recommended to help you meet these prerequisites, Implementing and Administering Cisco Solutions (CCNA)

Upon completing this course, you will receive an industry-recognized certificate from MCIT. 

Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam.
Official CCNP certification.

INSTRUCTOR SPOTLIGHT

— F.A.Q —

To register for a course, you can either call us or enter your request online and our administrative staff will call you with steps to register.
Definitely. Please feel free to contact our office, we will be more than happy to work with you to meet your training needs.
You can find most of the scheduling and pricing information on our website, or you can call our office for assistance.
Montreal College offers a new session every four months, i.e., in October (fall session), February (winter session) and June (summer session). Students are encouraged to register at least 2 to 16 weeks in advance. Please note that many programs fill up before the registration deadline.