Collège des technologies de l’information de Montréal
Montreal College of Information Technology English flagEN FlagFR


CCNP - Routing & Switching

With this certificate, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. Get extensive hands-on experience deploying Cisco Firepower® Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more.  The Implementing and Operating Cisco Security Core Technologies (CCNP) course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and senior-level security roles.

Instructor Led


  • Implementing and Operating Cisco Security Core Technologies (CCNP)

    Get trained by industry Experts

  • Implementing and Operating Cisco Security Core Technologies (CCNP)

    Project Based Learning

  • Implementing and Operating Cisco Security Core Technologies (CCNP)

    Learn while you Work

  • Implementing and Operating Cisco Security Core Technologies (CCNP)

    State of the Art Infrastructure

  • Implementing and Operating Cisco Security Core Technologies (CCNP)

    24/7 Lab access


Implementing and Operating Cisco Security Core Technologies (CCNP)

-Information Security Overview
-Assets, Vulnerabilities, and Countermeasures
-Managing Risk

-Legacy TCP/IP Vulnerabilities
-IP Vulnerabilities
-Internet Control Message Protocol (ICMP) Vulnerabilities

-Password Attacks
-Domain Name System (DNS)-Based Attacks
-DNS Tunneling

-Buffer Overflow
-Reconnaissance Attack

-Defense-in-Depth Strategy
-Defending Across the Attack Continuum
-Network Segmentation and Virtualization Overview

-Cisco ASA Deployment Types
-Cisco ASA Interface Security Levels
-Cisco ASA Objects and Object Groups

-Cisco Firepower NGFW Deployments
-Cisco Firepower NGFW Packet Processing and Policies
-Cisco Firepower NGFW Objects

-Cisco Email Content Security Overview
-Simple Mail Transfer Protocol (SMTP) Overview
-Email Pipeline Overview

-Cisco Web Security Appliance (WSA) Overview
-Deployment Options
-Network Users Authentication

-Cisco Umbrella Architecture
-Deploying Cisco Umbrella
-Cisco Umbrella Roaming Client

-VPN Definition
-VPN Types
-Secure Communication and Cryptographic Services

-Site-to-Site VPN Topologies
-IPsec VPN Overview
-IPsec Static Crypto Maps

-Cisco IOS VTIs
-Static VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN Configuration

-Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW
-Cisco ASA Point-to-Point VPN Configuration
-Cisco Firepower NGFW Point-to-Point VPN Configuration

-Remote Access VPN Components
-Remote Access VPN Technologies
-Secure Sockets Layer (SSL) Overview

-Remote Access Configuration Concepts
-Connection Profiles
-Group Policies

-Cisco Secure Network Access
-Cisco Secure Network Access Components
-AAA Role in Cisco Secure Network Access Solution

-802.1X and Extensible Authentication Protocol (EAP)
-EAP Methods
-Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications

-Cisco Catalyst® Switch 802.1X Configuration
-Cisco Wireless LAN Controller (WLC) 802.1X Configuration
-Cisco Identity Services Engine (ISE) 802.1X Configuration

-Host-Based Personal Firewall
-Host-Based Anti-Virus
-Host-Based Intrusion Prevention System

-Cisco AMP for Endpoints Architecture
-Cisco AMP for Endpoints Engines
-Retrospective Security with Cisco AMP

-Identifying Network Device Planes
-Control Plane Security Controls
-Management Plane Security Controls

-Infrastructure ACLs
-Control Plane Policing
-Control Plane Protection

-Overview of Layer 2 Data Plane Security Controls
-Virtual LAN (VLAN)-Based Attacks Mitigation
-Spanning Tree Protocol (STP) Attacks Mitigation

-Infrastructure Antispoofing ACLs
-Unicast Reverse Path Forwarding
-IP Source Guard

-Cisco Secure Management Access
-Simple Network Management Protocol Version 3
-Secure Access to Cisco Devices

-Network Time Protocol
-Device and Network Events Logging and Export
-Network Traffic Monitoring Using NetFlow

-Cisco Stealthwatch Offerings Overview
-Cisco Stealthwatch Enterprise Required Components
-Flow Stitching and Deduplication

-Evolution of Cloud Computing
-Cloud Service Models
-Security Responsibilities in Cloud

-Cisco Threat-Centric Approach to Network Security
-Cloud Physical Environment Security
-Application and Workload Security

-Cisco Stealthwatch Cloud for Public Cloud Monitoring
-Cisco Stealthwatch Cloud for Private Network Monitoring
-Cisco Stealthwatch Cloud Operations

-Software-Defined Networking Concepts
-Network Programmability and Automation
-Cisco Platforms and APIs



Networking professionals who would like to advance their careers through accredited certifications in understanding & implementing a rage of Cisco's Security solutions .
Network Administrators seeking accreditation to augment their portfolios and ask for a bigger stake in the market.
Individuals with experience in troubleshooting and system maintenance segment & would like to advance into unified computing, data center switching, storage networking and cloud computing areas.
If you are enrolled in a Computer Science program this will help you prepare for the job market requirments.


To fully benefit from this course, you should have the following knowledge and skills:
Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA®) v1.0 course, Familiarity with Ethernet and TCP/IP networking, Working knowledge of the Windows operating system, Working knowledge of Cisco IOS networking and concepts, Familiarity with basics of networking security concepts, These courses are recommended to help you meet these prerequisites, Implementing and Administering Cisco Solutions (CCNA)

Upon completing this course, you will receive an industry-recognized certificate from MCIT. This certificate helps you prepare yourself to confidently take the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam. Once you complete this exam, you will earn your official CCNP certification.



— FAQ —

Pour vous inscrire à un cours, vous pouvez soit nous appeler, soit saisir votre demande en ligne, et notre personnel administratif vous appellera pour vous inscrire.
Absolument. N'hésitez pas à contacter notre bureau, nous serons plus qu'heureux de travailler avec vous pour répondre à vos besoins de formation.
Vous pouvez trouver la plupart des informations de planification et de tarification sur notre site Web, ou vous pouvez appeler notre bureau pour obtenir de l'aide.
Les sessions de MCIT commencent tous les quatre mois, soit en octobre (session d’automne), février (session d’hiver), et juin (session d’été). Les étudiants sont invités à s’inscrire au moins 2 à 16 semaines à l’avance. Veuillez noter que plusieurs cours affichent complet bien avant la date limite d’inscription.