With this certificate, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. Get extensive hands-on experience deploying Cisco Firepower® Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. The Implementing and Operating Cisco Security Core Technologies (CCNP) course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and senior-level security roles.
Instructor Led
Get trained by industry Experts
Project Based Learning
Learn while you Work
State of the Art Infrastructure
24/7 Lab access
Implementing and Operating Cisco Security Core Technologies (CCNP)
-Legacy TCP/IP Vulnerabilities
-IP Vulnerabilities
-Internet Control Message Protocol (ICMP) Vulnerabilities
-Defense-in-Depth Strategy
-Defending Across the Attack Continuum
-Network Segmentation and Virtualization Overview
-Cisco ASA Deployment Types
-Cisco ASA Interface Security Levels
-Cisco ASA Objects and Object Groups
-Cisco Firepower NGFW Deployments
-Cisco Firepower NGFW Packet Processing and Policies
-Cisco Firepower NGFW Objects
-Cisco Email Content Security Overview
-Simple Mail Transfer Protocol (SMTP) Overview
-Email Pipeline Overview
-Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW
-Cisco ASA Point-to-Point VPN Configuration
-Cisco Firepower NGFW Point-to-Point VPN Configuration
-Cisco Secure Network Access
-Cisco Secure Network Access Components
-AAA Role in Cisco Secure Network Access Solution
-802.1X and Extensible Authentication Protocol (EAP)
-EAP Methods
-Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications
-Cisco Catalyst® Switch 802.1X Configuration
-Cisco Wireless LAN Controller (WLC) 802.1X Configuration
-Cisco Identity Services Engine (ISE) 802.1X Configuration
-Cisco AMP for Endpoints Architecture
-Cisco AMP for Endpoints Engines
-Retrospective Security with Cisco AMP
-Identifying Network Device Planes
-Control Plane Security Controls
-Management Plane Security Controls
-Overview of Layer 2 Data Plane Security Controls
-Virtual LAN (VLAN)-Based Attacks Mitigation
-Spanning Tree Protocol (STP) Attacks Mitigation
-Cisco Secure Management Access
-Simple Network Management Protocol Version 3
-Secure Access to Cisco Devices
-Network Time Protocol
-Device and Network Events Logging and Export
-Network Traffic Monitoring Using NetFlow
-Cisco Stealthwatch Offerings Overview
-Cisco Stealthwatch Enterprise Required Components
-Flow Stitching and Deduplication
-Cisco Threat-Centric Approach to Network Security
-Cloud Physical Environment Security
-Application and Workload Security
-Cisco Stealthwatch Cloud for Public Cloud Monitoring
-Cisco Stealthwatch Cloud for Private Network Monitoring
-Cisco Stealthwatch Cloud Operations
Have a High School Diploma or equivalent, Complete an interview with a member of our Admissions Team, Commit to program and job search requirements.
Upon completing this course, you will receive an industry-recognized certificate from MCIT. This certificate helps you prepare yourself to confidently take the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam. Once you complete this exam, you will earn your official CCNP certification.