350-701 SCOR Implementing and Operating Cisco Security Core Technologies
This course covers the Cisco Security Core Technologies (350-701 SCOR) exam, led by Sikandar Shaik, a triple CCIE expert. Learn essential skills in network, cloud, and endpoint security, secure access, and threat detection. Passing this exam earns you the Cisco Certified Specialist - Security Core certification and qualifies you for CCNP and CCIE Security certifications. This course is designed for: Network and Security Engineers aiming to enhance their expertise. IT professionals preparing for CCNP Security or CCIE Security certifications. Individuals seeking the Cisco Certified Specialist - Security Core certification. Professionals looking to deepen their knowledge in core security technologies.
Watch PromoYour Instructor
Sikandar Shaik CCIEx3 (RS / SP / SEC)
Senior Technical Instructor | Network Consultant
Sikandar Shaik, a Triple CCIE (Enterprise, Service Provider, Security #35012), is a highly accomplished and motivated senior technical instructor and network consultant with over 20 years of experience. He specializes in delivering training across a broad spectrum of Cisco certifications, from CCNA to CCIE, with expertise in Routing and Switching, Service Provider, and Security technologies.
Founder & Senior Technical Instructor at NOA Solutions
As the founder of NOA Solutions, a premier Cisco training institute in Hyderabad, India, Sikandar Shaik has been a leading force in offering both online and classroom Cisco training. He has played a pivotal role in developing and continuously updating course content to ensure it meets industry standards and helps engineers achieve their certifications, including passing lab exams.
Skills and Expertise:
Sikandar excels in designing, planning, implementing, troubleshooting, and maintaining multi-platform, multi-protocol, and complex networking environments. His expertise extends to course development and technical instruction, tailored for diverse networking professionals.
Global Training and Consulting Experience:
Sikandar has conducted instructor-led training sessions across multiple states in India and internationally in countries like China, Kenya, Maldives, Bangladesh, and the UAE. As a freelance Cisco Certified Instructor, he has delivered training to major corporate clients worldwide.
Sikandar Shaik’s dedication to excellence has enabled countless engineers to advance their careers, making him a respected name in the field of networking and technical education.
Course Curriculum
-
StartNetwork Security Terminology (6:07)
-
StartGoals of Network Security (9:30)
-
StartUnderstanding Threat Types -Mitigation (8:55)
-
StartAssets - Classification of Assets (6:15)
-
StartClassify CounterMeasures (3:56)
-
StartClassify Vulnerabilities (2:27)
-
StartNetwork Security - Design Principles (10:24)
-
StartMotivations Behind Network Attacks (3:04)
-
StartSocial Engineering Attacks (3:31)
-
StartPhishing Attacks (3:44)
-
StartSocial Engineering - Phishing Mitigation (3:45)
-
StartDenail of Service Attacks - DoS (4:47)
-
StartDistributed Denial of Service Attacks - DDoS (3:50)
-
Start007Spoofing Attacks (3:40)
-
StartSpoofing Attacks - Mitigation (3:52)
-
StartMan in the Middle Attacks - MiTM (2:10)
-
StartPassword Attacks (5:08)
-
StartPassword Attacks - Mitigation (3:44)
-
Start0 Reflector Attacks (1:51)
-
StartAmplification Attacks (2:06)
-
StartReconnaisance Attacks (5:14)
-
StartReconnaisance Attacks - Mitigation (1:57)
-
StartAbout GNS3 (3:44)
-
StartCisco Lab Options (7:35)
-
StartInstalling GNS3 on Windows (6:39)
-
StartGNS3 - Adding IOS Images (5:57)
-
StartDefault Topology- IOS Routers -Initial Configurations (5:13)
-
StartIOS Default Topology (9:19)
-
StartConnecting GNS3 Topology to Host Computer (6:02)
-
StartGNS3- VMWARE Integration (9:16)
-
StartGNS3 - IOSv L2-L3 Configuration Steps (5:54)
-
StartGNS3 - ASAv Setup (4:17)
-
StartGNS3- IOU- L2-L3 Configuation Steps (2:38)
-
StartSwitch Security - Overview (2:09)
-
StartDisable Unused Ports (1:27)
-
StartDynamic Trunking Protocol (8:17)
-
StartDTP Vulnerabilities - Mitigation (2:23)
-
StartVLAN Hopping Attack- Mitigation (4:49)
-
StartCDP - Cisco Discovery Protocol (17:36)
-
StartLLDP (2:28)
-
StartCDP-LLDP- Vulnerabilities - Mitigation (2:12)
-
StartIOS - Zone based Firewall (3:16)
-
StartZBF- Configuration overview (3:45)
-
StartZBF- Security zones (3:01)
-
StartZBF - Default Traffic flow (3:26)
-
StartClassmap -Policymap -Hierarchy (5:23)
-
StartZBF - Classify Traffic using Class-maps (5:56)
-
StartBF- Class-map Configuration (4:41)
-
StartZBF- Policymap- Zone Pairs (10:44)
-
StartWhat is Cryptography (3:16)
-
StartGoals of Cryptography (3:24)
-
StartWhat is Hashing How it works (2:32)
-
StartHashing with HMAC (2:52)
-
StartWhat is Encryption - Decryption (1:29)
-
StartEncryption Algorithms - Symmetric vs Assymetric (5:02)
-
StartCryptanalysis - Attacks (3:59)
-
StartAssymetric Encryption - Drawbacks (2:49)
-
StartPublic Key Infrastructure (3:52)
-
StartIOS Privilege Levels (8:48)
-
StartAuthorization - Device Access (3:27)
-
StartLAB -Local Authorization- Privilege Levels (14:23)
-
StartIOS Privilege Levels - Limitations (4:57)
-
StartRole based CLI Access - RBAC (5:33)
-
StartRBAC - Views Types (4:22)
-
StartLAB1- RBAC Views (9:44)
-
StartLAB2 - Modify RBAC Views (3:39)
-
StartLAB3 - RBAC Views (5:42)
-
StartLAB4 - RBAC SuperViews (5:13)
-
StartWhat is Intrusion (1:53)
-
StartIntrusion Prention System - IPS (2:38)
-
StartIDS vs IPS (1:59)
-
StartHost based IPS vs Network Based IPS (5:34)
-
StartIPS depolyments - Inline vs Promiscious (3:21)
-
StartCisco IPS Solutions (4:56)
-
StartIPS Threat Detection Methods (6:40)
-
StartIPS Signature Alarm Types (3:17)
-
StartIPS Signature Actions (3:29)
-
StartIPS Evasion Methods - Countermeasures (5:54)