Get 10% Discount on Your Purchase When You Sign Up for Email

Passguide Products

Enter Your Email Address to Receive Your 10%
OFF
Discount Code Plus... Our Exclusive Weekly Deals

* We value your privacy. We will not rent or sell your email address
Loading...
Implementing and Operating Cisco Security Core Technologies Video Course

350-701: Implementing and Operating Cisco Security Core Technologies

Your Cisco 350-701 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the 350-701 certification test. Ace your Cisco 350-701 at the first attempt and obtain the Implementing and Operating Cisco Security Core Technologies credential with ease.

# of Students
112
# of Lectures
260
Course Length
2 h
Course Rating
5.0
Price $27.49
Today $24.99

Curriculum for 350-701 Video Course

Cisco Certifications - CCNP SCOR

  Video Name Time
  1. Cisco Certification Updates - FEB 2020 11:00
  2. Cisco Re-Certifications 1:00
  3. CCNP Certifications 1:00
  4. CCIE Certifications 2:00
  5. Cisco Certification Migration Options 6:00
  6. CCNP Required Exams 3:00
  Video Name Time
  1. CCNP Security Certifications 7:00
  2. CCNP SCOR - 350-701 1:00
  3. SCOR 350-701 Contents 7:00
  Video Name Time
  1. Network Security Terminology 6:00
  2. Goals of Network Security 10:00
  3. Threat Types - Mitigation 9:00
  4. Assets - Classification of Assets 6:00
  5. Classify Counter Measures 4:00
  6. Classify Vulnerabilities 2:00
  7. Network Security - Design Principles 10:00
  Video Name Time
  1. Motivations behind Network Attacks 3:00
  2. Social Engineering Attacks 4:00
  3. Phishing Attacks 4:00
  4. Social Engineering Attacks 4:00
  5. Denial of Service Attacks - DoS 5:00
  6. Distributed Denial of Service Attakcs - DDoS 4:00
  7. Spoofing Attacks 4:00
  8. Spoofing Attacks - Mitigation 4:00
  9. Man in the Middle Attacks -MiTM 2:00
  10. Password Attacks 5:00
  11. Password Attacks - Mitigation 4:00
  12. Reflector Attacks 2:00
  13. Amplification Attacks 2:00
  14. Reconnaissance Attacks 5:00
  15. Reconnaissance Attacks - Mitigation 2:00
  Video Name Time
  1. Malicious Codes - VIRUS 2:00
  2. Malicious Codes - WORMS 1:00
  3. Malicious Codes - TROJAN HORSES 1:00
  4. Hacking 1:00
  5. Hackers - Script Kiddies 1:00
  6. Malware Service - DARKNET 1:00
  Video Name Time
  1. AAA - Network Security 11:00
  2. Cisco Telemetry Services 4:00
  3. Firewall 8:00
  4. Intrusion Prevention System - IPS 4:00
  5. Virtual Private Networks 4:00
  6. Next Generation Firewalls 6:00
  Video Name Time
  1. Cisco Lab Options 8:00
  2. About GNS3 4:00
  3. Installing GNS3 - Windows 7:00
  4. GNS3 - IOS Images 6:00
  5. Default Topology - GNS3 - IOS initial Configs 5:00
  6. IOS Default Topology 9:00
  7. GNS3 Topology-HOST Computer 6:00
  8. GNS3 - VMware Setup 9:00
  9. GNS3 - IOSv L2-L3 6:00
  10. GNS3 - ASAv Setup 4:00
  11. GNS3 - IOU-L2-L3 3:00
  Video Name Time
  1. Network Infrastructure Protection 5:00
  2. Identify Network Device Planes 2:00
  3. Data Plane 6:00
  4. Control Plane 3:00
  5. Management Plane 3:00
  Video Name Time
  1. Inband Vs OutBand Management 7:00
  2. Remote Access - TELNET 6:00
  3. Remote Access - SSH 9:00
  Video Name Time
  1. Cisco Telemetry Services 4:00
  2. Device- Network Events Logging 10:00
  3. Syslog - Terminal Logging 7:00
  4. Network Time Protocol 7:00
  5. NTP Stratum Value 4:00
  6. NTP Configuration - LAB 9:00
  Video Name Time
  1. Control Plane Security - Possible Threats 9:00
  2. Routing Protocol Authentication 12:00
  3. Control Plane Policing - CoPP 7:00
  4. Class-Map - Policy Map - Hierarchy 5:00
  5. CoPP - Configuration Examples 12:00
  Video Name Time
  1. Switch Security - Overview 2:00
  2. Disable Unused Ports 1:00
  3. Dynamic Trunking Protocol - DTP 8:00
  4. DTP Vulnerabilities - Mitigation 2:00
  5. VLAN Hopping Attacks - Mitigation 5:00
  6. Cisco Discovery Protocol - CDP 18:00
  7. Link Layer Discovery Protocol - LLDP 3:00
  8. CDP- LLDP Vulnerabilities - Mitigation 2:00
  Video Name Time
  1. MAC Flooding Attack - Port Security 12:00
  2. MAC Spoofing Attack - Port Security 7:00
  3. Port Security - Configuration 11:00
  4. Spanning Tree Port Fast 7:00
  5. Native VLAN 8:00
  6. DHCP Spoofing Attack - DHCP Spoofing 8:00
  7. DHCP Snooping - Configuration 16:00
  8. DHCP Starvation Attack - Mitigation 2:00
  9. ARP Spoofing Attack - DAI 12:00
  10. Dynamic ARP Inspection - Configuration 12:00
  11. Protected Ports- Private VLAN Edge 3:00
  12. Private VLAN 9:00
  13. Private VLAN - Configuration 5:00
  14. Private VLAN - LAB 20:00
  Video Name Time
  1. What is Firewall 8:00
  2. Statefull Packet Filtering 8:00
  3. Stateless Packet Filtering 4:00
  4. Application Level Gateways - Proxy Servers 5:00
  5. Next Generation Firewalls 6:00
  6. FIrewall Vendors in Market 6:00
  Video Name Time
  1. Cisco Statefull Firewalls - IOS - ASA 3:00
  2. ASA Supported Features _ PART1 9:00
  3. ASA Supported Features _ PART2 11:00
  4. ASS Compare Models 7:00
  Video Name Time
  1. Manage Cisco CLI - ASA - GUI 3:00
  2. Basic CLI Modes - Commands 4:00
  3. ASA Security Levels 10:00
  4. ASA Interface Configurations 5:00
  5. ASA Security Policies - Default 11:00
  6. ASA Routing 5:00
  Video Name Time
  1. ASA ACls - Overview 9:00
  2. ASA ACLS - Basic Example 7:00
  3. Traffic Between Same Security Levels 3:00
  4. ACL Object Groups 10:00
  5. ACL Object Groups - LAB 12:00
  Video Name Time
  1. PRivate IP - Public IP 5:00
  2. What is NAT ? 3:00
  3. NAT Types 6:00
  4. Dynamic NAT - on ASA 10:00
  5. Dynamic PAT- ASA 5:00
  6. Dynamic PAT - with Exit interface 5:00
  7. Dynamic NAT-PAT Combination 2:00
  8. Static NAT - ASA 12:00
  9. Static PAT- ASA 11:00
  Video Name Time
  1. IOS - Zone Based Firewall 3:00
  2. ZBF - Configuration Overview 4:00
  3. ZBF - Security Zones 3:00
  4. ZBF - Default Flow 3:00
  5. Class-Map - Policy Map - Hierarchy 5:00
  6. ZBF - Classify Traffic using Class-Maps 6:00
  7. ZBF- Class-map Configuration 5:00
  8. ZBF - POlicy Map - Zone Pairs 11:00
  Video Name Time
  1. What is Cryptography 3:00
  2. Goals of Cryptography 3:00
  3. Hashing-How it Works 3:00
  4. Hashing with HMAC 3:00
  5. What is Encryption - Decryption 1:00
  6. Encryption Algorithms - Symmetric vs Assymetric 5:00
  7. Cryptanalysis - Attacks 4:00
  8. Asymmetric Encryption - Drawbacks 3:00
  9. Public Key Infrastructure - PKI 4:00
  Video Name Time
  1. Virutal Private Network - Introduction 5:00
  2. VPN Types - Site to Site / Remote Access 4:00
  3. VPN Logical Topologies 1:00
  4. VPN Default Lab Setup - Routers 5:00
  Video Name Time
  1. What is IPSec ? 3:00
  2. IPsec Security Services 7:00
  3. IPSec Modes - Tunnel vs Transport 5:00
  Video Name Time
  1. How IPsec VPN Works 5:00
  2. Step-1 - Interesting Traffic 3:00
  3. Step-2 IKE Phase-1 8:00
  4. Step-3 - IKE Phase 2 9:00
  5. IKE Phase 2 - Configuration/ Verification 7:00
  Video Name Time
  1. Remote Access VPN 3:00
  2. What is SSL-TLS 3:00
  3. How SSL-TLS Works 8:00
  4. What is SSL VPN 4:00
  5. SSL VPN - Modes 6:00
  Video Name Time
  1. AAA - Network Security 11:00
  2. AAA - Components 4:00
  3. AAA Protocols - TACACS - RADIUS 8:00
  4. AAA- Cisco Authentication Servers 4:00
  Video Name Time
  1. AAA Authentication - Device Access 3:00
  2. Authentication Local database 10:00
  3. AAA External Servers 3:00
  4. Authentication - External server (TACACS) 12:00
  Video Name Time
  1. Authorization - Device Access 3:00
  2. IOS Privilege Levels 9:00
  3. Local Authorization using Privilege Levels 14:00
  4. IOS Privilege Levels _ Limitations 5:00
  5. Role based CLI Access - RBAC 6:00
  6. RBAC Views - Types 4:00
  7. RBAC Views - LAB1 10:00
  8. Modify RBAC Views - LAB 2 4:00
  9. Modify RBAC Views - LAB 3 6:00
  10. RBAC - Super Views 5:00
  Video Name Time
  1. Web Access - Possible Threats 4:00
  2. Web Based Attacks- 5:00
  3. Web Attack Examples 10:00
  4. Web Security Solutions 5:00
  Video Name Time
  1. Cisco Web Security - WSA-CWS 5:00
  2. What is WSA ? 9:00
  3. WSA- HOw it Works 5:00
  4. WSA Deployment Modes 6:00
  5. WSA models - Physical -Virtual Appliance 5:00
  6. WSA Licensing Options 7:00
  Video Name Time
  1. Email Based Threats 2:00
  2. Cisco Email Security Appliance - ESA 3:00
  Video Name Time
  1. Intrusion Prevention System - IPS 3:00
  2. IDS vs IPS 2:00
  3. Host Based IPS vs Network Based IPS 6:00
  4. IPS Deployment Modes - INline vs Promiscious 3:00
  5. Cisco IPS Solutions 5:00
  6. IPS Threat Detection Methods 7:00
  7. IPS Signature Alarm Types 3:00
  8. IPS Signature Actions 3:00
  9. IPS Evasion Methods - CounterMeasures 6:00
  Video Name Time
  1. What is Network Management 8:00
  2. Past-Present Methods of Network Mangement- PART 1 14:00
  3. Past-Present Methods of Network Mangement- PART 2 7:00
  4. SNMP- Simple Network Mangement Protocol 18:00
  Video Name Time
  1. Challenges - Traditional Management 11:00
  2. Network Automation - Goals 16:00
  3. Types of Network Automation 6:00
  4. What can be Automated - PART 1 12:00
  5. What can be Automated - PART 2 9:00
  6. Impact of Network Automation 8:00
  Video Name Time
  1. Automation Origination Points 8:00
  2. SDN - Software Defined Networking 15:00
  3. SDN Controllers 9:00
  4. Networks Managed by SDN Controllers 13:00
  Video Name Time
  1. Management Plane 3:00
  2. SDN-Management Plane 7:00
  Video Name Time
  1. SDN - Imperative Model 5:00
  2. SDN - Declarative Model 7:00
  3. SDN - Network Design Requirments 9:00
  4. UNderlaY Networks 7:00
  5. Overlay Networks 7:00
  6. SDN Fabric 6:00
  Video Name Time
  1. Application Programming Interface - API 11:00
  2. API Types 4:00
  3. API - With SDN Networks 9:00
  4. NorthBound API 9:00
  5. SouthBound API 8:00
  Video Name Time
  1. Cisco DevNet 5:00
  2. DevNet Certifications 5:00
  3. DevNet Sandbox 6:00
  4. DevNet Sandbox LABS 8:00
  5. Sandbox LAB Access - Reservations 3:00
  Video Name Time
  1. Cisco DNA Center 16:00
  2. DNA Center Appliance 4:00
  3. DNA Center- What can do - PART 1 11:00
  4. DNA Center- What can do - PART 2 13:00
  Video Name Time
  1. Web Service API 8:00
  2. Web Service API - Commonly Used 8:00
  3. REST API 8:00
  Video Name Time
  1. Config Management Tools 6:00
  2. Config Management Tools - Capabilities 9:00
  3. Master-Agent 6:00
  4. Agent Based vs Agentless 7:00
  5. Push-Pull Model 10:00
  6. Configuration Files 5:00
  Video Name Time
  1. PUPPET - Config MGMT Tool 3:00
  2. PUPPET-Master Agent Database 3:00
  3. PUPPET - Manifest 5:00
  4. PUPPET-Module-Forge 6:00
  5. PUPPET-Agent- Agentless 3:00
  6. PUPPET-PULL Model Steps 4:00
  Video Name Time
  1. CHEF- Config MGMT Tool 6:00
  2. CHEF- Terminology 7:00
  Video Name Time
  1. ANSIBLE- COnfig MGMT Tool 8:00
  2. ANSIBLE- Control Station 3:00
  3. ANSIBLE- PlayBook-Inventory 5:00
  4. ANSIBLE- Templates-Variables 7:00
  Video Name Time
  1. API Data Formats 8:00
  2. JSON Overview 8:00
  3. JSON Data Types 7:00
  4. JSON Syntax Rules 3:00
  5. JSON Data Interpretation 7:00

Student Feedback

5 Stars
4 Stars
3 Stars
2 Stars
1 Star
5.0
Rating: 5.0
Overall Rating: Good.

Similar Courses

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

1200+ IT Certification Exams available: Get a free sample of any exam right now!
Try Free Demo

Try Free Demo

  • ABA
  • ACAMS
  • ACFE
  • ACI
  • ACSM
  • Adobe
  • AHIP
  • AHLEI
  • AICPA
  • AIWMI
  • Alfresco
  • Alibaba
  • AMA
  • AndroidATC
  • APBM
  • API
  • APICS
  • Apple
  • Arista
  • ASIS
  • ASQ
  • Atlassian
  • Autodesk
  • Avaya
  • Axis Communications
  • BACB
  • BCS
  • Blockchain
  • Blue Coat
  • Blue Prism
  • C++ Institute
  • CA Technologies
  • CertNexus
  • Checkpoint
  • CIMA
  • Cisco
  • Citrix
  • CIW
  • Cloudera
  • CNCF
  • CompTIA
  • CSA
  • CyberArk
  • Dell
  • DMI
  • DSCI
  • EMC
  • Esri
  • Exin
  • Extreme Networks
  • F5
  • FileMaker
  • FINRA
  • Fortinet
  • GAQM
  • GARP
  • Genesys
  • GIAC
  • Google
  • Guidance Software
  • H3C
  • HashiCorp
  • HFMA
  • HIPAA
  • Hitachi
  • HP
  • HRCI
  • Huawei
  • IAPP
  • IBM
  • IFPUG
  • IIA
  • IIBA
  • Informatica
  • iSAQB
  • ISC
  • iSQI
  • ISTQB
  • ITIL
  • Juniper
  • Lenovo
  • Linux Foundation
  • Logical Operations
  • LPI
  • Magento
  • Marketo
  • McAfee
  • Microsoft
  • Mirantis
  • Mulesoft
  • NACVA
  • NCMA
  • NetSuite
  • Network Appliance
  • NI
  • Nokia
  • Novell
  • Nuage Networks
  • Nutanix
  • OMG
  • Palo Alto Networks
  • Pegasystems
  • PEOPLECERT
  • PMI
  • PRINCE2
  • Pulse Secure
  • Python Institute
  • QlikView
  • RedHat
  • Riverbed
  • RSA
  • Salesforce
  • SANS
  • SAP
  • SAS Institute
  • Scrum
  • SDI
  • ServiceNow
  • Six Sigma
  • Slack
  • SNIA
  • Snowflake
  • SOA
  • Software Certifications
  • SolarWinds
  • Splunk
  • SpringSource
  • Symantec
  • Teradata
  • Test Prep
  • The Open Group
  • Tibco
  • UiPath
  • Unity Certification
  • VCE
  • Veeam
  • Veritas
  • Vmedu
  • VMware
  • WatchGuard
  • WorldatWork
  • Zend
Next Step
Next Step

Try Free Demo

  • Cisco
Next Step
Next Step