Курс Cisco SCOR 1.0

Ciscohttps://cdn.atraining.ru/makeog/Cisco/SCOR/1.0

Implementing and Operating Cisco Security Core Technologies

Даты ближайших онлайн-курсов

Нужен для получения статусов

Подготавливает к сдаче сертификационных экзаменов

Стоимость участия в курсе SCOR 1.0

Стоимость участия для обладателей подписки Knowledge Assurance - 7000 руб., в случае отсутствия - 9100 руб.

Для корпоративных участников цена составит 14650 руб. в случае, если организация участвует в программе Knowledge Assurance, либо 18100 руб., если нет.

Данный курс доступен в индивидуальном формате, стоимость составляет 44000 руб.

Стоимость может быть ниже из-за наших скидок

Если вы планируете обучать более одного человека от организации - свяжитесь с нами для уточнения скидки.110USD31-12-2020

AT-COURSE-SCOR-1.0

Ограничение участия

В данном курсе могут принимать участие только обладатели активной на дату начала события подписки Knowledge Assurance.

Программа курса SCOR 1.0

Модуль 1 - Describing Information Security Concepts

  • Information Security Overview
  • Assets, Vulnerabilities, and Countermeasures
  • Managing Risk
  • Vulnerability Assessment
  • Understanding CVSS

Модуль 2 - Describing Common TCP/IP Attacks

  • Legacy TCP/IP Vulnerabilities
  • IP Vulnerabilities
  • ICMP Vulnerabilities
  • TCP Vulnerabilities
  • UDP Vulnerabilities
  • Attack Surface and Attack Vectors
  • Reconnaissance Attacks
  • Access Attacks
  • Man-In-The-Middle Attacks
  • Denial of Service and Distributed Denial of Service Attacks
  • Reflection and Amplification Attacks
  • Spoofing Attacks
  • DHCP Attacks

Модуль 3 - Describing Common Network Application Attacks

  • Password Attacks
  • DNS-Based Attacks
  • DNS Tunneling
  • Web-Based Attacks
  • HTTP 302 Cushioning
  • Command Injections
  • SQL Injections
  • Cross-Site Scripting and Request Forgery
  • Email-Based Attacks

Модуль 4 - Describing Common Endpoint Attacks

  • Buffer Overflow
  • Malware
  • Reconnaissance Attack
  • Gaining Access and Control
  • Gaining Access via Social Engineering
  • Gaining Access via Web-Based Attacks
  • Exploit Kits and Rootkits
  • Privilege Escalation
  • Post-Exploitation Phase
  • Angler Exploit Kit

Модуль 5 - Describing Network Security Technologies

  • Defense-in-Depth Strategy
  • Defending Across the Attack Continuum
  • Network Segmentation and Virtualization Overview
  • Stateful Firewall Overview
  • Security Intelligence Overview
  • Threat Information Standardization
  • Network-Based Malware Protection Overview
  • IPS Overview
  • Next Generation Firewall Overview
  • Email Content Security Overview
  • Web Content Security Overview
  • Threat Analytic Systems Overview
  • DNS Security Overview
  • Authentication, Authorization, and Accounting Overview
  • Identity and Access Management Overview
  • Virtual Private Network Technology Overview
  • Network Security Device Form Factors Overview

Модуль 6 - Deploying Cisco ASA Firewall

  • Cisco ASA Deployment Types
  • Cisco ASA Interface Security Levels
  • Cisco ASA Objects and Object Groups
  • Network Address Translation
  • Configure Network Settings and NAT on Cisco ASA
  • Cisco ASA Interface ACLs
  • Cisco ASA Global ACLs
  • Cisco ASA Advanced Access Policies
  • Configure Cisco ASA Access Control Policies
  • Cisco ASA High Availability Overview

Модуль 7 - Deploying Cisco Firepower Next-Generation Firewall

  • Cisco Firepower NGFW Deployments
  • Cisco Firepower NGFW Packet Processing and Policies
  • Cisco Firepower NGFW Objects
  • Cisco Firepower NGFW NAT
  • Configure Cisco Firepower NGFW NAT
  • Cisco Firepower NGFW Prefilter Policies
  • Cisco Firepower NGFW Access Control Policies
  • Cisco Firepower NGFW Security Intelligence
  • Configure Cisco Firepower NGFW Access Control Policy
  • Cisco Firepower NGFW Discovery Policies
  • Cisco Firepower NGFW IPS Policies
  • Configure Cisco Firepower NGFW Discovery and IPS Policy
  • Cisco Firepower NGFW Malware and File Policies
  • Configure Cisco NGFW Malware and File Policy

Модуль 8 - Deploying Email Content Security

  • Cisco Email Content Security Overview
  • SMTP Overview
  • Email Pipeline Overview
  • Public and Private Listeners
  • Host Access Table Overview
  • Recipient Access Table Overview
  • Configure Listener, HAT, and RAT on Cisco ESA
  • Mail Policies Overview
  • Protection Against Spam and Graymail
  • Antivirus and Anti-malware Protection
  • Outbreak Filters
  • Content Filters
  • Data Loss Prevention
  • Email Encryption
  • Configure Mail Policies

Модуль 9 - Deploying Web Content Security

  • Cisco WSA Overview
  • Deployment Options
  • Network Users Authentication
  • HTTPS Traffic Decryption
  • Configure Proxy Services, Authentication, and HTTPS Decryption
  • Access Policies and Identification Profiles
  • Acceptable Use Controls Settings
  • Anti-Malware Protection
  • Enforce Acceptable Use Control and Malware Protection

Модуль 10 - Deploying Cisco Umbrella

  • Cisco Umbrella Architecture
  • Deploying Cisco Umbrella
  • Cisco Umbrella Roaming Client
  • Managing Cisco Umbrella
  • Cisco Umbrella Investigate Overview
  • Examine the Umbrella Dashboard
  • Examine Cisco Umbrella Investigate
  • Explore DNS Ransomware Protection by Cisco Umbrella

Модуль 11 - Explaining VPN Technologies and Cryptography Concepts

  • VPN Definition
  • VPN Types
  • Secure Communication and Cryptographic Services
  • Keys in Cryptography
  • Public Key Infrastructure

Модуль 12 - Introducing Cisco Secure Site-to-Site VPN Solutions

  • Site-to-Site VPN Topologies
  • IPsec VPN Overview
  • IPsec Static Crypto Maps
  • IPsec Static Virtual Tunnel Interface
  • Dynamic Multipoint VPN
  • Cisco IOS FlexVPN

Модуль 13 - Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs

  • Cisco IOS VTIs
  • Static VTI Point-to-Point IPsec IKEv2 VPN Configuration
  • Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel

Модуль 14 - Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW

  • Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW
  • Cisco ASA Point-to-Point VPN Configuration
  • Cisco Firepower NGFW Point-to-Point VPN Configuration
  • Configure Point-to-Point VPN Between the Cisco ASA and Cisco Firepower NGFW

Модуль 15 - Introducing Cisco Secure Remote Access VPN Solutions

  • Remote Access VPN Components
  • Remote Access VPN Technologies
  • SSL Overview

Модуль 16 - Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW

  • Remote Access Configuration Concepts
  • Connection Profiles
  • Group Policies
  • Cisco ASA Remote Access VPN Configuration
  • Cisco Firepower NGFW Remote Access VPN Configuration
  • Configure Remote Access VPN on the Cisco Firepower NGFW

Модуль 17 - Explaining Cisco Secure Network Access Solutions

Модуль 18 - Describing 802.1X Authentication

  • 802.1X and EAP
  • EAP Methods
  • Role of RADIUS in 802.1X Communications
  • RADIUS Change of Authorization

Модуль 19 - Configuring 802.1X Authentication

  • Cisco Catalyst Switch 802.1X Configuration
  • Cisco WLC 802.1X Configuration
  • Cisco ISE 802.1X Configuration
  • Supplicant 802.1X Configuration
  • Cisco Central Web Authentication

Модуль 20 - Describing Endpoint Security Technologies

  • Host-Based Personal Firewall
  • Host-Based Anti-Virus
  • Host-Based Intrusion Prevention System
  • Application Whitelists and Blacklists
  • Host-Based Malware Protection
  • Sandboxing Overview
  • File Integrity Checking

Модуль 21 - Deploying Cisco AMP for Endpoints

  • Cisco AMP for Endpoints Architecture
  • Cisco AMP for Endpoints Engines
  • Retrospective Security with Cisco AMP
  • Cisco AMP Device and File Trajectory
  • Managing Cisco AMP for Endpoints
  • Explore Cisco AMP for Endpoints
  • Perform Endpoint Analysis Using AMP for Endpoints Console
  • Explore File Ransomware Protection by Cisco AMP for Endpoints Console

Модуль 22 - Introducing Network Infrastructure Protection

  • Identifying Network Device Planes
  • Control Plane Security Controls
  • Management Plane Security Controls
  • Network Telemetry
  • Layer 2 Data Plane Security Controls
  • Layer 3 Data Plane Security Controls

Модуль 23 - Deploying Control Plane Security Controls

  • Infrastructure ACLs
  • Control Plane Policing
  • Control Plane Protection
  • Routing Protocol Security

Модуль 24 - Deploying Layer 2 Data Plane Security Controls

  • Overview of Layer 2 Data Plane Security Controls
  • VLAN-Based Attacks Mitigation
  • STP Attacks Mitigation
  • Port Security
  • Private VLANs
  • DHCP Snooping
  • ARP Inspection
  • Storm Control
  • MACsec Encryption

Модуль 25 - Deploying Layer 3 Data Plane Security Controls

  • Infrastructure Antispoofing ACLs
  • Unicast Reverse Path Forwarding
  • IP Source Guard

Модуль 26 - Deploying Management Plane Security Controls

  • Cisco Secure Management Access
  • Simple Network Management Protocol Version 3
  • Secure Access to Cisco Devices
  • AAA for Management Access

Модуль 27 - Deploying Traffic Telemetry Methods

  • Network Time Protocol
  • Device and Network Events Logging and Export
  • Network Traffic Monitoring Using NetFlow

Модуль 28 - Deploying Cisco Stealthwatch Enterprise

  • Cisco Stealthwatch Offerings Overview
  • Cisco Stealthwatch Enterprise Required Components
  • Flow Stitching and Deduplication
  • Stealthwatch Enterprise Optional Components
  • Stealthwatch Enterprise and ISE Integration
  • Cisco Stealthwatch with Cognitive Analytics
  • Cisco Encrypted Traffic Analytics
  • Host Groups
  • Security Events and Alarms
  • Host, Role, and Default Policies
  • Explore Cisco Stealthwatch Enterprise v6.9.3
  • Explore CTA in Stealthwatch Enterprise v7.0

Модуль 29 - Describing Cloud and Common Cloud Attacks

  • Evolution of Cloud Computing
  • Cloud Service Models
  • Security Responsibilities in Cloud
  • Cloud Deployment Models
  • Common Security Threats in Cloud
  • Patch Management in the Cloud
  • Security Assessment in the Cloud

Модуль 30 - Securing the Cloud

  • Cisco Threat-Centric Approach to Network Security
  • Cloud Physical Environment Security
  • Application and Workload Security
  • Cloud Management and API Security
  • Network Function Virtualization (NFV) and Virtual Network Functions (VNF)
  • Cisco NFV Examples
  • Reporting and Threat Visibility in Cloud
  • Cloud Access Security Broker
  • Cisco CloudLock
  • OAuth and OAuth Attacks
  • Explore the Cisco Cloudlock Dashboard and User Security
  • Explore Cisco Cloudlock Application and Data Security

Модуль 31 - Deploying Cisco Stealthwatch Cloud

  • Cisco Stealthwatch Cloud for Public Cloud Monitoring
  • Cisco Stealthwatch Cloud for Private Network Monitoring
  • Cisco Stealthwatch Cloud Operations
  • Explore Cisco Stealthwatch Cloud
  • Explore Stealthwatch Cloud Alert Settings, Watchlists, and Sensors

Модуль 32 - Describing SDN

  • Software-Defined Networking Concepts
  • Network Programmability and Automation
  • Cisco Platforms and APIs
  • Basic Python Scripts for Automation

Стандартная продолжительность курса

10 дней

Фактическая продолжительность может быть иной - например субботние курсы обычно читаются дольше, и вместо 40 ак.часов там бывает 56 - для уточнения информации по конкретной группе посмотрите расписание.

Что после курса?