350-701: Implementing and Operating Cisco Security Core Technologies
Your Cisco 350-701 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the 350-701 certification test. Ace your Cisco 350-701 at the first attempt and obtain the Implementing and Operating Cisco Security Core Technologies credential with ease.
Curriculum for 350-701 Video Course
Cisco Certifications - CCNP SCOR
Video Name | Time | |
---|---|---|
1. Cisco Certification Updates - FEB 2020 | 11:00 | |
2. Cisco Re-Certifications | 1:00 | |
3. CCNP Certifications | 1:00 | |
4. CCIE Certifications | 2:00 | |
5. Cisco Certification Migration Options | 6:00 | |
6. CCNP Required Exams | 3:00 |
Video Name | Time | |
---|---|---|
1. CCNP Security Certifications | 7:00 | |
2. CCNP SCOR - 350-701 | 1:00 | |
3. SCOR 350-701 Contents | 7:00 |
Video Name | Time | |
---|---|---|
1. Network Security Terminology | 6:00 | |
2. Goals of Network Security | 10:00 | |
3. Threat Types - Mitigation | 9:00 | |
4. Assets - Classification of Assets | 6:00 | |
5. Classify Counter Measures | 4:00 | |
6. Classify Vulnerabilities | 2:00 | |
7. Network Security - Design Principles | 10:00 |
Video Name | Time | |
---|---|---|
1. Motivations behind Network Attacks | 3:00 | |
2. Social Engineering Attacks | 4:00 | |
3. Phishing Attacks | 4:00 | |
4. Social Engineering Attacks | 4:00 | |
5. Denial of Service Attacks - DoS | 5:00 | |
6. Distributed Denial of Service Attakcs - DDoS | 4:00 | |
7. Spoofing Attacks | 4:00 | |
8. Spoofing Attacks - Mitigation | 4:00 | |
9. Man in the Middle Attacks -MiTM | 2:00 | |
10. Password Attacks | 5:00 | |
11. Password Attacks - Mitigation | 4:00 | |
12. Reflector Attacks | 2:00 | |
13. Amplification Attacks | 2:00 | |
14. Reconnaissance Attacks | 5:00 | |
15. Reconnaissance Attacks - Mitigation | 2:00 |
Video Name | Time | |
---|---|---|
1. Malicious Codes - VIRUS | 2:00 | |
2. Malicious Codes - WORMS | 1:00 | |
3. Malicious Codes - TROJAN HORSES | 1:00 | |
4. Hacking | 1:00 | |
5. Hackers - Script Kiddies | 1:00 | |
6. Malware Service - DARKNET | 1:00 |
Video Name | Time | |
---|---|---|
1. AAA - Network Security | 11:00 | |
2. Cisco Telemetry Services | 4:00 | |
3. Firewall | 8:00 | |
4. Intrusion Prevention System - IPS | 4:00 | |
5. Virtual Private Networks | 4:00 | |
6. Next Generation Firewalls | 6:00 |
Video Name | Time | |
---|---|---|
1. Cisco Lab Options | 8:00 | |
2. About GNS3 | 4:00 | |
3. Installing GNS3 - Windows | 7:00 | |
4. GNS3 - IOS Images | 6:00 | |
5. Default Topology - GNS3 - IOS initial Configs | 5:00 | |
6. IOS Default Topology | 9:00 | |
7. GNS3 Topology-HOST Computer | 6:00 | |
8. GNS3 - VMware Setup | 9:00 | |
9. GNS3 - IOSv L2-L3 | 6:00 | |
10. GNS3 - ASAv Setup | 4:00 | |
11. GNS3 - IOU-L2-L3 | 3:00 |
Video Name | Time | |
---|---|---|
1. Network Infrastructure Protection | 5:00 | |
2. Identify Network Device Planes | 2:00 | |
3. Data Plane | 6:00 | |
4. Control Plane | 3:00 | |
5. Management Plane | 3:00 |
Video Name | Time | |
---|---|---|
1. Inband Vs OutBand Management | 7:00 | |
2. Remote Access - TELNET | 6:00 | |
3. Remote Access - SSH | 9:00 |
Video Name | Time | |
---|---|---|
1. Cisco Telemetry Services | 4:00 | |
2. Device- Network Events Logging | 10:00 | |
3. Syslog - Terminal Logging | 7:00 | |
4. Network Time Protocol | 7:00 | |
5. NTP Stratum Value | 4:00 | |
6. NTP Configuration - LAB | 9:00 |
Video Name | Time | |
---|---|---|
1. Control Plane Security - Possible Threats | 9:00 | |
2. Routing Protocol Authentication | 12:00 | |
3. Control Plane Policing - CoPP | 7:00 | |
4. Class-Map - Policy Map - Hierarchy | 5:00 | |
5. CoPP - Configuration Examples | 12:00 |
Video Name | Time | |
---|---|---|
1. Switch Security - Overview | 2:00 | |
2. Disable Unused Ports | 1:00 | |
3. Dynamic Trunking Protocol - DTP | 8:00 | |
4. DTP Vulnerabilities - Mitigation | 2:00 | |
5. VLAN Hopping Attacks - Mitigation | 5:00 | |
6. Cisco Discovery Protocol - CDP | 18:00 | |
7. Link Layer Discovery Protocol - LLDP | 3:00 | |
8. CDP- LLDP Vulnerabilities - Mitigation | 2:00 |
Video Name | Time | |
---|---|---|
1. MAC Flooding Attack - Port Security | 12:00 | |
2. MAC Spoofing Attack - Port Security | 7:00 | |
3. Port Security - Configuration | 11:00 | |
4. Spanning Tree Port Fast | 7:00 | |
5. Native VLAN | 8:00 | |
6. DHCP Spoofing Attack - DHCP Spoofing | 8:00 | |
7. DHCP Snooping - Configuration | 16:00 | |
8. DHCP Starvation Attack - Mitigation | 2:00 | |
9. ARP Spoofing Attack - DAI | 12:00 | |
10. Dynamic ARP Inspection - Configuration | 12:00 | |
11. Protected Ports- Private VLAN Edge | 3:00 | |
12. Private VLAN | 9:00 | |
13. Private VLAN - Configuration | 5:00 | |
14. Private VLAN - LAB | 20:00 |
Video Name | Time | |
---|---|---|
1. What is Firewall | 8:00 | |
2. Statefull Packet Filtering | 8:00 | |
3. Stateless Packet Filtering | 4:00 | |
4. Application Level Gateways - Proxy Servers | 5:00 | |
5. Next Generation Firewalls | 6:00 | |
6. FIrewall Vendors in Market | 6:00 |
Video Name | Time | |
---|---|---|
1. Cisco Statefull Firewalls - IOS - ASA | 3:00 | |
2. ASA Supported Features _ PART1 | 9:00 | |
3. ASA Supported Features _ PART2 | 11:00 | |
4. ASS Compare Models | 7:00 |
Video Name | Time | |
---|---|---|
1. Manage Cisco CLI - ASA - GUI | 3:00 | |
2. Basic CLI Modes - Commands | 4:00 | |
3. ASA Security Levels | 10:00 | |
4. ASA Interface Configurations | 5:00 | |
5. ASA Security Policies - Default | 11:00 | |
6. ASA Routing | 5:00 |
Video Name | Time | |
---|---|---|
1. ASA ACls - Overview | 9:00 | |
2. ASA ACLS - Basic Example | 7:00 | |
3. Traffic Between Same Security Levels | 3:00 | |
4. ACL Object Groups | 10:00 | |
5. ACL Object Groups - LAB | 12:00 |
Video Name | Time | |
---|---|---|
1. PRivate IP - Public IP | 5:00 | |
2. What is NAT ? | 3:00 | |
3. NAT Types | 6:00 | |
4. Dynamic NAT - on ASA | 10:00 | |
5. Dynamic PAT- ASA | 5:00 | |
6. Dynamic PAT - with Exit interface | 5:00 | |
7. Dynamic NAT-PAT Combination | 2:00 | |
8. Static NAT - ASA | 12:00 | |
9. Static PAT- ASA | 11:00 |
Video Name | Time | |
---|---|---|
1. IOS - Zone Based Firewall | 3:00 | |
2. ZBF - Configuration Overview | 4:00 | |
3. ZBF - Security Zones | 3:00 | |
4. ZBF - Default Flow | 3:00 | |
5. Class-Map - Policy Map - Hierarchy | 5:00 | |
6. ZBF - Classify Traffic using Class-Maps | 6:00 | |
7. ZBF- Class-map Configuration | 5:00 | |
8. ZBF - POlicy Map - Zone Pairs | 11:00 |
Video Name | Time | |
---|---|---|
1. What is Cryptography | 3:00 | |
2. Goals of Cryptography | 3:00 | |
3. Hashing-How it Works | 3:00 | |
4. Hashing with HMAC | 3:00 | |
5. What is Encryption - Decryption | 1:00 | |
6. Encryption Algorithms - Symmetric vs Assymetric | 5:00 | |
7. Cryptanalysis - Attacks | 4:00 | |
8. Asymmetric Encryption - Drawbacks | 3:00 | |
9. Public Key Infrastructure - PKI | 4:00 |
Video Name | Time | |
---|---|---|
1. Virutal Private Network - Introduction | 5:00 | |
2. VPN Types - Site to Site / Remote Access | 4:00 | |
3. VPN Logical Topologies | 1:00 | |
4. VPN Default Lab Setup - Routers | 5:00 |
Video Name | Time | |
---|---|---|
1. What is IPSec ? | 3:00 | |
2. IPsec Security Services | 7:00 | |
3. IPSec Modes - Tunnel vs Transport | 5:00 |
Video Name | Time | |
---|---|---|
1. How IPsec VPN Works | 5:00 | |
2. Step-1 - Interesting Traffic | 3:00 | |
3. Step-2 IKE Phase-1 | 8:00 | |
4. Step-3 - IKE Phase 2 | 9:00 | |
5. IKE Phase 2 - Configuration/ Verification | 7:00 |
Video Name | Time | |
---|---|---|
1. Remote Access VPN | 3:00 | |
2. What is SSL-TLS | 3:00 | |
3. How SSL-TLS Works | 8:00 | |
4. What is SSL VPN | 4:00 | |
5. SSL VPN - Modes | 6:00 |
Video Name | Time | |
---|---|---|
1. AAA - Network Security | 11:00 | |
2. AAA - Components | 4:00 | |
3. AAA Protocols - TACACS - RADIUS | 8:00 | |
4. AAA- Cisco Authentication Servers | 4:00 |
Video Name | Time | |
---|---|---|
1. AAA Authentication - Device Access | 3:00 | |
2. Authentication Local database | 10:00 | |
3. AAA External Servers | 3:00 | |
4. Authentication - External server (TACACS) | 12:00 |
Video Name | Time | |
---|---|---|
1. Authorization - Device Access | 3:00 | |
2. IOS Privilege Levels | 9:00 | |
3. Local Authorization using Privilege Levels | 14:00 | |
4. IOS Privilege Levels _ Limitations | 5:00 | |
5. Role based CLI Access - RBAC | 6:00 | |
6. RBAC Views - Types | 4:00 | |
7. RBAC Views - LAB1 | 10:00 | |
8. Modify RBAC Views - LAB 2 | 4:00 | |
9. Modify RBAC Views - LAB 3 | 6:00 | |
10. RBAC - Super Views | 5:00 |
Video Name | Time | |
---|---|---|
1. Web Access - Possible Threats | 4:00 | |
2. Web Based Attacks- | 5:00 | |
3. Web Attack Examples | 10:00 | |
4. Web Security Solutions | 5:00 |
Video Name | Time | |
---|---|---|
1. Cisco Web Security - WSA-CWS | 5:00 | |
2. What is WSA ? | 9:00 | |
3. WSA- HOw it Works | 5:00 | |
4. WSA Deployment Modes | 6:00 | |
5. WSA models - Physical -Virtual Appliance | 5:00 | |
6. WSA Licensing Options | 7:00 |
Video Name | Time | |
---|---|---|
1. Email Based Threats | 2:00 | |
2. Cisco Email Security Appliance - ESA | 3:00 |
Video Name | Time | |
---|---|---|
1. Intrusion Prevention System - IPS | 3:00 | |
2. IDS vs IPS | 2:00 | |
3. Host Based IPS vs Network Based IPS | 6:00 | |
4. IPS Deployment Modes - INline vs Promiscious | 3:00 | |
5. Cisco IPS Solutions | 5:00 | |
6. IPS Threat Detection Methods | 7:00 | |
7. IPS Signature Alarm Types | 3:00 | |
8. IPS Signature Actions | 3:00 | |
9. IPS Evasion Methods - CounterMeasures | 6:00 |
Video Name | Time | |
---|---|---|
1. What is Network Management | 8:00 | |
2. Past-Present Methods of Network Mangement- PART 1 | 14:00 | |
3. Past-Present Methods of Network Mangement- PART 2 | 7:00 | |
4. SNMP- Simple Network Mangement Protocol | 18:00 |
Video Name | Time | |
---|---|---|
1. Challenges - Traditional Management | 11:00 | |
2. Network Automation - Goals | 16:00 | |
3. Types of Network Automation | 6:00 | |
4. What can be Automated - PART 1 | 12:00 | |
5. What can be Automated - PART 2 | 9:00 | |
6. Impact of Network Automation | 8:00 |
Video Name | Time | |
---|---|---|
1. Automation Origination Points | 8:00 | |
2. SDN - Software Defined Networking | 15:00 | |
3. SDN Controllers | 9:00 | |
4. Networks Managed by SDN Controllers | 13:00 |
Video Name | Time | |
---|---|---|
1. Management Plane | 3:00 | |
2. SDN-Management Plane | 7:00 |
Video Name | Time | |
---|---|---|
1. SDN - Imperative Model | 5:00 | |
2. SDN - Declarative Model | 7:00 | |
3. SDN - Network Design Requirments | 9:00 | |
4. UNderlaY Networks | 7:00 | |
5. Overlay Networks | 7:00 | |
6. SDN Fabric | 6:00 |
Video Name | Time | |
---|---|---|
1. Application Programming Interface - API | 11:00 | |
2. API Types | 4:00 | |
3. API - With SDN Networks | 9:00 | |
4. NorthBound API | 9:00 | |
5. SouthBound API | 8:00 |
Video Name | Time | |
---|---|---|
1. Cisco DevNet | 5:00 | |
2. DevNet Certifications | 5:00 | |
3. DevNet Sandbox | 6:00 | |
4. DevNet Sandbox LABS | 8:00 | |
5. Sandbox LAB Access - Reservations | 3:00 |
Video Name | Time | |
---|---|---|
1. Cisco DNA Center | 16:00 | |
2. DNA Center Appliance | 4:00 | |
3. DNA Center- What can do - PART 1 | 11:00 | |
4. DNA Center- What can do - PART 2 | 13:00 |
Video Name | Time | |
---|---|---|
1. Web Service API | 8:00 | |
2. Web Service API - Commonly Used | 8:00 | |
3. REST API | 8:00 |
Video Name | Time | |
---|---|---|
1. Config Management Tools | 6:00 | |
2. Config Management Tools - Capabilities | 9:00 | |
3. Master-Agent | 6:00 | |
4. Agent Based vs Agentless | 7:00 | |
5. Push-Pull Model | 10:00 | |
6. Configuration Files | 5:00 |
Video Name | Time | |
---|---|---|
1. PUPPET - Config MGMT Tool | 3:00 | |
2. PUPPET-Master Agent Database | 3:00 | |
3. PUPPET - Manifest | 5:00 | |
4. PUPPET-Module-Forge | 6:00 | |
5. PUPPET-Agent- Agentless | 3:00 | |
6. PUPPET-PULL Model Steps | 4:00 |
Video Name | Time | |
---|---|---|
1. CHEF- Config MGMT Tool | 6:00 | |
2. CHEF- Terminology | 7:00 |
Video Name | Time | |
---|---|---|
1. ANSIBLE- COnfig MGMT Tool | 8:00 | |
2. ANSIBLE- Control Station | 3:00 | |
3. ANSIBLE- PlayBook-Inventory | 5:00 | |
4. ANSIBLE- Templates-Variables | 7:00 |
Video Name | Time | |
---|---|---|
1. API Data Formats | 8:00 | |
2. JSON Overview | 8:00 | |
3. JSON Data Types | 7:00 | |
4. JSON Syntax Rules | 3:00 | |
5. JSON Data Interpretation | 7:00 |
Student Feedback
Similar Courses
Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.
Try Free Demo
Try Free Demo
Get 10% Discount on Your Purchase When You Sign Up for Email
Enter Your Email Address to Receive Your 10%
OFF Discount Code Plus... Our Exclusive Weekly Deals