350-701: Implementing and Operating Cisco Security Core Technologies

Best Seller 260 Lectures 26h 55m
Prepare for your Cisco examination with our training course. The 350-701 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to Cisco certification exam. Pass the Cisco 350-701 test with flying colors.
$14.99$24.99
Curriculum For This Course

  • 1. CCNP Security Certifications 7m
  • 2. CCNP SCOR - 350-701 1m
  • 3. SCOR 350-701 Contents 7m
  • 1. Network Security Terminology 6m
  • 2. Goals of Network Security 10m
  • 3. Threat Types - Mitigation 9m
  • 4. Assets - Classification of Assets 6m
  • 5. Classify Counter Measures 4m
  • 6. Classify Vulnerabilities 2m
  • 7. Network Security - Design Principles 10m
  • 1. Motivations behind Network Attacks 3m
  • 2. Social Engineering Attacks 4m
  • 3. Phishing Attacks 4m
  • 4. Denial of Service Attacks - DoS 5m
  • 5. Distributed Denial of Service Attakcs - DDoS 4m
  • 6. Spoofing Attacks 4m
  • 7. Spoofing Attacks - Mitigation 4m
  • 8. Man in the Middle Attacks -MiTM 2m
  • 9. Password Attacks 5m
  • 10. Password Attacks - Mitigation 4m
  • 11. Reflector Attacks 2m
  • 12. Amplification Attacks 2m
  • 13. Reconnaissance Attacks 5m
  • 14. Reconnaissance Attacks - Mitigation 2m
  • 1. Malicious Codes - VIRUS 2m
  • 2. Malicious Codes - WORMS 1m
  • 3. Malicious Codes - TROJAN HORSES 1m
  • 4. Hacking 1m
  • 5. Hackers - Script Kiddies 1m
  • 6. Malware Service - DARKNET 1m
  • 1. AAA - Network Security 11m
  • 2. Cisco Telemetry Services 4m
  • 3. Firewall 8m
  • 4. Intrusion Prevention System - IPS 4m
  • 5. Virtual Private Networks 4m
  • 6. Next Generation Firewalls 6m
  • 1. Cisco Lab Options 8m
  • 2. About GNS3 4m
  • 3. Installing GNS3 - Windows 7m
  • 4. GNS3 - IOS Images 6m
  • 5. Default Topology - GNS3 - IOS initial Configs 5m
  • 6. IOS Default Topology 9m
  • 7. GNS3 Topology-HOST Computer 6m
  • 8. GNS3 - VMware Setup 9m
  • 9. GNS3 - IOSv L2-L3 6m
  • 10. GNS3 - ASAv Setup 4m
  • 11. GNS3 - IOU-L2-L3 3m
  • 1. Network Infrastructure Protection 5m
  • 2. Identify Network Device Planes 2m
  • 3. Data Plane 6m
  • 4. Control Plane 3m
  • 5. Management Plane 3m
  • 1. Inband Vs OutBand Management 7m
  • 2. Remote Access - TELNET 6m
  • 3. Remote Access - SSH 9m
  • 1. Cisco Telemetry Services 4m
  • 2. Device- Network Events Logging 10m
  • 3. Syslog - Terminal Logging 7m
  • 4. Network Time Protocol 7m
  • 5. NTP Stratum Value 4m
  • 6. NTP Configuration - LAB 9m
  • 1. Control Plane Security - Possible Threats 9m
  • 2. Routing Protocol Authentication 12m
  • 3. Control Plane Policing - CoPP 7m
  • 4. Class-Map - Policy Map - Hierarchy 5m
  • 5. CoPP - Configuration Examples 12m
  • 1. Switch Security - Overview 2m
  • 2. Disable Unused Ports 1m
  • 3. Dynamic Trunking Protocol - DTP 8m
  • 4. DTP Vulnerabilities - Mitigation 2m
  • 5. VLAN Hopping Attacks - Mitigation 5m
  • 6. Cisco Discovery Protocol - CDP 18m
  • 7. Link Layer Discovery Protocol - LLDP 3m
  • 8. CDP- LLDP Vulnerabilities - Mitigation 2m
  • 1. MAC Flooding Attack - Port Security 12m
  • 2. MAC Spoofing Attack - Port Security 7m
  • 3. Port Security - Configuration 11m
  • 4. Spanning Tree Port Fast 7m
  • 5. Native VLAN 8m
  • 6. DHCP Spoofing Attack - DHCP Spoofing 8m
  • 7. DHCP Snooping - Configuration 16m
  • 8. DHCP Starvation Attack - Mitigation 2m
  • 9. ARP Spoofing Attack - DAI 12m
  • 10. Dynamic ARP Inspection - Configuration 12m
  • 11. Protected Ports- Private VLAN Edge 3m
  • 12. Private VLAN 9m
  • 13. Private VLAN - Configuration 5m
  • 14. Private VLAN - LAB 20m
  • 1. What is Firewall 8m
  • 2. Statefull Packet Filtering 8m
  • 3. Stateless Packet Filtering 4m
  • 4. Application Level Gateways - Proxy Servers 5m
  • 5. Next Generation Firewalls 6m
  • 6. FIrewall Vendors in Market 6m
  • 1. Cisco Statefull Firewalls - IOS - ASA 3m
  • 2. ASA Supported Features _ PART1 9m
  • 3. ASA Supported Features _ PART2 11m
  • 4. ASS Compare Models 7m
  • 1. Manage Cisco CLI - ASA - GUI 3m
  • 2. Basic CLI Modes - Commands 4m
  • 3. ASA Security Levels 10m
  • 4. ASA Interface Configurations 5m
  • 5. ASA Security Policies - Default 11m
  • 6. ASA Routing 5m
  • 1. ASA ACls - Overview 9m
  • 2. ASA ACLS - Basic Example 7m
  • 3. Traffic Between Same Security Levels 3m
  • 4. ACL Object Groups 10m
  • 5. ACL Object Groups - LAB 12m
  • 1. PRivate IP - Public IP 5m
  • 2. What is NAT ? 3m
  • 3. NAT Types 6m
  • 4. Dynamic NAT - on ASA 10m
  • 5. Dynamic PAT- ASA 5m
  • 6. Dynamic PAT - with Exit interface 5m
  • 7. Dynamic NAT-PAT Combination 2m
  • 8. Static NAT - ASA 12m
  • 9. Static PAT- ASA 11m
  • 1. IOS - Zone Based Firewall 3m
  • 2. ZBF - Configuration Overview 4m
  • 3. ZBF - Security Zones 3m
  • 4. ZBF - Default Flow 3m
  • 5. Class-Map - Policy Map - Hierarchy 5m
  • 6. ZBF - Classify Traffic using Class-Maps 6m
  • 7. ZBF- Class-map Configuration 5m
  • 8. ZBF - POlicy Map - Zone Pairs 11m
  • 1. What is Cryptography 3m
  • 2. Goals of Cryptography 3m
  • 3. Hashing-How it Works 3m
  • 4. Hashing with HMAC 3m
  • 5. What is Encryption - Decryption 1m
  • 6. Encryption Algorithms - Symmetric vs Assymetric 5m
  • 7. Cryptanalysis - Attacks 4m
  • 8. Asymmetric Encryption - Drawbacks 3m
  • 9. Public Key Infrastructure - PKI 4m
  • 1. Virutal Private Network - Introduction 5m
  • 2. VPN Types - Site to Site / Remote Access 4m
  • 3. VPN Logical Topologies 1m
  • 4. VPN Default Lab Setup - Routers 5m
  • 1. What is IPSec ? 3m
  • 2. IPsec Security Services 7m
  • 3. IPSec Modes - Tunnel vs Transport 5m
  • 1. How IPsec VPN Works 5m
  • 2. Step-1 - Interesting Traffic 3m
  • 3. Step-2 IKE Phase-1 8m
  • 4. Step-3 - IKE Phase 2 9m
  • 5. IKE Phase 2 - Configuration/ Verification 7m
  • 1. Remote Access VPN 3m
  • 2. What is SSL-TLS 3m
  • 3. How SSL-TLS Works 8m
  • 4. What is SSL VPN 4m
  • 5. SSL VPN - Modes 6m
  • 1. AAA - Network Security 11m
  • 2. AAA - Components 4m
  • 3. AAA Protocols - TACACS - RADIUS 8m
  • 4. AAA- Cisco Authentication Servers 4m
  • 1. AAA Authentication - Device Access 3m
  • 2. Authentication Local database 10m
  • 3. AAA External Servers 3m
  • 4. Authentication - External server (TACACS) 12m
  • 1. Authorization - Device Access 3m
  • 2. IOS Privilege Levels 9m
  • 3. Local Authorization using Privilege Levels 14m
  • 4. IOS Privilege Levels _ Limitations 5m
  • 5. Role based CLI Access - RBAC 6m
  • 6. RBAC Views - Types 4m
  • 7. RBAC Views - LAB1 10m
  • 8. Modify RBAC Views - LAB 2 4m
  • 9. Modify RBAC Views - LAB 3 6m
  • 10. RBAC - Super Views 5m
  • 1. Web Access - Possible Threats 4m
  • 2. Web Based Attacks- 5m
  • 3. Web Attack Examples 10m
  • 4. Web Security Solutions 5m
  • 1. Cisco Web Security - WSA-CWS 5m
  • 2. What is WSA ? 9m
  • 3. WSA- HOw it Works 5m
  • 4. WSA Deployment Modes 6m
  • 5. WSA models - Physical -Virtual Appliance 5m
  • 6. WSA Licensing Options 7m
  • 1. Email Based Threats 2m
  • 2. Cisco Email Security Appliance - ESA 3m
  • 1. Intrusion Prevention System - IPS 3m
  • 2. IDS vs IPS 2m
  • 3. Host Based IPS vs Network Based IPS 6m
  • 4. IPS Deployment Modes - INline vs Promiscious 3m
  • 5. Cisco IPS Solutions 5m
  • 6. IPS Threat Detection Methods 7m
  • 7. IPS Signature Alarm Types 3m
  • 8. IPS Signature Actions 3m
  • 9. IPS Evasion Methods - CounterMeasures 6m
  • 1. What is Network Management 8m
  • 2. Past-Present Methods of Network Mangement- PART 1 14m
  • 3. Past-Present Methods of Network Mangement- PART 2 7m
  • 4. SNMP- Simple Network Mangement Protocol 18m
  • 1. Challenges - Traditional Management 11m
  • 2. Network Automation - Goals 16m
  • 3. Types of Network Automation 6m
  • 4. What can be Automated - PART 1 12m
  • 5. What can be Automated - PART 2 9m
  • 6. Impact of Network Automation 8m
  • 1. Automation Origination Points 8m
  • 2. SDN - Software Defined Networking 15m
  • 3. SDN Controllers 9m
  • 4. Networks Managed by SDN Controllers 13m
  • 1. Management Plane 3m
  • 2. SDN-Management Plane 7m
  • 3. SDN-Control Plane - Data Plane 6m
  • 1. SDN - Imperative Model 5m
  • 2. SDN - Declarative Model 7m
  • 3. SDN - Network Design Requirments 9m
  • 4. UNderlaY Networks 7m
  • 5. Overlay Networks 7m
  • 6. SDN Fabric 6m
  • 1. Application Programming Interface - API 11m
  • 2. API Types 4m
  • 3. API - With SDN Networks 9m
  • 4. NorthBound API 9m
  • 5. SouthBound API 8m
  • 1. Cisco DevNet 5m
  • 2. DevNet Certifications 5m
  • 3. DevNet Sandbox 6m
  • 4. DevNet Sandbox LABS 8m
  • 5. Sandbox LAB Access - Reservations 3m
  • 1. Cisco DNA Center 16m
  • 2. DNA Center Appliance 4m
  • 3. DNA Center- What can do - PART 1 11m
  • 4. DNA Center- What can do - PART 2 13m
  • 1. Web Service API 8m
  • 2. Web Service API - Commonly Used 8m
  • 3. REST API 8m
  • 1. Config Management Tools 6m
  • 2. Config Management Tools - Capabilities 9m
  • 3. Master-Agent 6m
  • 4. Agent Based vs Agentless 7m
  • 5. Push-Pull Model 10m
  • 6. Configuration Files 5m
  • 1. PUPPET - Config MGMT Tool 3m
  • 2. PUPPET-Master Agent Database 3m
  • 3. PUPPET - Manifest 5m
  • 4. PUPPET-Module-Forge 6m
  • 5. PUPPET-Agent- Agentless 3m
  • 6. PUPPET-PULL Model Steps 4m
  • 1. CHEF- Config MGMT Tool 6m
  • 2. CHEF- Terminology 7m
  • 1. ANSIBLE- COnfig MGMT Tool 8m
  • 2. ANSIBLE- Control Station 3m
  • 3. ANSIBLE- PlayBook-Inventory 5m
  • 4. ANSIBLE- Templates-Variables 7m
  • 1. API Data Formats 8m
  • 2. JSON Overview 8m
  • 3. JSON Data Types 7m
  • 4. JSON Syntax Rules 3m
  • 5. JSON Data Interpretation 7m

Hot Exams

How to Open Test Engine .dumpsqueen Files

Use FREE DumpsQueen Test Engine player to open .dumpsqueen files

DumpsQueen Test Engine

Windows

 safe checkout

Your purchase with DumpsQueen.com is safe and fast.

The DumpsQueen.com website is protected by 256-bit SSL from Cloudflare, the leader in online security.

Need Help Assistance?