-
350-701 SCOR Implementing and Operating Cisco Security Core Technologies (SCOR)
Describing Information Security Concepts*
5-
Lecture1.1
-
Lecture1.2
-
Lecture1.3
-
Lecture1.4
-
Lecture1.5
-
-
Describing Common TCP/IP Attacks
13-
Lecture2.1
-
Lecture2.2
-
Lecture2.3
-
Lecture2.4
-
Lecture2.5
-
Lecture2.6
-
Lecture2.7
-
Lecture2.8
-
Lecture2.9
-
Lecture2.10
-
Lecture2.11
-
Lecture2.12
-
Lecture2.13
-
-
Describing Common Network Application Attacks*
9-
Lecture3.1
-
Lecture3.2
-
Lecture3.3
-
Lecture3.4
-
Lecture3.5
-
Lecture3.6
-
Lecture3.7
-
Lecture3.8
-
Lecture3.9
-
-
Describing Common Endpoint Attacks
10-
Lecture4.1
-
Lecture4.2
-
Lecture4.3
-
Lecture4.4
-
Lecture4.5
-
Lecture4.6
-
Lecture4.7
-
Lecture4.8
-
Lecture4.9
-
Lecture4.10
-
-
Describing Network Security Technologies
17-
Lecture5.1
-
Lecture5.2
-
Lecture5.3
-
Lecture5.4
-
Lecture5.5
-
Lecture5.6
-
Lecture5.7
-
Lecture5.8
-
Lecture5.9
-
Lecture5.10
-
Lecture5.11
-
Lecture5.12
-
Lecture5.13
-
Lecture5.14
-
Lecture5.15
-
Lecture5.16
-
Lecture5.17
-
-
Deploying Cisco ASA Firewall
8-
Lecture6.1
-
Lecture6.2
-
Lecture6.3
-
Lecture6.4
-
Lecture6.5
-
Lecture6.6
-
Lecture6.7
-
Lecture6.8
-
-
Deploying Cisco Firepower Next-Generation Firewall
10-
Lecture7.1
-
Lecture7.2
-
Lecture7.3
-
Lecture7.4
-
Lecture7.5
-
Lecture7.6
-
Lecture7.7
-
Lecture7.8
-
Lecture7.9
-
Lecture7.10
-
-
Deploying Email Content Security
13-
Lecture8.1
-
Lecture8.2
-
Lecture8.3
-
Lecture8.4
-
Lecture8.5
-
Lecture8.6
-
Lecture8.7
-
Lecture8.8
-
Lecture8.9
-
Lecture8.10
-
Lecture8.11
-
Lecture8.12
-
Lecture8.13
-
-
Deploying Web Content Security
7-
Lecture9.1
-
Lecture9.2
-
Lecture9.3
-
Lecture9.4
-
Lecture9.5
-
Lecture9.6
-
Lecture9.7
-
-
Deploying Cisco Umbrella
5-
Lecture10.1
-
Lecture10.2
-
Lecture10.3
-
Lecture10.4
-
Lecture10.5
-
-
Explaining VPN Technologies and Cryptography
5-
Lecture11.1
-
Lecture11.2
-
Lecture11.3
-
Lecture11.4
-
Lecture11.5
-
-
Introducing Cisco Secure Site-to-Site VPN Solutions
6-
Lecture12.1
-
Lecture12.2
-
Lecture12.3
-
Lecture12.4
-
Lecture12.5
-
Lecture12.6
-
-
Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs
2-
Lecture13.1
-
Lecture13.2
-
-
Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW
3 -
Introducing Cisco Secure Remote Access VPN Solutions
3-
Lecture15.1
-
Lecture15.2
-
Lecture15.3
-
-
Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW
5-
Lecture16.1
-
Lecture16.2
-
Lecture16.3
-
Lecture16.4
-
Lecture16.5
-
-
Explaining Cisco Secure Network Access Solutions
5-
Lecture17.1
-
Lecture17.2
-
Lecture17.3
-
Lecture17.4
-
Lecture17.5
-
-
Describing 802.1X Authentication
4-
Lecture18.1
-
Lecture18.2
-
Lecture18.3
-
Lecture18.4
-
-
Configuring 802.1X Authentication
5-
Lecture19.1
-
Lecture19.2
-
Lecture19.3
-
Lecture19.4
-
Lecture19.5
-
-
Describing Endpoint Security Technologies
7-
Lecture20.1
-
Lecture20.2
-
Lecture20.3
-
Lecture20.4
-
Lecture20.5
-
Lecture20.6
-
Lecture20.7
-
-
Deploying Cisco Advanced Malware Protection (AMP) for Endpoints
5-
Lecture21.1
-
Lecture21.2
-
Lecture21.3
-
Lecture21.4
-
Lecture21.5
-
-
Introducing Network Infrastructure Protection
6-
Lecture22.1
-
Lecture22.2
-
Lecture22.3
-
Lecture22.4
-
Lecture22.5
-
Lecture22.6
-
-
Deploying Control Plane Security Controls
4-
Lecture23.1
-
Lecture23.2
-
Lecture23.3
-
Lecture23.4
-
-
Deploying Layer 2 Data Plane Security Controls
9-
Lecture24.1
-
Lecture24.2
-
Lecture24.3
-
Lecture24.4
-
Lecture24.5
-
Lecture24.6
-
Lecture24.7
-
Lecture24.8
-
Lecture24.9
-
-
Deploying Layer 3 Data Plane Security Controls
3-
Lecture25.1
-
Lecture25.2
-
Lecture25.3
-
-
Deploying Management Plane Security Controls
4-
Lecture26.1
-
Lecture26.2
-
Lecture26.3
-
Lecture26.4
-
-
Deploying Traffic Telemetry Methods
3-
Lecture27.1
-
Lecture27.2
-
Lecture27.3
-
-
Deploying Cisco Stealthwatch Enterprise
10-
Lecture28.1
-
Lecture28.2
-
Lecture28.3
-
Lecture28.4
-
Lecture28.5
-
Lecture28.6
-
Lecture28.7
-
Lecture28.8
-
Lecture28.9
-
Lecture28.10
-
-
Describing Cloud and Common Cloud Attacks
7-
Lecture29.1
-
Lecture29.2
-
Lecture29.3
-
Lecture29.4
-
Lecture29.5
-
Lecture29.6
-
Lecture29.7
-
-
Securing the Cloud
10-
Lecture30.1
-
Lecture30.2
-
Lecture30.3
-
Lecture30.4
-
Lecture30.5
-
Lecture30.6
-
Lecture30.7
-
Lecture30.8
-
Lecture30.9
-
Lecture30.10
-
-
Deploying Cisco Stealthwatch Cloud
3-
Lecture31.1
-
Lecture31.2
-
Lecture31.3
-
-
Describing Software-Defined Networking (SDN* )
4-
Lecture32.1
-
Lecture32.2
-
Lecture32.3
-
Lecture32.4
-
This content is protected, please login and enroll course to view this content!
Next
IPsec VPN Overview