CCNP and CCIE Implementing and Operating Cisco Security Core Technologies SCOR (350-701 V1.0) Exam Course

all in one ccie ccnp implementing and securing security core scor 350-701 exam training course

This all-purpose CCNP and CCIE Security Core Exam Course comprehensively covers all of the objectives of the Implementing and Operating Cisco Security Core Technologies (SCOR 350-701 V1.0) Core Exam. The online course includes fully revised material to reflect Cisco CCNP and CCIE Exam changes effective starting February 24 2020.

This course is part of our Membership which also allows you to access all other courses available on our catalog as long as your subscription remains active. You can cancel your subscription at anytime. We accept all major Credit Cards and PayPal.

6-month access pass

perfect for one or more certs

train on your own schedule

ONLINE + Discounted paperbacks

Save 30%

$248 (one payment)

$41/month. save 30%

3-month access pass

perfect for one cert

TRAIN ON YOUR own SCHEDULE

ONLINE CONTENT

SAVE 15%

$149 (one payment)

$50/month. save 15%

monthly access pass

perfect for passing an exam

pay as you go

ONLINE content

cancel any time

$59/month

BILLED MONTHly

Security Concepts

1
Lesson 1: Explain common threats against on-premises and cloud environments
60

1.1 Explain common threats against on-premises and cloud environments

  • 1.1.a On-premises: viruses, trojans, DoS/DDoS attacks, phishing, rootkits, man-in-the-middle attacks, SQL injection, cross-site scripting, malware
  • 1.1.b Cloud: data breaches, insecure APIs, DoS/DDoS, compromised credentials


2
Lesson 2: Compare common security vulnerabilities such as software bugs, weak and/or hardcoded passwords, SQL injection, missing encryption, buffer overflow, path traversal, cross-site scripting/forgery
60

1.2 Compare common security vulnerabilities such as software bugs, weak and/or hardcoded passwords, SQL injection, missing encryption, buffer overflow, path traversal, cross-site scripting/forgery

3
Lesson 3: Describe functions of the cryptography components such as hashing, encryption, PKI, SSL, IPsec, NAT-T IPv4 for IPsec, pre-shared key and certificate based authorization
60

1.3 Describe functions of the cryptography components such as hashing, encryption, PKI, SSL, IPsec, NAT-T IPv4 for IPsec, pre-shared key and certificate based authorization

4
Lesson 4: Compare site-to-site VPN and remote access VPN deployment types such as sVTI, IPsec, Cryptomap, DMVPN, FLEXVPN including high availability considerations, and AnyConnect
60

1.4 Compare site-to-site VPN and remote access VPN deployment types such as sVTI, IPsec, Cryptomap, DMVPN, FLEXVPN including high availability considerations, and AnyConnect

5
Lesson 5: Describe security intelligence authoring, sharing, and consumption
60

1.5 Describe security intelligence authoring, sharing, and consumption

6
Lesson 6: Explain the role of the endpoint in protecting humans from phishing and social engineering attacks
60

1.6 Explain the role of the endpoint in protecting humans from phishing and social engineering attacks

7
Lesson 7: Explain North Bound and South Bound APIs in the SDN architecture
60

1.7 Explain North Bound and South Bound APIs in the SDN architecture

8
Lesson 8: Explain DNAC APIs for network provisioning, optimization, monitoring, and troubleshooting
60

1.8 Explain DNAC APIs for network provisioning, optimization, monitoring, and troubleshooting

9
Lesson 9: Interpret basic Python scripts used to call Cisco Security appliances APIs
60

1.9 Interpret basic Python scripts used to call Cisco Security appliances APIs

Network Security

1
Lesson 1: Compare network security solutions that provide intrusion prevention and firewall capabilities
60

2.1 Compare network security solutions that provide intrusion prevention and firewall capabilities

2
Lesson 2: Describe deployment models of network security solutions and architectures that provide intrusion prevention and firewall capabilities
60

2.2 Describe deployment models of network security solutions and architectures that provide intrusion prevention and firewall capabilities

3
Lesson 3: Describe the components, capabilities, and benefits of NetFlow and Flexible NetFlow records
60

2.3 Describe the components, capabilities, and benefits of NetFlow and Flexible NetFlow records

4
Lesson 4: Configure and verify network infrastructure security methods (router, switch, wireless)
60

2.4 Configure and verify network infrastructure security methods (router, switch, wireless)

  • 2.4.a Layer 2 methods (Network segmentation using VLANs and VRF-lite; Layer 2 and port security; DHCP snooping; Dynamic ARP inspection; storm control; PVLANs to segregate network traffic; and defenses against MAC, ARP, VLAN hopping, STP, and DHCP rogue attacks
  • 2.4.b Device hardening of network infrastructure security devices (control plane, data plane, management plane, and routing protocol security)


5
Lesson 5: Implement segmentation, access control policies, AVC, URL filtering, and malware protection
60

2.5 Implement segmentation, access control policies, AVC, URL filtering, and malware protection

6
Lesson 6: Implement management options for network security solutions such as intrusion prevention and perimeter security (Single vs. multidevice manager, in-band vs. out-of-band, CDP, DNS, SCP, SFTP, and DHCP security and risks)
60

2.6 Implement management options for network security solutions such as intrusion prevention and perimeter security (Single vs. multidevice manager, in-band vs. out-of-band, CDP, DNS, SCP, SFTP, and DHCP security and risks)

7
Lesson 7: Configure AAA for device and network access (authentication and authorization, TACACS+, RADIUS and RADIUS flows, accounting, and dACL)
60

2.7 Configure AAA for device and network access (authentication and authorization, TACACS+, RADIUS and RADIUS flows, accounting, and dACL)

8
Lesson 8: Configure secure network management of perimeter security and infrastructure devices (secure device management, SNMPv3, views, groups, users, authentication, and encryption, secure logging, and NTP with authentication)
60

2.8 Configure secure network management of perimeter security and infrastructure devices (secure device management, SNMPv3, views, groups, users, authentication, and encryption, secure logging, and NTP with authentication)

9
Lesson 9: Configure and verify site-to-site VPN and remote access VPN
60

2.9 Configure and verify site-to-site VPN and remote access VPN

  • 2.9.a Site-to-site VPN utilizing Cisco routers and IOS
  • 2.9.b Remote access VPN using Cisco AnyConnect Secure Mobility client
  • 2.9.c Debug commands to view IPsec tunnel establishment and troubleshooting

Securing the Cloud

1
Lesson 1: Identify security solutions for cloud environments
60

3.1 Identify security solutions for cloud environments

2
Lesson 2: Compare the customer vs. provider security responsibility for the different cloud service models
60

3.2 Compare the customer vs. provider security responsibility for the different cloud service models

  • 3.2.a Patch management in the cloud
  • 3.2.b Security assessment in the cloud
  • 3.2.c Cloud-delivered security solutions such as firewall, management, proxy, security intelligence, and CASB
3
Lesson 3: Describe the concept of DevSecOps (CI/CD pipeline, container orchestration, and security
60

3.3 Describe the concept of DevSecOps (CI/CD pipeline, container orchestration, and security

4
Lesson 4: Implement application and data security in cloud environments
60

3.4 Implement application and data security in cloud environments

5
Lesson 5: Identify security capabilities, deployment models, and policy management to secure the cloud
60

3.5 Identify security capabilities, deployment models, and policy management to secure the cloud

6
Lesson 6: Configure cloud logging and monitoring methodologies
60

3.6 Configure cloud logging and monitoring methodologies

7
Lesson 7: Describe application and workload security concepts
60

3.7 Describe application and workload security concepts

Content Security

1
Lesson 1: Implement traffic redirection and capture methods
60

4.1 Implement traffic redirection and capture methods

2
Lesson 2: Describe web proxy identity and authentication including transparent user identification
60

4.2 Describe web proxy identity and authentication including transparent user identification

3
Lesson 3: Compare the components, capabilities, and benefits of local and cloud-based email and web solutions (ESA, CES, WSA)
60

4.3 Compare the components, capabilities, and benefits of local and cloud-based email and web solutions (ESA, CES, WSA)

4
Lesson 4: Configure and verify web and email security deployment methods to protect on-premises and remote users (inbound and outbound controls and policy management)
60

4.4 Configure and verify web and email security deployment methods to protect on-premises and remote users (inbound and outbound controls and policy management)

5
Lesson 5: Configure and verify email security features such as SPAM filtering, antimalware filtering, DLP, blacklisting, and email encryption
60

4.5 Configure and verify email security features such as SPAM filtering, antimalware filtering, DLP, blacklisting, and email encryption

6
Lesson 6: Configure and verify secure internet gateway and web security features such as blacklisting, URL filtering, malware scanning, URL categorization, web application filtering, and TLS decryption
60

4.6 Configure and verify secure internet gateway and web security features such as blacklisting, URL filtering, malware scanning, URL categorization, web application filtering, and TLS decryption

7
Lesson 7: Describe the components, capabilities, and benefits of Cisco Umbrella
60

4.7 Describe the components, capabilities, and benefits of Cisco Umbrella

8
Lesson 8: Configure and verify web security controls on Cisco Umbrella (identities, URL content settings, destination lists, and reporting)
60

4.8 Configure and verify web security controls on Cisco Umbrella (identities, URL content settings, destination lists, and reporting)

Endpoint Protection and Detection

1
Lesson 1: Compare Endpoint Protection Platforms (EPP) and Endpoint Detection & Response (EDR) solutions
60

5.1 Compare Endpoint Protection Platforms (EPP) and Endpoint Detection & Response (EDR) solutions

2
Lesson 2: Explain antimalware, retrospective security, Indication of Compromise (IOC), antivirus, dynamic file analysis, and endpoint-sourced telemetry
60

5.2 Explain antimalware, retrospective security, Indication of Compromise (IOC), antivirus, dynamic file analysis, and endpoint-sourced telemetry

3
Lesson 3: Configure and verify outbreak control and quarantines to limit infection
60

5.3 Configure and verify outbreak control and quarantines to limit infection

4
Lesson 4: Describe justifications for endpoint-based security
60

5.4 Describe justifications for endpoint-based security

5
Lesson 5: Describe the value of endpoint device management and asset inventory such as MDM
60

5.5 Describe the value of endpoint device management and asset inventory such as MDM

6
Lesson 6: Describe the uses and importance of a multifactor authentication (MFA) strategy
60

5.6 Describe the uses and importance of a multifactor authentication (MFA) strategy

7
Lesson 7: Describe endpoint posture assessment solutions to ensure endpoint security
60

5.7 Describe endpoint posture assessment solutions to ensure endpoint security

8
Lesson 8: Explain the importance of an endpoint patching strategy
60

5.8 Explain the importance of an endpoint patching strategy

Secure Network Access Visibility and Enforcement

1
Lesson 1: Describe identity management and secure network access concepts such as guest services, profiling, posture assessment and BYOD
60

6.1 Describe identity management and secure network access concepts such as guest services, profiling, posture assessment and BYOD

2
Lesson 2: Configure and verify network access device functionality such as 802.1X, MAB, WebAuth
60

6.2 Configure and verify network access device functionality such as 802.1X, MAB, WebAuth

3
Lesson 3: Describe network access with CoA
60

6.3 Describe network access with CoA

4
Lesson 4: Describe the benefits of device compliance and application control
60

6.4 Describe the benefits of device compliance and application control

5
Lesson 5: Explain exfiltration techniques (DNS tunneling, HTTPS, email, FTP/SSH/SCP/SFTP, ICMP, Messenger, IRC, NTP)
60

6.5 Explain exfiltration techniques (DNS tunneling, HTTPS, email, FTP/SSH/SCP/SFTP, ICMP, Messenger, IRC, NTP)

6
Lesson 6: Describe the benefits of network telemetry
60

6.6 Describe the benefits of network telemetry

7
Lesson 7: Describe the components, capabilities, and benefits of these security products and solutions
60

6.7 Describe the components, capabilities, and benefits of these security products and solutions

  • 6.7.a Cisco Stealthwatch
  • 6.7.b Cisco Stealthwatch Cloud
  • 6.7.c Cisco pxGrid
  • 6.7.d Cisco Umbrella Investigate
  • 6.7.e Cisco Cognitive Threat Analytics
  • 6.7.f Cisco Encrypted Traffic Analytics
  • 6.7.g Cisco AnyConnect Network Visibility Module (NVM)
Yes. You can check out all of our first lessons and sample quizzes by signing up for our Free Trial Membership.
This course is for Network Engineers, System Admins, DevOps and Developers who would like to level up their skill set to Cisco CCNP and CCIE expertise.
You will need to have basic know-how of computer networking and Cisco products, preferably Cisco CCNA certification.
You will be able to understand concepts and technologies related to Cisco Security Technologies.

Please refer to our content calendar for all content changes and announcements.

4.8
4.8 out of 5
5 Ratings

Detailed Rating

Stars 5
4
Stars 4
1
Stars 3
0
Stars 2
0
Stars 1
0

{{ review.user }}

{{ review.time }}
 

Show more
Please, login to leave a review
Add to Wishlist
Enrolled: 108 students
Duration: 25 hours
Lectures: 48
Level: Advanced

Reviews and Testimonials

cciein8weeks reviews review legit

I am an CCIE R&S. This product really helps me re-certify my license. The product has very realistic problems with links to useful documents. It lists a lot of problems that cover all necessary topics. In short, studying these materials really make me study and well prepare me for the test!

Beomsu Kim, CCIE #16814

The study guide provides a nice breakdown of the blueprint with links to additional reference material which provides a good refresher. The study plans are a nice touch and help keep you on track when you have a busy schedule.

Stephen Ransome, CCIE #41102
Ranix Data Communications

Excellent for people who don’t want to read the whole book and also quizzes are very useful to practice.

Christian Guzman, CO-Founder/COO
One Consulting S.A.S

Very useful content

Prem Jeevarathinam, Associate Architect, Cloud R&D
NTT Communications CIS

Well compiled content for preparation of the exam and understanding of concepts relevant to the Course. Well articulated for preparing one to take on the exam

Alex Ikuha, Principal
Safaricom PLC

The pdf is very helpful and contains a lot of knowledge that is not found in other products. The study plan and quizzes are excellent.

Guido Groeneweg, Sr. Consultant
YaWorks

I have used CCIEin8Weeks to prepare for CCIE CCIE Data Center 400-151 and I find the product excellent preparation material, highly recommend it.

Martin McGannon, VP Network Architecture
State Stree

Small investment for a larger return! The CCIE DC All In One Membership has been an essential resource in studying for my CCIE Datacenter Written exam. This product alone takes the abundance of criteria outlined in the exam blueprint and condenses the essential material into a Study Guide and Practice exams which provide a real-time experience in preparation for your exam. Highly recommended!

Benny Henderson, Cloud Platform Architect
World Wide Technology

Great product, well organized study guide and the quiz questions lead you in the right direction to further study.

Nicholas Garde, Network Administrator
Paycom

Great study materials. Very thorough and complete. Extensive coverage of the topics. There is a lot to review, and will take some time, but if you complete all of it, you will be well prepared. Well worth the price.

Kendal Gabel

I am shocked and amazed at the amount of material that I have now for my CCIE written, It has cut down on the time for collecting right resources for the prep. It is a perfect place with all resources like full documentation, Videos and practice tests.

Mohammed Irfan, Senior Manager GPON Network Expansion
Transworld

I highly recommend this study material. It helped me pass the CCIE Collab Written exam a few weeks ago. I agree with the other reviewers – it’s definitely the best study material out there (besides Cisco guides).

Dionne Danvers, Consulting Engineer Unified Communications & Collaboration
CDW

Excellent test prep for CCIE written exam. Really like that when you get answer wrong it has link to documentation with explanations. Also, a plus is the test questions are updated frequently!

Justin Priebe

The best material available today for CCIE Written preparation!

Ronaldo Cesar, Analista de Redes
TECHNET-WIFI TELECOM

CCIEin8Weeks is the product to use if you are going to be passing the CCIE Written! Thank you for the book, the great customer service and the abundance of information!

Jeromy Polachak, Sr. Network Engineer
General Dynamics

So far, this has exceeded my expectations. I was struggling with studying for the 400-101 in a methodical manner and now I have a dedicated study schedule with material that doesn’t run down rabbit holes.

Kenny Keefover

Very clear and concise content. I really appreciated the video content and how they understood that some of the material could be dry, so they tried to mix it up a bit by adding “fun facts” to the content. I would recommend and will be purchasing other material in the future.

Jeff Rapini, Sr. Solutions Architect
ePlus inc.
CCIE and CCNP Enterprise Network ENCOR
cciein8weeks review

I was hesitant to purchase this course but I am so glad that I did. Great easy to follow format that tells you everything you need to know to pass the exam. The content is based on Cisco documentation and best practices! I would highly recommend this to anyone who is studying for their exam.

S. Wise

I came across this site while preparing to sit for my CCIE R&S exam. I have studied the material in depth before, but needed something that would give me a concise overview and an easy to follow map to quickly find the content I need to review. The study guide material is put together very well and organized by exam topic, which is exactly what I needed. There are also links to documentation for further reading where necessary. The exam questions are also great to further your retention of the material. The study guide has been a valuable preparation resource.

Mark Bellville, Network Engineer
Hy-Vee

Excellent material to study for CCIE Written. I recommend it to all who want to learn for CCIE

Urs Weber, Network Engineer
Swisscom

Useful, a wide range of questions and good structure.

Ivo Nemecek, Director, Project Division
Simac Technik ČR, a.s.

The CCIE R&S definitely provides great, precise and complete training materials. I am highly impressed by the complete training materials as preparation not only for CCIE R&S but also helps a lot on review for CCNA R&S. This is awesome and I will definitely recommend this to my teammates and friends.

Robin Familara, Network Engineer
NetBrain

I was very impressed with the structure of the study guide for R&S. Used in addition to other materials this package is a brilliant resource.

Robert Grant, Consulting Engineer
Ping Network Solutions

Study guide provides concise information for all areas of exam and provides a link to more details for each section. I would recommend to anyone that is ready to take the written but wants to review main points before taking.

Eric Schmitz

Very well put together, and thought out, Move along a good pace, and explains exactly what you need to know. Great refresher for those that have already passed, but are looking to pass again for re-cert. I would recommend this guide!

Jay Stanley, Sr. Systems Engineer
ConvergeOne

Three days studying this material and I feel comfortable and sure that I’ll pass the written exam!

Andrea Capalbo, Design Engineer
Telefónica

Great Study Guides!

Jose Venegas, Computer Engineer Integrator
ICF

I am reasonably impressed with the content in this book, to help kickstart my certification efforts.

Alvin Aung, Senior Network Consultant
Infosys Public Services
Great easy to follow format
cciein8weeks review

Great easy to follow format that tells you everything you need to know to pass the exam. The content is based on Cisco documentation and best practices! I would highly recommend this to anyone who is studying for their exam.

Joseph Douglas
Excellent Material
cciein8weeks review

Excellent Material; i got the Automation, ENCOR v1 and the CCIE Routing and Switching v5.1 from the team at CCIEin8Weeks. The literature is concise and packed with “Easy to understand” explanations. I’d recommend CCIEin8Weeks.

Solomon Aj.
Liquid Telecom
CCNP Enterprise Core Exam
cciein8weeks review

Excellent material for CCNP Enterprise Core Exam as i am focusing on completing the exam. The Author did pretty good background work in covering each topic widely and in depth. I am sure this information will really help me to focus and grasp the major concepts , enhance the skill set and pass the exam.

 

Chenchu A. Velineni
Charter Communications

A very nice reference PDF for CCIE Security Studies. Hits all of the topics listed in the blueprint, and has become a helpful resource in my studies.

Charles Judd, Technical Instructor
KWT, LLC.

Good product in market to pass CCIE written and contains good amount of information

Siddharth Choudhary

I stumbled on this site by accident a few months ago, and since then my study for CCIE Written for R&S has never been much easier. Of particular interest is the Evolving Technologies section. I am yet to come across any CCIE learning sites that have better content than those in this guide for the new Evolving Technologies. I would definitely recommend to anyone wishing to undertake the written exam.

Austin Okpaleke, Network Engineer
Vodafone

Well structured and very helpful

David Muliro, Principal
Safaricom