CCNP SCOR Course: Mastering Cisco Security Core Technologies

If you’re going to prepare for the CCNP SCOR exam, learn it right—interactive, engaging, and built to make you unstoppable.

(350-701.AP2) / ISBN : 978-1-64459-722-4
Lessons
Lab
TestPrep
AI Tutor (Hinzufügen Auf)
Holen Sie sich eine kostenlose Testversion

Über diesen Kurs

Enroll in our CCNP Security course to master the skills needed to ace the 350-701 exam.

In this course, dive into network security, cloud security, and endpoint protection while learning to implement firewalls, VPNs, and zero-trust policies. Get hands-on with Cisco Secure Firewall, ISE, and Secure Endpoint.

From cryptography to threat detection, you’ll train with bite-sized lessons, quizzes, and practice exams, so you can apply what you memorize to real-world problems. 

Fähigkeiten, die Sie erwerben werden

  • Enterprise Network Security Implementation: Design and deploy robust security architectures for modern networks.
  • Cloud & Endpoint Threat Defense: Secure cloud environments and endpoints using Cisco Umbrella, Secure Workload, and Secure Endpoint.
  • Zero-Trust Network Access (ZTNA) Enforcement: Configure AAA, ISE, and segmentation for secure access control.
  • Advanced Firewall & VPN Configuration: Master Cisco Secure Firewall policies, intrusion prevention, and site-to-site/remote-access VPNs.
  • Security Visibility & Analytics: Leverage NetFlow, Cisco Encrypted Traffic Analysis (ETA), and Secure Network Analytics for real-time threat detection.
  • Incident Response & Automation: Apply forensics, automation, and DevSecOps principles to streamline security operations.

1

Introduction

  • The CCNP Security Certification
  • The CCIE Security Certification
  • The Exam Objectives (Domains)
  • Steps to Pass the SCOR Exam
  • Facts About the Exam
2

Cybersecurity Fundamentals

  • Introduction to Cybersecurity
  • Defining What Are Threats, Vulnerabilities, and Exploits
  • Common Software and Hardware Vulnerabilities
  • Confidentiality, Integrity, and Availability
  • Cloud Security Threats
  • IoT Security Threats
  • An Introduction to Digital Forensics and Incident Response
  • Summary
  • Review All Key Topics
3

Cryptography

  • Introduction to Cryptography
  • Fundamentals of PKI
  • Review All Key Topics
4

Software-Defined Networking Security and Network Programmability

  • Software-Defined Networking (SDN) and SDN Security
  • Introduction to Network Programmability
  • Review All Key Topics
5

Authentication, Authorization, Accounting (AAA) and Identity Management

  • Introduction to Authentication, Authorization, and Accounting
  • Authentication
  • Authorization
  • Accounting
  • Infrastructure Access Controls
  • AAA Protocols
  • Cisco Identity Services Engine (ISE)
  • Configuring TACACS+ Access
  • Configuring RADIUS Authentication
  • Additional Cisco ISE Design Tips
  • Review All Key Topics
6

Network Visibility and Segmentation

  • Introduction to Network Visibility
  • NetFlow
  • IP Flow Information Export (IPFIX)
  • NetFlow Deployment Scenarios
  • Cisco Secure Network Analytics and Cisco Secure Cloud Analytics
  • Cisco Cognitive Intelligence and Cisco Encrypted Traffic Analytics (ETA)
  • NetFlow Collection Considerations and Best Practices
  • Configuring NetFlow in Cisco IOS and Cisco IOS-XE
  • Configuring NetFlow in NX-OS
  • Introduction to Network Segmentation
  • Micro-segmentation with Cisco ACI
  • Segmentation with Cisco ISE
  • Review All Key Topics
7

Infrastructure Security

  • Securing Layer 2 Technologies
  • Common Layer 2 Threats and How to Mitigate Them
  • Network Foundation Protection
  • Understanding and Securing the Management Plane
  • Understanding the Control Plane
  • Understanding and Securing the Data Plane
  • Securing Management Traffic
  • Implementing Logging Features
  • Configuring NTP
  • Securing the Network Infrastructure Device Image and Configuration Files
  • Securing the Data Plane in IPv6
  • Securing Routing Protocols and the Control Plane
  • Review All Key Topics
8

Cisco Secure Firewall

  • Introduction to Cisco Secure Firewall
  • Comparing Network Security Solutions That Provide Firewall Capabilities
  • Deployment Modes of Network Security Solutions and Architectures That Provide Firewall Capabilities
  • High Availability and Clustering
  • Implementing Access Control
  • Cisco Firewall Intrusion Policies
  • Cisco Secure Malware Defense
  • Security Intelligence, Security Updates, and Keeping Firepower Software Up to Date
  • Review All Key Topics
9

Virtual Private Networks (VPNs)

  • Virtual Private Network (VPN) Fundamentals
  • Deploying and Configuring Site-to-Site VPNs in Cisco Routers
  • Configuring Site-to-Site VPNs in Cisco ASA Firewalls
  • Configuring Remote-Access VPNs in the Cisco ASA
  • Configuring Clientless Remote-Access SSL VPNs in the Cisco ASA
  • Configuring Client-Based Remote-Access SSL VPNs in the Cisco ASA
  • Configuring Remote-Access VPNs in Cisco Secure Firewall
  • Configuring Site-to-Site VPNs in the Cisco Secure Firewall
  • Cisco SD-WAN
  • Review All Key Topics
10

Securing the Cloud

  • What Is Cloud and What Are the Cloud Service Models?
  • DevOps, Continuous Integration (CI), Continuous Delivery (CD), and DevSecOps
  • Describing the Customer vs. Provider Security Responsibility for the Different Cloud Service Models
  • Cisco Umbrella
  • Cisco Secure Email Threat Defense
  • Cisco Attack Surface Management (Formerly Cisco Secure Cloud Insights)
  • Cisco Secure Cloud Analytics
  • AppDynamics Cloud Monitoring
  • Cisco Secure Workload
  • Cisco XDR
  • Review All Key Topics
11

Content Security

  • Content Security Fundamentals
  • Cisco Secure Web Appliance
  • Cisco Secure Email
  • Cisco Content Security Management Appliance (SMA)
  • Review All Key Topics
12

Endpoint Protection and Detection

  • Introduction to Endpoint Protection and Detection
  • Cisco Secure Endpoint
  • Cisco Threat Response
  • Review All Key Topics
13

Final Preparation

  • Hands-on Activities
  • Summary

1

Cybersecurity Fundamentals

  • Searching for Exploits Using Searchsploit
  • Performing SQL Injection in DVWA
  • Performing an XSS Attack in DVWA
  • Conducting Vulnerability Scanning Using Nessus
2

Cryptography

  • Configuring IPsec
  • Generating an RSA Key Pair
  • Generating an Asymmetric Key
3

Software-Defined Networking Security and Network Programmability

  • Using the curl Command
4

Authentication, Authorization, Accounting (AAA) and Identity Management

  • Configuring the AAA Router for TACACS+ Authentication
  • Strengthening Organizational Security Through Cybersecurity Fundamentals
5

Network Visibility and Segmentation

  • Configuring a Flow Record
  • Configuring a Flow Monitor for IPv4 or IPv6
  • Defining a Flow Record in Cisco NX-OS
  • Defining a Flow Monitor with a Custom Record in Cisco NX-OS
  • Defining a Flow Exporter in Cisco NX-OS
6

Infrastructure Security

  • Configuring PortFast and Rapid Spanning Tree
  • Configuring Interfaces as Trunk Ports
  • Configuring Router-on-a-Stick and Switch Support for a Router
  • Implementing BPDU Guard on a Switch Port
  • Implementing Port Security
  • Locking Down Switch Ports Administratively
  • Configuring DHCP Snooping
  • Preparing SSH in a Router
  • Enabling AAA Services and Working with Method Lists
  • Creating and Working with Parser Views
  • Configuring a Router to Use NTP Services
  • Creating a Secure Bootset
  • Configuring the IPv6 ACL
  • Configuring IPv6
  • Configuring and Displaying Control Plane Policing
  • Configuring the BGP MD5 Authentication Process between BGP Peers
  • Configuring the OSPF MD5 Authentication Process
  • Configuring the RIPv2 MD5 Authentication Process
  • Configuring the EIGRP MD5 Authentication Process
7

Cisco Secure Firewall

  • Configuring the Cisco ASA To-The-Box Traffic Filtering
  • Configuring Static NAT
  • Configuring a Standard ACL
  • Configuring Dynamic PAT
  • Configuring Dynamic NAT
  • Configuring Cisco ASA Application Inspection
  • Strengthening Exam Readiness Through Expert Guidance
8

Virtual Private Networks (VPNs)

  • Configuring the GRE Tunnel Interface
  • Konfigurieren der Site-to-Site-IPsec-VPN-Topologie
  • Implementing IPsec VPNs through CLI
  • Configuring and Viewing DMVPN Phase 1
  • Configuring the Cisco ASA VPN IKEv2 Policy, IPsec Policy, and Dynamic Crypto Map
  • Configuring the Group Policy in the Cisco ASA
  • Creating the IP Pool for VPN Clients
  • Creating the Tunnel Group for Remote Access VPN Clients
  • Enrolling in the Manual Certificate
  • Konfigurieren von clientlosen SSL-VPNs auf ASA
  • Konfigurieren einer Tunnelgruppe für clientloses SSL-VPN
  • Configuring the Cisco ASA to Authenticate Users Using a RADIUS Server
  • Defining a WebType ACL
  • Defining the RADIUS Server for Client-Based SSL VPN
  • Configuring Split Tunneling
9

Securing the Cloud

  • Using Docker
  • Troubleshooting Kubernetes
10

Content Security

  • Configuring PBR in a Cisco Router
11

Endpoint Protection and Detection

  • Preparing for a Collaborative Security Exam

Haben Sie Fragen? Schauen Sie sich die FAQs an

  Want to Learn More?

Kontaktiere uns jetzt

The CCNP SCOR (350-701) is the core exam for Cisco’s CCNP Security and CCIE Security certifications. It validates expertise in implementing and operating core security technologies, including:

  • Network security (firewalls, intrusion prevention)
  • Cloud security (SaaS/PaaS/IaaS models, DevSecOps)
  • Endpoint protection (Cisco Secure Endpoint, EDR/EPP)
  • Secure network access (AAA, ISE, Zero Trust)
  • Visibility & enforcement (Cisco Umbrella, Secure Network Analytics)

Passing the SCOR exam earns the Cisco Certified Specialist - Security Core title and counts toward CCNP/CCIE Security recertification.

Yes, the CCNP Security (SCOR 350-701) is considered challenging due to:

  • Depth of topics: Covers advanced security concepts beyond CCNA-level knowledge.
  • Study duration: 40% of candidates need 5+ months to prepare, while only 15% pass in under 6 weeks. Hands-on experience with Cisco security tools significantly reduces preparation time.
  • Exam rigor: 90–110 questions in 120 minutes, with a passing score of ~750–850/1000

As of 2024, the annual salary for a CCNP Security-certified specialist in the United States typically ranges between $95,000 and $145,000, depending on factors such as experience, location, and employer size. Some sources indicate that top professionals with this certification can earn up to $205,000 annually.

We can Prepare for the 350-701 SCOR Exam

  Build elite Cisco security skills and raise your salary, because attackers never rest, and neither should your defenses.

$195.99

Kaufe jetzt

Ähnliche Kurse

Alle Kurse
Scrolle nach oben