CCNP SECURITY -SCOR-350-701
Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)
This exam tests your knowledge of implementing and operating core security technologies, including:
- Network security
- Cloud security
- Content security
- Endpoint protection and detection
- Secure network access
- Visibility and enforcement
- SDN and Network Automation Concepts
Software and networking become more and more interconnected every day.
Security teams can take advantage of automation to scale their security solutions.
Today’s security professionals need a broader range of skills and deeper focus in strategic technology areas.
The new CCNP Security certification program gives you exactly that breadth and depth.
The core exam, (SCOR 350-701)
- Focuses on your knowledge of security infrastructure including network security, cloud security, content security, endpoint protection and detection, secure network access, visibility, and enforcements
- The core exam is also the qualifying exam for CCIE Security Certification.
- Network Security Engineers
- Security Engineers
Your GNS3 Academy Instructor
Sikandar Shaik, a Triple CCIE (ENT/SP/SEC # 35012), is a highly experienced and extremely driven senior technical instructor and network consultant.
He has been training in networking courses for more than 15 years, teaching a wide range of topics including Routing and Switching, Service Provider and Security (CCNA to CCIE).
In addition, he has been developing and updating the content for these courses.
He has assisted many engineers in passing out the lab examinations and securing certifications.
Sikandar Shaik is highly skilled at designing, planning, coordinating, maintaining, troubleshooting, and implementing changes to various aspects of multi-scaled, multi-platform, multi-protocol complex networks as well as course development and instruction for a technical workforce in a varied networking environment.
His experience includes responsibilities ranging from operating and maintaining Network devices includes Routers, Switches, ASA firewalls & software’s relate to them for multi-faceted data communication networks in LAN, MAN and WAN environments.
Sikandar Shaik has delivered instructor led trainings in several states in India as well as in abroad in countries like China, Kenya. Maldives, Bangladesh, and UAE.
He has also worked as a Freelance Cisco Certified Instructor globally for Corporate Major Clients. Highly experienced and extremely driven senior technical instructor and network consultant.
Working as a Cisco Certified Instructor globally for Corporate Major Client’s to name a few:
- Dubai Airports
- Tech Mahindra
- AT & T
- Wipro
- HCL
- Ericson
- CTS
- Accenture
- OMAN AIrports
- Dheeragu (Maldives)
Deliver highly interactive classes and training online, with video, breakout sessions, and hands-on learning labs.
Worldwide delivery of authorized Cisco training courses CCNA to CCIE (R&S, security, service provider) for different Cisco Learning Partners.
Course Development of Cisco Authorized Course Material. Network Consulting for clients
Network Design, Support, Implementation and Troubleshooting of complex Cisco based networks in addition to Network Security Audits.
Deliver quality classroom instruction.
Plan for emerging technologies and prepare for new classes on on-going basis in coordination with company
GNS3 Academy Curriculum
-
StartCracking the Code Interview Insights and Exam Preparation for Cisco Certifications (12:58)
-
StartMastering Networking A Comprehensive CCNA, CCNP, CCIE Learning Roadmap (14:45)
-
StartHands-On LearningL The Crucial Role of Virtual Labs in CCNP and CCIE Studies (16:08)
-
StartCCIE Aspirations A Step-by-Step Guide to CCIE Preparation and Success (13:44)
-
StartABout Cisco (1:11)
-
StartCisco Certification Updates (11:15)
-
StartCisco Re-Certification (0:52)
-
StartCCNP Certifications (0:54)
-
Start005 CCIE Certifications (1:55)
-
Start006 Cisco Certification Migration Options (5:55)
-
StartRequired Exams for CCNP (2:30)
-
StartWorkbooks - Images Download Links
-
StartCisco Lab Options (7:35)
-
StartSupported Virtual Images - GNS3- EVE-ng (7:39)
-
StartAbout GNS3 (3:44)
-
StartInstalling GNS3 on Windows (6:39)
-
StartGNS3 - Adding IOS Images (5:57)
-
StartDefault Topology- IOS Routers -Initial Configurations (5:12)
-
StartIOS Default Topology (9:18)
-
StartConnecting GNS3 Topology to Host Computer (6:02)
-
StartGNS3- VMWARE Integration (9:16)
-
StartGNS3 - IOSv L2-L3 Configuration Steps (5:54)
-
StartGNS3 - ASAv Setup (4:17)
-
StartGNS3- IOU- L2-L3 Configuration Steps (2:38)
-
Start001 EVE-NG Virtual Platfrom (6:31)
-
StartEVE-nG Professional License (6:34)
-
StartIOL Devices - EVE-nG (7:17)
-
StartUpload SD-WAN Images - EVE-NG (8:17)
-
StartAdding Viptela Devices - EVE-NG Lab (5:50)
-
StartASA - EVE-NG (7:08)
-
StartWindows - EVE-NG (10:10)
-
StartASA 8.4 Image - EVE-NG (5:30)
-
StartConnecting WIndows PC- EVE-Topology (11:57)
-
StartConnecting WIndows PC - Internet (9:27)
-
StartCSR1000v - EVE-NG (6:30)
-
StartNetwork Security Terminology (6:07)
-
StartGoals of Network Security (9:30)
-
StartUnderstanding Threat Types -Mitigation (8:55)
-
StartAssets - Classification of Assets (6:15)
-
StartClassify CounterMeasures (3:56)
-
StartClassify Vulnerabilities (2:27)
-
StartNetwork Security - Design Principles (10:24)
-
StartMotivations Behind Network Attacks (3:04)
-
StartSocial Engineering Attacks (3:31)
-
StartPhishing Attacks (3:44)
-
StartSocial Engineering - Phishing Mitigation (3:45)
-
StartDenail of Service Attacks - DoS (4:47)
-
StartDistributed Denial of Service Attacks - DDoS (3:50)
-
StartSpoofing Attacks (3:40)
-
StartSpoofing Attacks - Mitigation (3:52)
-
StartMan in the Middle Attacks - MiTM (2:10)
-
StartPassword Attacks (5:08)
-
StartPassword Attacks - Mitigation (3:44)
-
StartReflector Attacks (1:51)
-
StartAmplification Attacks (2:06)
-
StartReconnaisance Attacks (5:14)
-
StartReconnaisance Attacks - Mitigation (1:57)
-
StartCisco Lab Options (7:35)
-
StartAbout GNS3 (3:44)
-
StartInstalling GNS3 on Windows (6:39)
-
StartGNS3 - Adding IOS Images (5:57)
-
StartDefault Topology- IOS Routers -Initial Configurations (5:12)
-
StartIOS Default Topology (9:18)
-
StartConnecting GNS3 Topology to Host Computer (6:02)
-
StartGNS3- VMWARE Integration (9:16)
-
StartGNS3 - IOSv L2-L3 Configuration Steps (5:54)
-
StartGNS3 - ASAv Setup (4:17)
-
StartGNS3- IOU- L2-L3 Configuation Steps (2:38)
-
StartSwitch Security - Overview (2:09)
-
StartDisable Unused Ports (1:27)
-
StartDynamic Trunking Protocol (8:17)
-
StartDTP Vulnerabilities - Mitigation (2:23)
-
StartVLAN Hopping Attack- Mitigation (4:49)
-
StartCDP Overview (17:42)
-
StartLLDP Overview (2:34)
-
StartCDP-LLDP- Vulnerabilities - Mitigation (2:12)
-
StartMAC Flooding Attack - Port Security (11:57)
-
StartMAC Spoofing Attack - Port Security (7:26)
-
StartPort Security - Configuration (11:03)
-
StartSpanning-tree Portfast (7:10)
-
StartWhat is Native VLAN (8:10)
-
StartDHCP Spoofing Attack- DHCP Snooping (8:13)
-
StartDHCP Snooping - Configuration (16:06)
-
StartDHCP Starvation Attack - Mitigation (1:50)
-
StartARP Spoofing Attack - Dynamic ARP Inspection -DAI (12:18)
-
StartDynamic ARP Inspection - Configuration (11:35)
-
StartProtected Ports - Private VLAN Edge (2:54)
-
StartPrivate VLAN - Overview (9:23)
-
StartPrivate VLAN - Configuration (4:55)
-
StartPrivate VLAN - Configuration Lab (19:34)
-
StartProtected Ports-Private VLAN Edge (2:30)
-
StartIOS - Zone based Firewall (3:16)
-
StartZBF- Configuration overview (3:45)
-
StartZBF- Security zones (3:01)
-
StartZBF - Default Traffic flow (3:26)
-
StartClassmap -Policymap -Hierarchy (5:23)
-
StartZBF - Classify Traffic using Class-maps (5:56)
-
StartZBF- Class-map Configuration (4:41)
-
StartZBF- Policy Map- Zone Pairs (10:44)
-
StartWhat is Cryptography (3:16)
-
StartGoals of Cryptography (3:23)
-
StartWhat is Hashing How it works (2:32)
-
StartHashing with HMAC (2:52)
-
StartWhat is Encryption - Decryption (1:29)
-
StartEncryption Algorithms - Symmetric vs Assymetric (5:02)
-
StartCryptanalysis - Attacks (3:59)
-
StartAssymetric Encryption - Drawbacks (2:49)
-
StartPublic Key Infrastructure (3:52)
-
StartAuthorization - Device Access (3:27)
-
StartIOS Privilege Levels (8:48)
-
StartLAB -Local Authorization- Privilege Levels (14:23)
-
StartIOS Privilege Levels - Limitations (4:57)
-
StartRole based CLI Access - RBAC (5:33)
-
StartRBAC - Views Types (4:22)
-
StartLAB1- RBAC Views (9:44)
-
StartLAB2 - Modify RBAC Views (3:39)
-
StartLAB3 - RBAC Views (5:42)
-
StartLAB4 - RBAC SuperViews (5:13)
-
StartWhat is Intrusion ? (1:53)
-
StartIntrusion Prevention System - IPS (2:38)
-
StartIDS vs IPS (1:59)
-
StartHost based IPS vs Network Based IPS (5:34)
-
StartIPS Deployments - Inline vs Promiscuous (3:20)
-
StartCisco IPS Solutions (4:56)
-
StartIPS Threat Detection Methods (6:40)
-
StartSignature Alarm Types (3:17)
-
StartIPS Signature Actions (3:29)
-
StartIPS Evasion Methods - Countermeasures (5:54)