About Course
Course overview
The course "Implementing and Operating Cisco Security Core Technologies (SCOR)" prepares you comprehensively for the Cisco CCNP Security certification and various security roles. In this course, you will acquire the necessary skills and technologies to implement Cisco's core security solutions and provide advanced protection against cyberattacks. You will learn about network security, cloud and content security, endpoint protection, secure network access, visibility and enforcement.
You will gain practical experience in the implementation of the Cisco Firepower Next-Generation Firewall and the Cisco ASA Firewall as well as the configuration of access control policies, mail policies and 802.1X authentication. You will also receive an introduction to the threat detection functions of Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud.
Before attending this course, you should have knowledge and skills from the CCNA:
- Classroom Training - Berlin: Class room instruction in our Training Center with direct exchange.
- Hybrid training: Combination of face-to-face and online participation via platforms such as WebEx/Zoom.
- Online training: Live lessons with VPN access for practical exercises.
- The training can be completed online from the comfort of your own home anywhere in Germany.
- LIVE with trainer - full time + hands on lab
- Classroom teaching with up to 50% practical experience in the IT lab
- Training with original Cisco hardware
- Frontal instruction conducted by the instructor on all training days
- PC with Internet connection
- Headset
- Camera
We will provide you with the necessary hardware if required.
Regular course dates approx. 4 times a year. Contact us for the next start date.
Support with the application is possible. We will guide you through the entire process and look forward to helping you achieve your professional goals.
Further recommendations: Combination of CCNA and CCNP + CCNP Security
To optimize your stability and your chances of advancement in the field of network security, we recommend combining several Cisco courses and certifications. This combination provides comprehensive and in-depth expertise that will enable you to succeed in various positions within the network and IT security landscape.
- Fundamentals of network technology:This certification covers the basics of network technology and forms the basis for more advanced certifications. You will learn how to install, configure and operate networks.
- Network Security:Part of the CCNA course includes the basic principles of network security, which are useful for advanced studies in CCNP and CCNP Security.
- Career entry:With a CCNA certification, you can aim for your first positions as a network administrator or network technician.
- In-depth network knowledge:The CCNP course deepens the knowledge gained from the CCNA and covers advanced network technologies and solutions. This includes advanced routing and switching
- Practical skills:The course includes extensive practical exercises to help you apply theory to real-world networking scenarios.
- Specialization:CCNP offers various specializations, including Enterprise, Security, which allow you to steer and stabilize your sustainable work intake in a specific direction.
- Security Solutions:This certification focuses on the implementation and operation of Cisco security solutions, including firewalls, VPNs, intrusion prevention systems and endpoint security.
- Advanced skills:Gain skills in dealing with advanced security threats and learn how to protect networks from complex cyber attacks.
- Career development:With a CCNP Security certification, you are qualified for further positions such as security engineer, security analyst or IT security manager.
- Width and depth:
The combination of CCNA, CCNP and CCNP Security provides you with a broad knowledge of network technologies as well as in-depth specialization in the field of network security.
- Career benefits:
This comprehensive training will make you a sought-after candidate on the job market, as you will be able to design, manage and secure networks.
- Many vacancies:
- High demand95 % of advertised positions in the Cisco network sector remain unfilled for more than 6 months.
- Over 3,000 unfilled vacanciesThis shows the strong demand for skilled workers in this area.
- Low competition:
- Few Jobseekers: According to the Federal Employment Agency, there are fewer than 20 jobseekers in this field across Germany.
- High chances of employment: With so few competitors, the chances of finding a job are very good.
- Further development:
Ongoing training and certification enables you to stay at the cutting edge of technology and adapt to the constantly changing requirements of the IT industry.
The combination of CCNA, CCNP and Security provides a strong foundation and significantly expands your skills in the areas of networking and security. These certificates will make you a versatile IT professional and increase your chances of sustainable employment in the IT industry
Further information
- Teaching materials/books
- Certificate of completion
- Hardware exercises on our laboratory infrastructure
- Instructor-led training
- Exam
- Entry-Level Network Engineer/ Security
- Network Administrator
- Network Support Technician
- Helpdesk Technician
- Junior Network Specialist
- Network administrator
- Junior/Safety Engineer
- Security analyst
- IT Security Manager
With this comprehensive qualification, you will be well prepared to meet the demands of the modern IT market. Achieve the status of a certified Cisco network expert with our sustainable course and shape your future with stability and success!
If you are looking for work or are threatened with unemployment, the entire cost of further training will be covered in full by your benefit provider, such as the Federal Employment Agency, Jobcenter, BFD or DRV / pension insurance. This includes all further training costs, which are covered 100% by the education voucher.
We will be happy to assist you with the application process.
MTIT is ready to support you on your path to professional success. We offer you comprehensive support in preparing your application documents, including your CV and letter of motivation, as well as individual coaching. Our aim is to successfully place you in a job within an average of 3 months of completing the training.
- Professional application documents: We help you to create appealing application documents and accompany you on the way to successful employment.
- Network and contacts: Use our extensive network of company contacts to find suitable job offers and advance your career."
The training is designed in such a way that it can also be completed with children without any problems. The course takes place daily from 9 a.m. to 4 p.m., whereby childcare can be guaranteed by completing the course from home.
Course Content
Information security concepts
-
Overview of information security
-
Risk management
-
Vulnerability assessment
-
Understanding CVSS
Common TCP/IP attacks
-
Legacy TCP/IP vulnerabilities
-
IP, ICMP, TCP and UDP vulnerabilities
-
Reconnaissance attacks, access attacks, man-in-the-middle attacks
-
Denial of service and distributed denial of service attacks
-
Reflection and reinforcement attacks
-
Spoofing and DHCP attacks
Attacks on network applications
-
Password and DNS-based attacks
-
DNS tunneling
-
Web-based attacks, HTTP 302 attenuation, command and SQL injections
-
Cross-site scripting and request forgery
-
E-mail-based attacks
Endpoint attacks
-
Buffer overflow, malware, reconnaissance attacks
-
Social engineering, exploit kits, rootkits, privilege escalation
-
After-use phase, Angler Exploit Kit
Network security technologies
-
Defense-in-depth strategy, defense across the attack continuum
-
Network segmentation, stateful firewall, security intelligence
-
Threat intelligence, network-based protection against malware
-
IPS, next-generation firewall, email and web content security
-
Threat analytic systems, DNS security
-
Authentication, authorization and billing, identity and access management
-
Virtual private network technology, network security devices
Cisco ASA Firewall
-
Implementation types, security levels, objects and object groups
-
Network address translation, interface and global ACLs
-
Advanced Access Policies, high availability
Cisco Firepower Next-Generation Firewall
-
Package processing and guidelines, objects, NAT
-
Pre-filter and access control policies, security intelligence
-
Detection and IPS policies, malware and file policies
E-mail content security
-
Overview, SMTP, e-mail pipeline, host access and recipient access table
-
Mail policies, protection against spam, graymail, viruses and malware
-
Outbreak filters, content filters, data loss protection, email encryption
Web Content Security
-
Cisco WSA, provisioning options, authentication
-
Decryption of HTTPS traffic, access policies, anti-malware protection
Cisco Umbrella
-
Architecture, Deployment, Roaming Client, Administration, Investigate
VPN technologies and cryptography
-
VPN definition, types, secure communication, cryptographic services
-
Keys in cryptography, public key infrastructure
Secure site-to-site VPN solutions from Cisco
-
Topologies, IPsec VPN, static crypto maps, dynamic multipoint VPN, FlexVPN
Cisco IOS VTI-based point-to-point VPNs
-
?configuration of static VTI point-to-point IPsec IKEv2 VPNs
Remote Access VPNs on Cisco ASA and Cisco Firepower NGFW
-
?concepts, connection profiles, group policies, remote access VPN configuration
Cisco Secure Network Access solutions
-
?components, AAA role, Identity Services Engine, TrustSec
802.1X authentication
-
?802.1X and EAP, methods, RADIUS, authorization changes
Endpoint security technologies
-
Host-based personal firewall, anti-virus, IPS
-
Application whitelists and blacklists, malware protection, sandboxing, file integrity
Cisco AMP for endpoints
-
Architecture, engines, retrospective security, management
Protection of the network infrastructure
-
?network device levels, security controls at the control, management and data levels
Security checks
-
?infrastructure ACLs, control plane policing, layer-2 and layer-3 data level
Practical hardware exercises / labs
-
Configuration of EIGRP, OSPF, BGP
-
Troubleshooting for EIGRP, OSPF, BGP
-
Routing protocol redistribution, policy-based routing, VRF-Lite, DMVPN, DHCP
-
Control and verification of network security and endpoint security
Conclusion
-
Cisco Certified Specialist - Security Core
-
This course prepares you for the "Implementing and Operating Cisco Security Core Technologies" exam (350-701 SCOR), which leads to CCNP Security certification.
