350-701: Implementing and Operating Cisco Security Core Technologies

350-701: Implementing and Operating Cisco Security Core Technologies

BEST SELLER 260 Lectures 26h 55m

Prepare for your Cisco examination with our training course. The 350-701 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to Cisco certification exam. Pass the Cisco 350-701 test with flying colors.

$13.99 $24.99

Curriculum For This Course

6 lectures 24m
  • 1. Cisco Certification Updates - FEB 2020
    11m
  • 2. Cisco Re-Certifications
    1m
  • 3. CCNP Certifications
    1m
  • 4. CCIE Certifications
    2m
  • 5. Cisco Certification Migration Options
    6m
  • 6. CCNP Required Exams
    3m

3 lectures 15m
  • 1. CCNP Security Certifications
    7m
  • 2. CCNP SCOR - 350-701
    1m
  • 3. SCOR 350-701 Contents
    7m

7 lectures 47m
  • 1. Network Security Terminology
    6m
  • 2. Goals of Network Security
    10m
  • 3. Threat Types - Mitigation
    9m
  • 4. Assets - Classification of Assets
    6m
  • 5. Classify Counter Measures
    4m
  • 6. Classify Vulnerabilities
    2m
  • 7. Network Security - Design Principles
    10m

14 lectures 50m
  • 1. Motivations behind Network Attacks
    3m
  • 2. Social Engineering Attacks
    4m
  • 3. Phishing Attacks
    4m
  • 5. Denial of Service Attacks - DoS
    5m
  • 6. Distributed Denial of Service Attakcs - DDoS
    4m
  • 7. Spoofing Attacks
    4m
  • 8. Spoofing Attacks - Mitigation
    4m
  • 9. Man in the Middle Attacks -MiTM
    2m
  • 10. Password Attacks
    5m
  • 11. Password Attacks - Mitigation
    4m
  • 12. Reflector Attacks
    2m
  • 13. Amplification Attacks
    2m
  • 14. Reconnaissance Attacks
    5m
  • 15. Reconnaissance Attacks - Mitigation
    2m

6 lectures 7m
  • 1. Malicious Codes - VIRUS
    2m
  • 2. Malicious Codes - WORMS
    1m
  • 3. Malicious Codes - TROJAN HORSES
    1m
  • 4. Hacking
    1m
  • 5. Hackers - Script Kiddies
    1m
  • 6. Malware Service - DARKNET
    1m

6 lectures 37m
  • 1. AAA - Network Security
    11m
  • 2. Cisco Telemetry Services
    4m
  • 3. Firewall
    8m
  • 4. Intrusion Prevention System - IPS
    4m
  • 5. Virtual Private Networks
    4m
  • 6. Next Generation Firewalls
    6m

11 lectures 1h 7m
  • 1. Cisco Lab Options
    8m
  • 2. About GNS3
    4m
  • 3. Installing GNS3 - Windows
    7m
  • 4. GNS3 - IOS Images
    6m
  • 5. Default Topology - GNS3 - IOS initial Configs
    5m
  • 6. IOS Default Topology
    9m
  • 7. GNS3 Topology-HOST Computer
    6m
  • 8. GNS3 - VMware Setup
    9m
  • 9. GNS3 - IOSv L2-L3
    6m
  • 10. GNS3 - ASAv Setup
    4m
  • 11. GNS3 - IOU-L2-L3
    3m

5 lectures 19m
  • 1. Network Infrastructure Protection
    5m
  • 2. Identify Network Device Planes
    2m
  • 3. Data Plane
    6m
  • 4. Control Plane
    3m
  • 5. Management Plane
    3m

3 lectures 22m
  • 1. Inband Vs OutBand Management
    7m
  • 2. Remote Access - TELNET
    6m
  • 3. Remote Access - SSH
    9m

6 lectures 41m
  • 1. Cisco Telemetry Services
    4m
  • 2. Device- Network Events Logging
    10m
  • 3. Syslog - Terminal Logging
    7m
  • 4. Network Time Protocol
    7m
  • 5. NTP Stratum Value
    4m
  • 6. NTP Configuration - LAB
    9m

5 lectures 45m
  • 1. Control Plane Security - Possible Threats
    9m
  • 2. Routing Protocol Authentication
    12m
  • 3. Control Plane Policing - CoPP
    7m
  • 4. Class-Map - Policy Map - Hierarchy
    5m
  • 5. CoPP - Configuration Examples
    12m

8 lectures 41m
  • 1. Switch Security - Overview
    2m
  • 2. Disable Unused Ports
    1m
  • 3. Dynamic Trunking Protocol - DTP
    8m
  • 4. DTP Vulnerabilities - Mitigation
    2m
  • 5. VLAN Hopping Attacks - Mitigation
    5m
  • 6. Cisco Discovery Protocol - CDP
    18m
  • 7. Link Layer Discovery Protocol - LLDP
    3m
  • 8. CDP- LLDP Vulnerabilities - Mitigation
    2m

14 lectures 2h 12m
  • 1. MAC Flooding Attack - Port Security
    12m
  • 2. MAC Spoofing Attack - Port Security
    7m
  • 3. Port Security - Configuration
    11m
  • 4. Spanning Tree Port Fast
    7m
  • 5. Native VLAN
    8m
  • 6. DHCP Spoofing Attack - DHCP Spoofing
    8m
  • 7. DHCP Snooping - Configuration
    16m
  • 8. DHCP Starvation Attack - Mitigation
    2m
  • 9. ARP Spoofing Attack - DAI
    12m
  • 10. Dynamic ARP Inspection - Configuration
    12m
  • 11. Protected Ports- Private VLAN Edge
    3m
  • 12. Private VLAN
    9m
  • 13. Private VLAN - Configuration
    5m
  • 14. Private VLAN - LAB
    20m

6 lectures 37m
  • 1. What is Firewall
    8m
  • 2. Statefull Packet Filtering
    8m
  • 3. Stateless Packet Filtering
    4m
  • 4. Application Level Gateways - Proxy Servers
    5m
  • 5. Next Generation Firewalls
    6m
  • 6. FIrewall Vendors in Market
    6m

4 lectures 30m
  • 1. Cisco Statefull Firewalls - IOS - ASA
    3m
  • 2. ASA Supported Features _ PART1
    9m
  • 3. ASA Supported Features _ PART2
    11m
  • 4. ASS Compare Models
    7m

6 lectures 38m
  • 1. Manage Cisco CLI - ASA - GUI
    3m
  • 2. Basic CLI Modes - Commands
    4m
  • 3. ASA Security Levels
    10m
  • 4. ASA Interface Configurations
    5m
  • 5. ASA Security Policies - Default
    11m
  • 6. ASA Routing
    5m

5 lectures 41m
  • 1. ASA ACls - Overview
    9m
  • 2. ASA ACLS - Basic Example
    7m
  • 3. Traffic Between Same Security Levels
    3m
  • 4. ACL Object Groups
    10m
  • 5. ACL Object Groups - LAB
    12m

9 lectures 59m
  • 1. PRivate IP - Public IP
    5m
  • 2. What is NAT ?
    3m
  • 3. NAT Types
    6m
  • 4. Dynamic NAT - on ASA
    10m
  • 5. Dynamic PAT- ASA
    5m
  • 6. Dynamic PAT - with Exit interface
    5m
  • 7. Dynamic NAT-PAT Combination
    2m
  • 8. Static NAT - ASA
    12m
  • 9. Static PAT- ASA
    11m

8 lectures 40m
  • 1. IOS - Zone Based Firewall
    3m
  • 2. ZBF - Configuration Overview
    4m
  • 3. ZBF - Security Zones
    3m
  • 4. ZBF - Default Flow
    3m
  • 5. Class-Map - Policy Map - Hierarchy
    5m
  • 6. ZBF - Classify Traffic using Class-Maps
    6m
  • 7. ZBF- Class-map Configuration
    5m
  • 8. ZBF - POlicy Map - Zone Pairs
    11m

9 lectures 29m
  • 1. What is Cryptography
    3m
  • 2. Goals of Cryptography
    3m
  • 3. Hashing-How it Works
    3m
  • 4. Hashing with HMAC
    3m
  • 5. What is Encryption - Decryption
    1m
  • 6. Encryption Algorithms - Symmetric vs Assymetric
    5m
  • 7. Cryptanalysis - Attacks
    4m
  • 8. Asymmetric Encryption - Drawbacks
    3m
  • 9. Public Key Infrastructure - PKI
    4m

4 lectures 15m
  • 1. Virutal Private Network - Introduction
    5m
  • 2. VPN Types - Site to Site / Remote Access
    4m
  • 3. VPN Logical Topologies
    1m
  • 4. VPN Default Lab Setup - Routers
    5m

3 lectures 15m
  • 1. What is IPSec ?
    3m
  • 2. IPsec Security Services
    7m
  • 3. IPSec Modes - Tunnel vs Transport
    5m

5 lectures 32m
  • 1. How IPsec VPN Works
    5m
  • 2. Step-1 - Interesting Traffic
    3m
  • 3. Step-2 IKE Phase-1
    8m
  • 4. Step-3 - IKE Phase 2
    9m
  • 5. IKE Phase 2 - Configuration/ Verification
    7m

5 lectures 24m
  • 1. Remote Access VPN
    3m
  • 2. What is SSL-TLS
    3m
  • 3. How SSL-TLS Works
    8m
  • 4. What is SSL VPN
    4m
  • 5. SSL VPN - Modes
    6m

4 lectures 27m
  • 1. AAA - Network Security
    11m
  • 2. AAA - Components
    4m
  • 3. AAA Protocols - TACACS - RADIUS
    8m
  • 4. AAA- Cisco Authentication Servers
    4m

4 lectures 28m
  • 1. AAA Authentication - Device Access
    3m
  • 2. Authentication Local database
    10m
  • 3. AAA External Servers
    3m
  • 4. Authentication - External server (TACACS)
    12m

10 lectures 1h 6m
  • 1. Authorization - Device Access
    3m
  • 2. IOS Privilege Levels
    9m
  • 3. Local Authorization using Privilege Levels
    14m
  • 4. IOS Privilege Levels _ Limitations
    5m
  • 5. Role based CLI Access - RBAC
    6m
  • 6. RBAC Views - Types
    4m
  • 7. RBAC Views - LAB1
    10m
  • 8. Modify RBAC Views - LAB 2
    4m
  • 9. Modify RBAC Views - LAB 3
    6m
  • 10. RBAC - Super Views
    5m

4 lectures 24m
  • 1. Web Access - Possible Threats
    4m
  • 2. Web Based Attacks-
    5m
  • 3. Web Attack Examples
    10m
  • 4. Web Security Solutions
    5m

6 lectures 37m
  • 1. Cisco Web Security - WSA-CWS
    5m
  • 2. What is WSA ?
    9m
  • 3. WSA- HOw it Works
    5m
  • 4. WSA Deployment Modes
    6m
  • 5. WSA models - Physical -Virtual Appliance
    5m
  • 6. WSA Licensing Options
    7m

2 lectures 5m
  • 1. Email Based Threats
    2m
  • 2. Cisco Email Security Appliance - ESA
    3m

9 lectures 38m
  • 1. Intrusion Prevention System - IPS
    3m
  • 2. IDS vs IPS
    2m
  • 3. Host Based IPS vs Network Based IPS
    6m
  • 4. IPS Deployment Modes - INline vs Promiscious
    3m
  • 5. Cisco IPS Solutions
    5m
  • 6. IPS Threat Detection Methods
    7m
  • 7. IPS Signature Alarm Types
    3m
  • 8. IPS Signature Actions
    3m
  • 9. IPS Evasion Methods - CounterMeasures
    6m

4 lectures 47m
  • 1. What is Network Management
    8m
  • 2. Past-Present Methods of Network Mangement- PART 1
    14m
  • 3. Past-Present Methods of Network Mangement- PART 2
    7m
  • 4. SNMP- Simple Network Mangement Protocol
    18m

6 lectures 1h 2m
  • 1. Challenges - Traditional Management
    11m
  • 2. Network Automation - Goals
    16m
  • 3. Types of Network Automation
    6m
  • 4. What can be Automated - PART 1
    12m
  • 5. What can be Automated - PART 2
    9m
  • 6. Impact of Network Automation
    8m

4 lectures 45m
  • 1. Automation Origination Points
    8m
  • 2. SDN - Software Defined Networking
    15m
  • 3. SDN Controllers
    9m
  • 4. Networks Managed by SDN Controllers
    13m

2 lectures 16m
  • 1. Management Plane
    3m
  • 2. SDN-Management Plane
    7m

6 lectures 41m
  • 1. SDN - Imperative Model
    5m
  • 2. SDN - Declarative Model
    7m
  • 3. SDN - Network Design Requirments
    9m
  • 4. UNderlaY Networks
    7m
  • 5. Overlay Networks
    7m
  • 6. SDN Fabric
    6m

5 lectures 41m
  • 1. Application Programming Interface - API
    11m
  • 2. API Types
    4m
  • 3. API - With SDN Networks
    9m
  • 4. NorthBound API
    9m
  • 5. SouthBound API
    8m

5 lectures 27m
  • 1. Cisco DevNet
    5m
  • 2. DevNet Certifications
    5m
  • 3. DevNet Sandbox
    6m
  • 4. DevNet Sandbox LABS
    8m
  • 5. Sandbox LAB Access - Reservations
    3m

4 lectures 44m
  • 1. Cisco DNA Center
    16m
  • 2. DNA Center Appliance
    4m
  • 3. DNA Center- What can do - PART 1
    11m
  • 4. DNA Center- What can do - PART 2
    13m

3 lectures 24m
  • 1. Web Service API
    8m
  • 2. Web Service API - Commonly Used
    8m
  • 3. REST API
    8m

6 lectures 43m
  • 1. Config Management Tools
    6m
  • 2. Config Management Tools - Capabilities
    9m
  • 3. Master-Agent
    6m
  • 4. Agent Based vs Agentless
    7m
  • 5. Push-Pull Model
    10m
  • 6. Configuration Files
    5m

6 lectures 24m
  • 1. PUPPET - Config MGMT Tool
    3m
  • 2. PUPPET-Master Agent Database
    3m
  • 3. PUPPET - Manifest
    5m
  • 4. PUPPET-Module-Forge
    6m
  • 5. PUPPET-Agent- Agentless
    3m
  • 6. PUPPET-PULL Model Steps
    4m

2 lectures 13m
  • 1. CHEF- Config MGMT Tool
    6m
  • 2. CHEF- Terminology
    7m

4 lectures 23m
  • 1. ANSIBLE- COnfig MGMT Tool
    8m
  • 2. ANSIBLE- Control Station
    3m
  • 3. ANSIBLE- PlayBook-Inventory
    5m
  • 4. ANSIBLE- Templates-Variables
    7m

5 lectures 33m
  • 1. API Data Formats
    8m
  • 2. JSON Overview
    8m
  • 3. JSON Data Types
    7m
  • 4. JSON Syntax Rules
    3m
  • 5. JSON Data Interpretation
    7m
VTSimu
VTSimu Exam Simulator
How to open .dumpsarena files

Use Free VTSimu Exam Simulator to open .dumpsarena files

VTSimu Exam Simulator

Satisfaction Guaranteed

98.4% DumpsArena users pass

Our team is dedicated to delivering top-quality exam practice questions. We proudly offer a hassle-free satisfaction guarantee.

Why choose DumpsArena?

23,812+

Satisfied Customers Since 2018

  • Always Up-to-Date
  • Accurate and Verified
  • Free Regular Updates
  • 24/7 Customer Support
  • Instant Access to Downloads
Secure Experience

Guaranteed safe checkout.

At DumpsArena, your shopping security is our priority. We utilize high-security SSL encryption, ensuring that every purchase is 100% secure.

SECURED CHECKOUT
Need Help?

Feel free to contact us anytime!

Contact Support