From the course: Cisco CCNP Security SCOR v1.1 (350-701) Cert Prep
Getting hands-on practice
From the course: Cisco CCNP Security SCOR v1.1 (350-701) Cert Prep
Getting hands-on practice
- One of the challenges with any Cisco exam is getting hands-on practice. This is particularly true with SCOR, where many of the technologies used here are harder to use in a home lab environment due to factors such as licensing cost. Before we get started, I want to show you a few good solutions for that. First, is the Cisco Demo Zone. This will allow you to view many instant demos for Cisco Security Solutions, such as Cisco ISE, Stealthwatch, AMP for Endpoints and Umbrella. From the Cisco Demo Zone page, you can search through their available live demos to access on-demand, instant demos from your web browser. The only requirement is that you have a free Cisco account. Similarly, Cisco dCloud also offers a catalog of demos and training sandboxes for solutions such as DNA Center and Stealthwatch Cloud. These include a mixed set of both instantly available live demos and solutions that you can reserve in four hour blocks. Again, the only requirement here is a valid set of Cisco single sign on credentials. And finally, we have the Cisco DevNet Sandbox containing many Sandbox labs available as Always-On instant access, and also some options available for an eight hour block once scheduled. The Always-On Labs can be instantly accessed from a browser, while the reserved labs do require that you submit a reservation request. Within a few minutes of doing so, you will receive an email with your labs set up instructions, which will require you to have the Cisco AnyConnect VPN software installed. The email you receive will contain instructions for connecting over VPN to the DevNet environment, and after that connection is made, you can access your Reserved lab appliances through HTTPS or SSH as required. If you're interested in following along throughout this course, as we examine security solutions such as Cisco Stealthwatch and Cisco Identity Services Engine, familiarizing yourself with these free available resources is a great way to do that. With that said, let's jump into the SCOR video training series.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
On-premises threats8m 42s
-
(Locked)
Cloud-based threats7m 42s
-
(Locked)
Software vulnerabilities4m 48s
-
(Locked)
SQL injection6m 47s
-
(Locked)
Buffer overflow5m 13s
-
(Locked)
Cross-site request forgery5m 7s
-
(Locked)
Hashing5m 44s
-
(Locked)
Encryption5m 19s
-
Public key infrastructure (PKI)5m 53s
-
(Locked)
IPsec9m 57s
-
(Locked)
NAT-T for IPsec4m 23s
-
(Locked)
Pre-shared key authentication7m 18s
-
(Locked)
Site-to-site VPN14m 12s
-
(Locked)
Remote access VPN10m 35s
-
(Locked)
sVTI-based VPN9m 20s
-
(Locked)
DMVPN24m 31s
-
FlexVPN5m 20s
-
(Locked)
Cisco DNA Center overview7m 38s
-
(Locked)
Cisco DNA Center and vManage APIs6m 21s
-
(Locked)
Python scripts8m 23s
-
(Locked)
-
-
(Locked)
IPS and firewall solutions4m 36s
-
(Locked)
Deployment models and architectures8m 21s
-
(Locked)
Device hardening5m 9s
-
(Locked)
Device management security5m 59s
-
(Locked)
NetFlow7m 15s
-
SNMPv316m 14s
-
(Locked)
Role-based CLI access7m 57s
-
(Locked)
NTP with authentication5m 32s
-
(Locked)
VLANs13m 6s
-
(Locked)
VRF-lite22m 5s
-
(Locked)
Port security5m 40s
-
DHCP snooping8m 4s
-
(Locked)
Dynamic ARP inspection4m 6s
-
(Locked)
Storm control7m 5s
-
(Locked)
PVLANs8m 55s
-
(Locked)
TACACS+ and RADIUS12m 33s
-
(Locked)
Downloadable ACL (dACL)5m 8s
-
(Locked)
-
-
Public, private, hybrid, and community clouds8m 4s
-
(Locked)
Cloud service models5m 38s
-
(Locked)
Customer vs. provider responsibility4m 59s
-
(Locked)
Patch management3m 41s
-
(Locked)
Security assessments4m 44s
-
(Locked)
Cloud-delivered security solutions7m 21s
-
(Locked)
DevSecOps5m 6s
-
(Locked)
Application and data security4m 31s
-
Policy management6m 7s
-
(Locked)
Cloud logging and monitoring4m 45s
-
(Locked)
Cloud application and workload security4m 16s
-
-
-
(Locked)
Secure internet gateway11m 30s
-
(Locked)
Blacklisting and whitelisting5m 42s
-
(Locked)
URL filtering and categorization4m 41s
-
(Locked)
Malware scanning3m 29s
-
(Locked)
Web application filtering2m 40s
-
(Locked)
TLS decryption5m 10s
-
(Locked)
Traffic redirection2m 48s
-
(Locked)
User authentication6m 57s
-
Spam filtering9m 12s
-
(Locked)
Data loss prevention (DLP)9m 52s
-
(Locked)
Email encryption9m 28s
-
Email blacklisting4m 40s
-
(Locked)
Antimalware filtering5m 22s
-
(Locked)
Cisco Umbrella overview8m 40s
-
(Locked)
Cisco Umbrella identities5m 11s
-
(Locked)
Cisco Umbrella URL content settings6m 1s
-
(Locked)
Cisco Umbrella destination lists3m 55s
-
(Locked)
Cisco Umbrella reporting4m 37s
-
(Locked)
-
-
(Locked)
Antimalware6m 8s
-
(Locked)
Retrospective security4m 59s
-
(Locked)
Indication of compromise (IOC)7m 3s
-
(Locked)
Antivirus4m 22s
-
(Locked)
Dynamic file analysis4m 39s
-
(Locked)
Endpoint device management3m 50s
-
(Locked)
Asset inventory6m 43s
-
(Locked)
Mobile device management (MDM)7m 16s
-
(Locked)
Multifactor authentication (MFA)5m 17s
-
(Locked)
Endpoint posture assessment6m 1s
-
(Locked)
Endpoint patching5m 16s
-
(Locked)
-
-
(Locked)
Guest services6m 48s
-
(Locked)
Profiling7m 32s
-
(Locked)
BYOD policies5m 52s
-
(Locked)
802.1X11m 11s
-
(Locked)
MAB4m 56s
-
(Locked)
WebAuth7m 43s
-
(Locked)
DNS tunneling3m 15s
-
(Locked)
HTTPS3m 50s
-
(Locked)
Email3m 12s
-
(Locked)
File transfer protocols3m 54s
-
(Locked)
ICMP4m 8s
-
(Locked)
NTP3m 34s
-
(Locked)
Cisco Stealthwatch6m 58s
-
(Locked)
Cisco Stealthwatch cloud5m 53s
-
(Locked)
Cisco pxGrid4m 10s
-
(Locked)
Cisco CTA and ETA6m 23s
-
(Locked)
Cisco AnyConnect Network Visibility Module (NVM)3m 26s
-
(Locked)