From the course: Cisco CCNP Security SCOR v1.1 (350-701) Cert Prep
Unlock this course with a free trial
Join today to access over 24,500 courses taught by industry experts.
Next steps
From the course: Cisco CCNP Security SCOR v1.1 (350-701) Cert Prep
Next steps
(light music) - [Instructor] Congratulations on completing your SCOR Cert Prep course. Now, let's talk about next steps. After you pass the SCOR exam, that is the core exam for your CCNP Security certification. By the way, it's also your qualification exam for the Cisco CCIE in Security, but focused on the NP in security, let's talk about a possible next step. After passing the core exam of SCOR, you can then select a concentration exam to complete your CCNP security certification. Those two exams, SCOR plus one of the concentration exams, that's all you need for your CCNP in security. Now, let's take a look at your options. A really popular option is SNCF, where you'll learn about securing networks with Cisco Firewalls. SISE, that's all about configuring Cisco ISE, the Identity Services Engine. Another option for you is SESA. There you'll be securing email with the Cisco Secure Email Gateway. Yet another option is securing the web with the Cisco Secure Web Appliance. VPNs, you know…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
On-premises threats8m 42s
-
(Locked)
Cloud-based threats7m 42s
-
(Locked)
Software vulnerabilities4m 48s
-
(Locked)
SQL injection6m 47s
-
(Locked)
Buffer overflow5m 13s
-
(Locked)
Cross-site request forgery5m 7s
-
(Locked)
Hashing5m 44s
-
(Locked)
Encryption5m 19s
-
Public key infrastructure (PKI)5m 53s
-
(Locked)
IPsec9m 57s
-
(Locked)
NAT-T for IPsec4m 23s
-
(Locked)
Pre-shared key authentication7m 18s
-
(Locked)
Site-to-site VPN14m 12s
-
(Locked)
Remote access VPN10m 35s
-
(Locked)
sVTI-based VPN9m 20s
-
(Locked)
DMVPN24m 31s
-
FlexVPN5m 20s
-
(Locked)
Cisco DNA Center overview7m 38s
-
(Locked)
Cisco DNA Center and vManage APIs6m 21s
-
(Locked)
Python scripts8m 23s
-
(Locked)
-
-
(Locked)
IPS and firewall solutions4m 36s
-
(Locked)
Deployment models and architectures8m 21s
-
(Locked)
Device hardening5m 9s
-
(Locked)
Device management security5m 59s
-
(Locked)
NetFlow7m 15s
-
SNMPv316m 14s
-
(Locked)
Role-based CLI access7m 57s
-
(Locked)
NTP with authentication5m 32s
-
(Locked)
VLANs13m 6s
-
(Locked)
VRF-lite22m 5s
-
(Locked)
Port security5m 40s
-
DHCP snooping8m 4s
-
(Locked)
Dynamic ARP inspection4m 6s
-
(Locked)
Storm control7m 5s
-
(Locked)
PVLANs8m 55s
-
(Locked)
TACACS+ and RADIUS12m 33s
-
(Locked)
Downloadable ACL (dACL)5m 8s
-
(Locked)
-
-
Public, private, hybrid, and community clouds8m 4s
-
(Locked)
Cloud service models5m 38s
-
(Locked)
Customer vs. provider responsibility4m 59s
-
(Locked)
Patch management3m 41s
-
(Locked)
Security assessments4m 44s
-
(Locked)
Cloud-delivered security solutions7m 21s
-
(Locked)
DevSecOps5m 6s
-
(Locked)
Application and data security4m 31s
-
Policy management6m 7s
-
(Locked)
Cloud logging and monitoring4m 45s
-
(Locked)
Cloud application and workload security4m 16s
-
-
-
(Locked)
Secure internet gateway11m 30s
-
(Locked)
Blacklisting and whitelisting5m 42s
-
(Locked)
URL filtering and categorization4m 41s
-
(Locked)
Malware scanning3m 29s
-
(Locked)
Web application filtering2m 40s
-
(Locked)
TLS decryption5m 10s
-
(Locked)
Traffic redirection2m 48s
-
(Locked)
User authentication6m 57s
-
Spam filtering9m 12s
-
(Locked)
Data loss prevention (DLP)9m 52s
-
(Locked)
Email encryption9m 28s
-
Email blacklisting4m 40s
-
(Locked)
Antimalware filtering5m 22s
-
(Locked)
Cisco Umbrella overview8m 40s
-
(Locked)
Cisco Umbrella identities5m 11s
-
(Locked)
Cisco Umbrella URL content settings6m 1s
-
(Locked)
Cisco Umbrella destination lists3m 55s
-
(Locked)
Cisco Umbrella reporting4m 37s
-
(Locked)
-
-
(Locked)
Antimalware6m 8s
-
(Locked)
Retrospective security4m 59s
-
(Locked)
Indication of compromise (IOC)7m 3s
-
(Locked)
Antivirus4m 22s
-
(Locked)
Dynamic file analysis4m 39s
-
(Locked)
Endpoint device management3m 50s
-
(Locked)
Asset inventory6m 43s
-
(Locked)
Mobile device management (MDM)7m 16s
-
(Locked)
Multifactor authentication (MFA)5m 17s
-
(Locked)
Endpoint posture assessment6m 1s
-
(Locked)
Endpoint patching5m 16s
-
(Locked)
-
-
(Locked)
Guest services6m 48s
-
(Locked)
Profiling7m 32s
-
(Locked)
BYOD policies5m 52s
-
(Locked)
802.1X11m 11s
-
(Locked)
MAB4m 56s
-
(Locked)
WebAuth7m 43s
-
(Locked)
DNS tunneling3m 15s
-
(Locked)
HTTPS3m 50s
-
(Locked)
Email3m 12s
-
(Locked)
File transfer protocols3m 54s
-
(Locked)
ICMP4m 8s
-
(Locked)
NTP3m 34s
-
(Locked)
Cisco Stealthwatch6m 58s
-
(Locked)
Cisco Stealthwatch cloud5m 53s
-
(Locked)
Cisco pxGrid4m 10s
-
(Locked)
Cisco CTA and ETA6m 23s
-
(Locked)
Cisco AnyConnect Network Visibility Module (NVM)3m 26s
-
(Locked)