From the course: Cisco CCNP Security SCOR v1.1 (350-701) Cert Prep
Welcome to Cisco CCNP SCOR (350-701) cert prep, part 1
From the course: Cisco CCNP Security SCOR v1.1 (350-701) Cert Prep
Welcome to Cisco CCNP SCOR (350-701) cert prep, part 1
(light music) - [Instructor] Hello, and welcome to the Cisco CCCP SCOR 350-701 version 1.1 Cert Prep course. Your instructor for this course is going to be CCNP Charles Judd and throughout this course, Charles is going to be preparing you to pass the SCOR exam, and that's going to be done over 127 videos with a runtime of about 10.5 hours. Also be sure to download the quizzes under the Exercise Files Area here in your LinkedIn Learning course because there, you'll find 20 quizzes that map to this course's 20 lessons. And throughout this content, Charles is going to be covering every topic on the SCOR Exam Blueprint. At a high level, here are some of the topics you're going to be learning. You're going to be learning about fundamental security concepts, how to better secure our network, and today, many enterprises are moving their network resources out to the cloud, so you're going to be learning about cloud security. You'll see how to protect your content regardless of where it's stored, how to protect your endpoints, and then Charles will wrap things up with a look at Cisco Secure Access. Now if you're ready, Charles is ready, so I invite you to join him in our next video where he's going to give you some tips on getting hands-on practice throughout this course.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
On-premises threats8m 42s
-
(Locked)
Cloud-based threats7m 42s
-
(Locked)
Software vulnerabilities4m 48s
-
(Locked)
SQL injection6m 47s
-
(Locked)
Buffer overflow5m 13s
-
(Locked)
Cross-site request forgery5m 7s
-
(Locked)
Hashing5m 44s
-
(Locked)
Encryption5m 19s
-
Public key infrastructure (PKI)5m 53s
-
(Locked)
IPsec9m 57s
-
(Locked)
NAT-T for IPsec4m 23s
-
(Locked)
Pre-shared key authentication7m 18s
-
(Locked)
Site-to-site VPN14m 12s
-
(Locked)
Remote access VPN10m 35s
-
(Locked)
sVTI-based VPN9m 20s
-
(Locked)
DMVPN24m 31s
-
FlexVPN5m 20s
-
(Locked)
Cisco DNA Center overview7m 38s
-
(Locked)
Cisco DNA Center and vManage APIs6m 21s
-
(Locked)
Python scripts8m 23s
-
(Locked)
-
-
(Locked)
IPS and firewall solutions4m 36s
-
(Locked)
Deployment models and architectures8m 21s
-
(Locked)
Device hardening5m 9s
-
(Locked)
Device management security5m 59s
-
(Locked)
NetFlow7m 15s
-
SNMPv316m 14s
-
(Locked)
Role-based CLI access7m 57s
-
(Locked)
NTP with authentication5m 32s
-
(Locked)
VLANs13m 6s
-
(Locked)
VRF-lite22m 5s
-
(Locked)
Port security5m 40s
-
DHCP snooping8m 4s
-
(Locked)
Dynamic ARP inspection4m 6s
-
(Locked)
Storm control7m 5s
-
(Locked)
PVLANs8m 55s
-
(Locked)
TACACS+ and RADIUS12m 33s
-
(Locked)
Downloadable ACL (dACL)5m 8s
-
(Locked)
-
-
Public, private, hybrid, and community clouds8m 4s
-
(Locked)
Cloud service models5m 38s
-
(Locked)
Customer vs. provider responsibility4m 59s
-
(Locked)
Patch management3m 41s
-
(Locked)
Security assessments4m 44s
-
(Locked)
Cloud-delivered security solutions7m 21s
-
(Locked)
DevSecOps5m 6s
-
(Locked)
Application and data security4m 31s
-
Policy management6m 7s
-
(Locked)
Cloud logging and monitoring4m 45s
-
(Locked)
Cloud application and workload security4m 16s
-
-
-
(Locked)
Secure internet gateway11m 30s
-
(Locked)
Blacklisting and whitelisting5m 42s
-
(Locked)
URL filtering and categorization4m 41s
-
(Locked)
Malware scanning3m 29s
-
(Locked)
Web application filtering2m 40s
-
(Locked)
TLS decryption5m 10s
-
(Locked)
Traffic redirection2m 48s
-
(Locked)
User authentication6m 57s
-
Spam filtering9m 12s
-
(Locked)
Data loss prevention (DLP)9m 52s
-
(Locked)
Email encryption9m 28s
-
Email blacklisting4m 40s
-
(Locked)
Antimalware filtering5m 22s
-
(Locked)
Cisco Umbrella overview8m 40s
-
(Locked)
Cisco Umbrella identities5m 11s
-
(Locked)
Cisco Umbrella URL content settings6m 1s
-
(Locked)
Cisco Umbrella destination lists3m 55s
-
(Locked)
Cisco Umbrella reporting4m 37s
-
(Locked)
-
-
(Locked)
Antimalware6m 8s
-
(Locked)
Retrospective security4m 59s
-
(Locked)
Indication of compromise (IOC)7m 3s
-
(Locked)
Antivirus4m 22s
-
(Locked)
Dynamic file analysis4m 39s
-
(Locked)
Endpoint device management3m 50s
-
(Locked)
Asset inventory6m 43s
-
(Locked)
Mobile device management (MDM)7m 16s
-
(Locked)
Multifactor authentication (MFA)5m 17s
-
(Locked)
Endpoint posture assessment6m 1s
-
(Locked)
Endpoint patching5m 16s
-
(Locked)
-
-
(Locked)
Guest services6m 48s
-
(Locked)
Profiling7m 32s
-
(Locked)
BYOD policies5m 52s
-
(Locked)
802.1X11m 11s
-
(Locked)
MAB4m 56s
-
(Locked)
WebAuth7m 43s
-
(Locked)
DNS tunneling3m 15s
-
(Locked)
HTTPS3m 50s
-
(Locked)
Email3m 12s
-
(Locked)
File transfer protocols3m 54s
-
(Locked)
ICMP4m 8s
-
(Locked)
NTP3m 34s
-
(Locked)
Cisco Stealthwatch6m 58s
-
(Locked)
Cisco Stealthwatch cloud5m 53s
-
(Locked)
Cisco pxGrid4m 10s
-
(Locked)
Cisco CTA and ETA6m 23s
-
(Locked)
Cisco AnyConnect Network Visibility Module (NVM)3m 26s
-
(Locked)