Skip to main content Skip to main navigation

Cisco CCNP and CCIE Security Core SCOR 350-701 Training Course

  • Designed for results
  • World-class experts
  • Flexible online learning
$250

Everything you need

  • Video-based lessons (12 hours)
  • Interactive lab exercises
  • Self-study quizzes
  • Practice tests
  • 1-year access

Course experts

  • Omar Santos

    Best-selling Cisco Press author, expert trainer, and Principal Engineer at Cisco (PSIRT)

    Omar Santos

Overview

Everything you need to prepare for and pass the CCNP and CCIE Security Core SCOR 350-701 exam.

Overview

The CCNP and CCIE Security Core SCOR 350-701 Training Course is a complete, self-paced study solution that is designed to fit into your busy schedule. Learn through expert video-based lessons enhanced with hands-on labs, selected readings, self-study quizzes, plus exclusive Pearson Test Prep practice exams to help you determine your preparedness for the exam. CCNA 200-301 also offers live training events with topical deep dives and practice question review.

The CCNP and CCIE Security Core SCOR 350-701 Training Course is designed to fully prepare you for all aspects of the exam. Security professionals who already hold the CCNP Security certification and are currently preparing to advance to the CCIE Security certification will also find the contents of this course extremely beneficial in their studies.

The course walks through the vast array of security topics through dynamic presentations, demos, and illustrated techniques to help you attain a better grasp of how all of these security threats, preventative measures, and mitigation methods coalesce. The end result of this understanding is to help you perform confidently on the exam as well as in your professional life. The course instructor, Omar Santos, is a Principal Engineer of the Cisco Product Security Incident Response Team (PSIRT). Omar is very active and a well-known subject matter expert in the security arena.

Through detailed exploration, configuration demos, and troubleshooting implementations, this course methodically guides you through the topics of general security concepts; network security; cloud security; content security; endpoint protection and detection; and network access, visibility, and enforcement. Not coincidentally, these are the six main domains outlined in the SCOR 350-701 exam blueprint.

Course includes

  • 12 hours of video-based lessons enhanced with selected readings curated by industry experts
  • Hands-on labs to simulate real-world environments
  • Self-study quizzes to test your progress as you work through the course
  • Flash cards to study key terms
  • Exclusive Pearson Test Prep practice exams to determine your preparedness for the exam

Learn how to

  • Identify, mitigate, and prevent common cybersecurity threats
  • Understand and implement various cryptography methods
  • Apply Software-Defined Networking (SDN) and network programmability to streamline your networks security
  • Manage network access, authentication, and user identity through proven tools and techniques
  • Maintain the integrity of network infrastructure security through network tools, firewalls, and intrusion prevention systems
  • Implement site-to-site and remote access virtual private networks (VPNs)
  • Secure your network content in on-premise and in the Cloud
  • Implement Endpoint Threat Detection and Response (ETDR) and Endpoint Detection and Response (EDR)
  • Pass the CCNP Security Core SCOR 350-701 exam
  • Prepare for the CCIE Security certification

Skill level

  • Intermediate to advanced

Who should take this course

  • CCNP Security certification candidates
  • CCIE Security certification candidates
  • Network designers, administrators, and engineers
  • Network security professionals

Course requirements

  • Skills and knowledge equivalent to those holding a CCNA certification
  • Working knowledge of Ethernet, TCP/IP, and Cisco IOS networking concepts
  • Basic understanding of core security technologies

Retake guarantee

Retake guaranteeDidn't pass your certification exam on your first try? We'll give you six months' continued access at no cost.

About Pearson Training Courses

Pearson Training Courses offer a set of complete and affordable packages of expert-led, self-paced courses to prepare you for exam success. From technology learning to knowledge retention to test prep, these comprehensive courses will help you take your career to the next level.

Support the latest version of Edge, Google Chrome, Firefox, and Safari on the following devices.
Important note: Hands-on labs require desktop access.

  1. Desktop
    1. Windows systems with Windows 10
    2. Mac systems with MacOS Catalina+
  1. Android
    1. Samsung s10: OS version 10x/9x
  1. iOS
    1. iPhone 11/11 PRO: iOS 14x/13x
    2. iPhone XR: iOS 14x/13x
    3. iPhone X: iOS 14x/13x
    4. iPhone 7: iOS 14x/13x
    5. iPad Air 2019: iOS 14x/13x

Course experts

  • Omar Santos - Principal engineer, security expert, and author

    Omar Santos

    Omar Santos is a Principal Engineer of the Cisco Product Security Incident Response Team (PSIRT). Omar is the author of more than 20 books and video courses and has been quoted by numerous media outlets, such as TheRegister, Wired, ZDNet, ThreatPost, CyberScoop, TechCrunch, Fortune Magazine, Ars Technica, and more. You can follow Omar on Twitter @santosomar.

  • Ron Taylor Author, speaker, and Cisco Security Architect

    Omar Santos

    Ron Taylor has been in the information security field for almost 20 years, and works in the Cisco Product Security Incident Response Team (PSIRT). He has held a number of industry certifications, including GPEN, GWEB, GCIA, GCIH, GWAPT, RHCE, CCSP, CCNA, CISSP, and MCSE. Ron is also a Cisco Security Blackbelt, SANS mentor, cofounder and president of the Raleigh BSides Security Conference, and an active member of the Packet Hacking Village team at Defcon. You can follow Ron on Twitter @Gu5G0rman.

Course outline

  1. Overview
  1. Module 1: Introduction
  2. Lesson 1: Understanding Common Cybersecurity Threats Against On-premise and Cloud Environments
    1. Lesson 1 Learning objectives
    2. 1.1 Understanding Malware, Viruses, Trojans, and Rootkits
    3. 1.2 Keyloggers and Spyware
    4. 1.3 Malware Analysis Techniques
    5. 1.4 Surveying Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks
    6. 1.5 Surveying Common Application-based Vulnerabilities
    7. 1.6 Exploiting Cross-site Scripting (XSS) and Cross-site Request Forgery (CSRF) Vulnerabilities
    8. 1.7 Exploiting Authentication and Authorization-based Vulnerabilities
    9. 1.8 Understanding SQL Injection and Path Traversal Vulnerabilities
    10. 1.9 Understanding Buffer Overflows
    11. 1.1 Surveying Unsecure Code Practices and Insecure APIs
    12. 1.11 Understanding Security Threats in Cloud Environments
    13. 1.12 Understanding IoT Security Threats
  3. Lesson 1: Review
    1. Lesson 1 Flashcards
    2. Lesson 1 Quiz
  4. Lesson 1: Interactive Labs
  5. Lesson 2: Cryptography
    1. Lesson 2 Learning objectives
    2. 2.1 Introducing Cryptography and Cryptanalysis
    3. 2.2 Understanding Encryption Protocols
    4. 2.3 Describing Hashing Algorithms
    5. 2.4 Introducing Public Key Infrastructure (PKI)
    6. 2.5 Introducing Certificate Authorities (CAs) and Certificate Enrollment
    7. 2.6 Surveying SSL and TLS Implementations
    8. 2.7 Surveying IPsec Implementations
  6. Lesson 2: Review
    1. Lesson 2 Flashcards
    2. Lesson 2 Quiz
  7. Lesson 2: Interactive Labs
  8. Module 1: Quiz
  1. Module 2: Introduction
  2. Lesson 3: Software-Defined Networking Security
    1. Lesson 3 Learning objectives
    2. 3.1 Introducing SDN
    3. 3.2 Explaining North Bound and South Bound APIs in the SDN Architecture
    4. 3.3 Introducing Cisco ACI
    5. 3.4 Introducing Cisco DNA and Cisco DNA Center
    6. 3.5 Understanding VXLAN and Network Overlays
    7. 3.6 Understanding Microsegmentation
    8. 3.7 Surveying Open Source SDN Solutions
    9. 3.8 Understanding the Threats Against SDN Solutions
    10. 3.9 Understanding the Security Benefits in SDN Solutions
  3. Lesson 3: Review
    1. Lesson 3 Flashcards
    2. Lesson 3 Quiz
  4. Lesson 3: Interactive Labs
  5. Lesson 4: Network Programmability
    1. Lesson 4 Learning objectives
    2. 4.1 Introducing Network Programmability
    3. 4.2 Exploring DevNet and DevNet Resources for Security Automation
    4. 4.3 Introducing APIs, NETCONF, RESTCONF, and YANG
    5. 4.4 A Brief Introduction to Git
    6. 4.5 Exploring pxGrid
    7. 4.6 Integrating and Automating Security Operations with Cisco Products
  6. Lesson 4: Review
    1. Lesson 4 Flashcards
    2. Lesson 4 Quiz
  7. Lesson 4: Interactive Labs
  8. Module 2: Quiz
  1. Module 3: Introduction
  2. Lesson 5: Introducing AAA and Identity Management
    1. Lesson 5 Learning objectives
    2. 5.1 Understanding Authentication
    3. 5.2 Exploring the RADIUS Protocol
    4. 5.3 Surveying the TACACS+ Protocol
    5. 5.4 Understanding Authorization
    6. 5.5 Surveying Authorization Models
    7. 5.6 Defining Accounting
    8. 5.7 Exploring Multifactor Authentication and Single Sign-On
    9. 5.8 Exploring Examples of Multifactor and Single Sign-On
    10. 5.9 Understanding Cisco Duo
    11. 5.1 Introducing Cisco ISE
    12. 5.11 Understanding Cisco ISE Profiling Services
    13. 5.12 Understanding ISE Identity Services
    14. 5.13 Describing ISE Authorization Rules
  3. Lesson 5: Review
    1. Lesson 5 Flashcards
    2. Lesson 5 Quiz
  4. Lesson 5: Interactive Labs
  5. Lesson 6: Secure Network Access, Visibility, and Segmentation
    1. Lesson 6 Learning objectives
    2. 6.1 Defining Network Visibility and Segmentation
    3. 6.2 Introducing NetFlow and IPFIX
    4. 6.3 Describing Flexible NetFlow Records
    5. 6.4 Understanding NetFlow Deployment
    6. 6.5 Exploring Cisco Stealthwatch
    7. 6.6 Deploying Cisco Stealthwatch Cloud
    8. 6.7 On-Premise Monitoring with Stealthwatch Cloud
    9. 6.8 Exploring the Cisco TrustSec Solution
    10. 6.9 Describing the Benefits of Device Compliance and Application Control
    11. 6.1 Introducing Network Segmentation
    12. 6.11 Exploring Application-based Segmentation
    13. 6.12 Understanding Cisco ACI
    14. 6.13 Describing Network Access with CoA
    15. 6.14 Integrating Different Security Systems Using pxGrid
    16. 6.15 Exploring Cisco Encrypted Traffic Analytics (ETA), Cisco Cognitive Threat Analytics (CTA), and Cisco Threat Grid
  6. Lesson 6: Review
    1. Lesson 6 Flashcards
    2. Lesson 6 Quiz
  7. Lesson 6: Interactive Labs
  8. Module 3: Quiz
  1. Module 4: Introduction
  2. Lesson 7: Infrastructure Security
    1. Lesson 7 Learning objectives
    2. 7.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite
    3. 7.2 Configuring and Verifying Port Security
    4. 7.3 Configuring and Verifying DHCP Snooping
    5. 7.4 Configuring and Verifying Dynamic ARP Inspection
    6. 7.5 Exploring and Mitigating Common Layer 2 Threats
    7. 7.6 Understanding and Configuring BPDU Guard and Root Guard
    8. 7.7 Understanding and Configuring CDP/LLDP
    9. 7.8 Understanding the Control Plane, Data Plane, and Management Plane
    10. 7.9 Exploring How to Secure the Management Plane
    11. 7.1 Exploring How to Secure the Control Plane
    12. 7.11 Exploring How to Secure the Data Plane
  3. Lesson 7: Review
    1. Lesson 7 Flashcards
    2. Lesson 7 Quiz
  4. Lesson 7: Interactive Labs
  5. Lesson 8: Cisco Next-Generation Firewalls
    1. Lesson 8 Learning objectives
    2. 8.1 Introducing Cisco Next-Generation Firewalls
    3. 8.2 Surveying the Cisco Firepower Management Center (FMC)
    4. 8.3 Exploring the Cisco Firepower Device Manager (FDM)
    5. 8.4 Implementing Access Control Policies
  6. Lesson 8: Review
    1. Lesson 8 Flashcards
    2. Lesson 8 Quiz
  7. Lesson 8: Interactive Labs
  8. Lesson 9: Cisco Next-Generation Intrusion Prevention Systems
    1. Lesson 9 Learning Objectives
    2. 9.1 Introducing Cisco Next-Generation Intrusion Prevention Systems
    3. 9.2 Describing Deployment Models of Network Security Solutions and Architectures That Provide Intrusion Prevention Capabilities
    4. 9.3 Configuring Cisco Next-Generation Intrusion Prevention Systems
  9. Lesson 9: Review
    1. Lesson 9 Flashcards
    2. Lesson 9 Quiz
  10. Lesson 9: Interactive Labs
  11. Module 4: Quiz
  1. Module 5: Introduction
  2. Lesson 10: Site-to-site VPN Implementations
    1. Lesson 10 Learning objectives
    2. 10.1 Introduction to IPsec Site-to-site and Remote Access VPNs
    3. 10.2 Configuring IPsec Site-to-site VPNs
    4. 10.3 Configuring Traditional Site-to-site VPN Utilizing Cisco Routers
    5. 10.4 Exploring DMVPN
    6. 10.5 Understanding GET VPN
    7. 10.6 Deploying FlexVPN
    8. 10.7 Troubleshooting Site-to-site VPN Implementations
  3. Lesson 10: Review
    1. Lesson 10 Flashcards
    2. Lesson 10 Quiz
  4. Lesson 10: Interactive Labs
  5. Lesson 11: Remote Access VPN
    1. Lesson 11 Learning Objectives
    2. 11.1 Introducing Remote Access VPNs
    3. 11.2 Exploring Clientless Remote Access VPNs
    4. 11.3 Surveying Remote Access VPN Implementations Using Cisco AnyConnect Secure Mobility Client
    5. 11.4 Configuring Remote Access VPN in Cisco ASA and in Cisco FTD
    6. 11.5 Troubleshooting Remote Access VPN Implementations
  6. Lesson 11: Review
    1. Lesson 11 Flashcards
    2. Lesson 11 Quiz
  7. Lesson 11: Interactive Labs
  8. Module 5: Quiz
  1. Module 6: Introduction
  2. Lesson 12: Securing the Cloud
    1. Lesson 12 Learning objectives
    2. 12.1 Introducing the Different Cloud Deployment and Service Models
    3. 12.2 Surveying Patch Management in the Cloud
    4. 12.3 Performing Security Assessments in Cloud Environments
    5. 12.4 Introducing Agile, DevOps, and CI/CD Pipelines
    6. 12.5 Introducing Serverless Computing
    7. 12.6 Understanding Container Orchestration and an Introduction to Kubernetes
    8. 12.7 Exploring the Concepts of DevSecOps
    9. 12.8 Surveying Cisco Umbrella
    10. 12.9 Exploring Cisco Cloud Email Security
    11. 12.1 Exploring Cisco Cloudlock
  3. Lesson 12: Review
    1. Lesson 12 Flashcards
    2. Lesson 12 Quiz
  4. Lesson 12: Interactive Labs
  5. Lesson 13: Content Security
    1. Lesson 13 Learning Objectives
    2. 13.1 Introducing Cisco Content Security Solutions
    3. 13.2 Describing Web Proxy Identity and Authentication Including Transparent User Identification
    4. 13.3 Introduction to Cisco Email Security
    5. 13.4 Exploring the Cisco ESA Deployment Model
    6. 13.5 Understanding Email Security Features
    7. 13.6 Discussing Email Security in the Cloud
    8. 13.7 Introduction to Secure Internet Gateway (SIG)
    9. 13.8 Describing the Components, Capabilities, and Benefits of Cisco Umbrella
    10. 13.9 Exploring Cisco Umbrella Investigate
  6. Lesson 13: Review
    1. Lesson 13 Flashcards
    2. Lesson 13 Quiz
  7. Lesson 13: Interactive Labs
  8. Module 6: Quiz
  1. Module 7: Introduction
  2. Lesson 14: Endpoint Protection and Detection
    1. Lesson 14 Learning objectives
    2. 14.1 Introducing AMP for Endpoints
    3. 14.2 Describing AMP for Endpoints Outbreak Control
    4. 14.3 Comparing Endpoint Threat Detection and Response (ETDR) and Endpoint Detection and Response (EDR) Solutions
    5. 14.4 Understanding AMP IP Blacklists and Whitelists
    6. 14.5 Exploring Application Control in AMP for Endpoints
    7. 14.6 Describing AMP for Endpoints Exclusion Sets
    8. 14.7 Introduction to AMP for Endpoints Policies
    9. 14.8 Describing the Anyconnect AMP Enabler
    10. 14.9 Exploring AMP for Endpoints Engines
    11. 14.1 How to Utilize AMP for Endpoints Reporting Features
    12. 14.11 Introducing the Cisco Threat Response Solution
  3. Lesson 14: Review
    1. Lesson 14 Flashcards
    2. Lesson 14 Quiz
  4. Lesson 14: Interactive Labs
  5. Module 7: Quiz

Recommended for you

Cisco CCNP and CCIE Security Core SCOR 350-701 Training Course

$250.00