350-701: Implementing and Operating Cisco Security Core Technologies
Best Seller
260 Lectures
26h 55m
Prepare for your Cisco examination with our training course. The 350-701 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to Cisco certification exam. Pass the Cisco 350-701 test with flying colors.
$14.99$24.99
Curriculum For This Course
- 1. Cisco Certification Updates - FEB 2020 11m
- 2. Cisco Re-Certifications 1m
- 3. CCNP Certifications 1m
- 4. CCIE Certifications 2m
- 5. Cisco Certification Migration Options 6m
- 6. CCNP Required Exams 3m
- 1. CCNP Security Certifications 7m
- 2. CCNP SCOR - 350-701 1m
- 3. SCOR 350-701 Contents 7m
- 1. Network Security Terminology 6m
- 2. Goals of Network Security 10m
- 3. Threat Types - Mitigation 9m
- 4. Assets - Classification of Assets 6m
- 5. Classify Counter Measures 4m
- 6. Classify Vulnerabilities 2m
- 7. Network Security - Design Principles 10m
- 1. Motivations behind Network Attacks 3m
- 2. Social Engineering Attacks 4m
- 3. Phishing Attacks 4m
- 4. Denial of Service Attacks - DoS 5m
- 5. Distributed Denial of Service Attakcs - DDoS 4m
- 6. Spoofing Attacks 4m
- 7. Spoofing Attacks - Mitigation 4m
- 8. Man in the Middle Attacks -MiTM 2m
- 9. Password Attacks 5m
- 10. Password Attacks - Mitigation 4m
- 11. Reflector Attacks 2m
- 12. Amplification Attacks 2m
- 13. Reconnaissance Attacks 5m
- 14. Reconnaissance Attacks - Mitigation 2m
- 1. Malicious Codes - VIRUS 2m
- 2. Malicious Codes - WORMS 1m
- 3. Malicious Codes - TROJAN HORSES 1m
- 4. Hacking 1m
- 5. Hackers - Script Kiddies 1m
- 6. Malware Service - DARKNET 1m
- 1. AAA - Network Security 11m
- 2. Cisco Telemetry Services 4m
- 3. Firewall 8m
- 4. Intrusion Prevention System - IPS 4m
- 5. Virtual Private Networks 4m
- 6. Next Generation Firewalls 6m
- 1. Cisco Lab Options 8m
- 2. About GNS3 4m
- 3. Installing GNS3 - Windows 7m
- 4. GNS3 - IOS Images 6m
- 5. Default Topology - GNS3 - IOS initial Configs 5m
- 6. IOS Default Topology 9m
- 7. GNS3 Topology-HOST Computer 6m
- 8. GNS3 - VMware Setup 9m
- 9. GNS3 - IOSv L2-L3 6m
- 10. GNS3 - ASAv Setup 4m
- 11. GNS3 - IOU-L2-L3 3m
- 1. Network Infrastructure Protection 5m
- 2. Identify Network Device Planes 2m
- 3. Data Plane 6m
- 4. Control Plane 3m
- 5. Management Plane 3m
- 1. Inband Vs OutBand Management 7m
- 2. Remote Access - TELNET 6m
- 3. Remote Access - SSH 9m
- 1. Cisco Telemetry Services 4m
- 2. Device- Network Events Logging 10m
- 3. Syslog - Terminal Logging 7m
- 4. Network Time Protocol 7m
- 5. NTP Stratum Value 4m
- 6. NTP Configuration - LAB 9m
- 1. Control Plane Security - Possible Threats 9m
- 2. Routing Protocol Authentication 12m
- 3. Control Plane Policing - CoPP 7m
- 4. Class-Map - Policy Map - Hierarchy 5m
- 5. CoPP - Configuration Examples 12m
- 1. Switch Security - Overview 2m
- 2. Disable Unused Ports 1m
- 3. Dynamic Trunking Protocol - DTP 8m
- 4. DTP Vulnerabilities - Mitigation 2m
- 5. VLAN Hopping Attacks - Mitigation 5m
- 6. Cisco Discovery Protocol - CDP 18m
- 7. Link Layer Discovery Protocol - LLDP 3m
- 8. CDP- LLDP Vulnerabilities - Mitigation 2m
- 1. MAC Flooding Attack - Port Security 12m
- 2. MAC Spoofing Attack - Port Security 7m
- 3. Port Security - Configuration 11m
- 4. Spanning Tree Port Fast 7m
- 5. Native VLAN 8m
- 6. DHCP Spoofing Attack - DHCP Spoofing 8m
- 7. DHCP Snooping - Configuration 16m
- 8. DHCP Starvation Attack - Mitigation 2m
- 9. ARP Spoofing Attack - DAI 12m
- 10. Dynamic ARP Inspection - Configuration 12m
- 11. Protected Ports- Private VLAN Edge 3m
- 12. Private VLAN 9m
- 13. Private VLAN - Configuration 5m
- 14. Private VLAN - LAB 20m
- 1. What is Firewall 8m
- 2. Statefull Packet Filtering 8m
- 3. Stateless Packet Filtering 4m
- 4. Application Level Gateways - Proxy Servers 5m
- 5. Next Generation Firewalls 6m
- 6. FIrewall Vendors in Market 6m
- 1. Cisco Statefull Firewalls - IOS - ASA 3m
- 2. ASA Supported Features _ PART1 9m
- 3. ASA Supported Features _ PART2 11m
- 4. ASS Compare Models 7m
- 1. Manage Cisco CLI - ASA - GUI 3m
- 2. Basic CLI Modes - Commands 4m
- 3. ASA Security Levels 10m
- 4. ASA Interface Configurations 5m
- 5. ASA Security Policies - Default 11m
- 6. ASA Routing 5m
- 1. ASA ACls - Overview 9m
- 2. ASA ACLS - Basic Example 7m
- 3. Traffic Between Same Security Levels 3m
- 4. ACL Object Groups 10m
- 5. ACL Object Groups - LAB 12m
- 1. PRivate IP - Public IP 5m
- 2. What is NAT ? 3m
- 3. NAT Types 6m
- 4. Dynamic NAT - on ASA 10m
- 5. Dynamic PAT- ASA 5m
- 6. Dynamic PAT - with Exit interface 5m
- 7. Dynamic NAT-PAT Combination 2m
- 8. Static NAT - ASA 12m
- 9. Static PAT- ASA 11m
- 1. IOS - Zone Based Firewall 3m
- 2. ZBF - Configuration Overview 4m
- 3. ZBF - Security Zones 3m
- 4. ZBF - Default Flow 3m
- 5. Class-Map - Policy Map - Hierarchy 5m
- 6. ZBF - Classify Traffic using Class-Maps 6m
- 7. ZBF- Class-map Configuration 5m
- 8. ZBF - POlicy Map - Zone Pairs 11m
- 1. What is Cryptography 3m
- 2. Goals of Cryptography 3m
- 3. Hashing-How it Works 3m
- 4. Hashing with HMAC 3m
- 5. What is Encryption - Decryption 1m
- 6. Encryption Algorithms - Symmetric vs Assymetric 5m
- 7. Cryptanalysis - Attacks 4m
- 8. Asymmetric Encryption - Drawbacks 3m
- 9. Public Key Infrastructure - PKI 4m
- 1. Virutal Private Network - Introduction 5m
- 2. VPN Types - Site to Site / Remote Access 4m
- 3. VPN Logical Topologies 1m
- 4. VPN Default Lab Setup - Routers 5m
- 1. What is IPSec ? 3m
- 2. IPsec Security Services 7m
- 3. IPSec Modes - Tunnel vs Transport 5m
- 1. How IPsec VPN Works 5m
- 2. Step-1 - Interesting Traffic 3m
- 3. Step-2 IKE Phase-1 8m
- 4. Step-3 - IKE Phase 2 9m
- 5. IKE Phase 2 - Configuration/ Verification 7m
- 1. Remote Access VPN 3m
- 2. What is SSL-TLS 3m
- 3. How SSL-TLS Works 8m
- 4. What is SSL VPN 4m
- 5. SSL VPN - Modes 6m
- 1. AAA - Network Security 11m
- 2. AAA - Components 4m
- 3. AAA Protocols - TACACS - RADIUS 8m
- 4. AAA- Cisco Authentication Servers 4m
- 1. AAA Authentication - Device Access 3m
- 2. Authentication Local database 10m
- 3. AAA External Servers 3m
- 4. Authentication - External server (TACACS) 12m
- 1. Authorization - Device Access 3m
- 2. IOS Privilege Levels 9m
- 3. Local Authorization using Privilege Levels 14m
- 4. IOS Privilege Levels _ Limitations 5m
- 5. Role based CLI Access - RBAC 6m
- 6. RBAC Views - Types 4m
- 7. RBAC Views - LAB1 10m
- 8. Modify RBAC Views - LAB 2 4m
- 9. Modify RBAC Views - LAB 3 6m
- 10. RBAC - Super Views 5m
- 1. Web Access - Possible Threats 4m
- 2. Web Based Attacks- 5m
- 3. Web Attack Examples 10m
- 4. Web Security Solutions 5m
- 1. Cisco Web Security - WSA-CWS 5m
- 2. What is WSA ? 9m
- 3. WSA- HOw it Works 5m
- 4. WSA Deployment Modes 6m
- 5. WSA models - Physical -Virtual Appliance 5m
- 6. WSA Licensing Options 7m
- 1. Email Based Threats 2m
- 2. Cisco Email Security Appliance - ESA 3m
- 1. Intrusion Prevention System - IPS 3m
- 2. IDS vs IPS 2m
- 3. Host Based IPS vs Network Based IPS 6m
- 4. IPS Deployment Modes - INline vs Promiscious 3m
- 5. Cisco IPS Solutions 5m
- 6. IPS Threat Detection Methods 7m
- 7. IPS Signature Alarm Types 3m
- 8. IPS Signature Actions 3m
- 9. IPS Evasion Methods - CounterMeasures 6m
- 1. What is Network Management 8m
- 2. Past-Present Methods of Network Mangement- PART 1 14m
- 3. Past-Present Methods of Network Mangement- PART 2 7m
- 4. SNMP- Simple Network Mangement Protocol 18m
- 1. Challenges - Traditional Management 11m
- 2. Network Automation - Goals 16m
- 3. Types of Network Automation 6m
- 4. What can be Automated - PART 1 12m
- 5. What can be Automated - PART 2 9m
- 6. Impact of Network Automation 8m
- 1. Automation Origination Points 8m
- 2. SDN - Software Defined Networking 15m
- 3. SDN Controllers 9m
- 4. Networks Managed by SDN Controllers 13m
- 1. Management Plane 3m
- 2. SDN-Management Plane 7m
- 3. SDN-Control Plane - Data Plane 6m
- 1. SDN - Imperative Model 5m
- 2. SDN - Declarative Model 7m
- 3. SDN - Network Design Requirments 9m
- 4. UNderlaY Networks 7m
- 5. Overlay Networks 7m
- 6. SDN Fabric 6m
- 1. Application Programming Interface - API 11m
- 2. API Types 4m
- 3. API - With SDN Networks 9m
- 4. NorthBound API 9m
- 5. SouthBound API 8m
- 1. Cisco DevNet 5m
- 2. DevNet Certifications 5m
- 3. DevNet Sandbox 6m
- 4. DevNet Sandbox LABS 8m
- 5. Sandbox LAB Access - Reservations 3m
- 1. Cisco DNA Center 16m
- 2. DNA Center Appliance 4m
- 3. DNA Center- What can do - PART 1 11m
- 4. DNA Center- What can do - PART 2 13m
- 1. Web Service API 8m
- 2. Web Service API - Commonly Used 8m
- 3. REST API 8m
- 1. Config Management Tools 6m
- 2. Config Management Tools - Capabilities 9m
- 3. Master-Agent 6m
- 4. Agent Based vs Agentless 7m
- 5. Push-Pull Model 10m
- 6. Configuration Files 5m
- 1. PUPPET - Config MGMT Tool 3m
- 2. PUPPET-Master Agent Database 3m
- 3. PUPPET - Manifest 5m
- 4. PUPPET-Module-Forge 6m
- 5. PUPPET-Agent- Agentless 3m
- 6. PUPPET-PULL Model Steps 4m
- 1. CHEF- Config MGMT Tool 6m
- 2. CHEF- Terminology 7m
- 1. ANSIBLE- COnfig MGMT Tool 8m
- 2. ANSIBLE- Control Station 3m
- 3. ANSIBLE- PlayBook-Inventory 5m
- 4. ANSIBLE- Templates-Variables 7m
- 1. API Data Formats 8m
- 2. JSON Overview 8m
- 3. JSON Data Types 7m
- 4. JSON Syntax Rules 3m
- 5. JSON Data Interpretation 7m
Hot Exams
Cisco 350-401 Exam Dumps
PECB ISO-IEC-27001-Lead-Implementer Exam Dumps
DAMA DMF-1220 Exam Dumps
Okta Okta-Certified-Professional Exam Dumps
HP HPE6-A78 Exam Dumps
IIA IIA-CIA-Part3-3P Exam Dumps
IAPP CIPM Exam Dumps
Microsoft AZ-104 Exam Dumps
Cisco 350-901 Exam Dumps
Cisco 300-715 Exam Dumps
Cisco 200-301 Exam Dumps
ITIL ITILFND-V4 Exam Dumps
Veritas VCS-324 Exam Dumps
Scrum PSM-I Exam Dumps
CyberArk CAU302 Exam Dumps
ACAMS CAMS Exam Dumps
Salesforce ADM-201 Exam Dumps
RedHat EX200 Exam Dumps
Palo Alto Networks PCNSE Exam Dumps
Isaca CISM Exam Dumps
Microsoft AZ-104 Exam Dumps
Cisco 200-301 Exam Dumps
Cisco 300-715 Exam Dumps
Amazon AWS SAA-C03 Exam Dumps
Test Prep AACD Exam Dumps
Cisco 350-401 Exam Dumps
CompTIA N10-008 Exam Dumps
SAFe SAFe-Agilist-5.1 Exam Dumps
Amazon AWS SAP-C02 Exam Dumps
Microsoft PL-300 Exam Dumps
Microsoft MD-102 Exam Dumps
Amazon Web Services CLF-C02 Exam Dumps
ISC2 CISSP Exam Dumps
Isaca CISM Exam Dumps
ASQ CMQ-OE Exam Dumps
PMI PMP Exam Dumps
Cisco 300-910 Exam Dumps
Cisco 300-620 Exam Dumps
F5 301a Exam Dumps
Microsoft SC-200 Exam Dumps
How to Open Test Engine .dumpsarena Files
Use FREE DumpsArena Test Engine player to open .dumpsarena files
Refund Policy
DumpsArena.com has a remarkable success record. We're confident of our products and provide a no hassle refund policy.
Your purchase with DumpsArena.com is safe and fast.
The DumpsArena.com website is protected by 256-bit SSL from Cloudflare, the leader in online security.