Implementing and Operating Cisco Security Core Technologies (SCOR)

Course Description

Implementing and Operating Cisco Security Core Technologies (SCOR)

In this Implementing and Operating Cisco Security Core Technologies (SCOR) course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcement.

This Implementing and Operating Cisco Security Core Technologies (SCOR) course is the core course that leads to CCNP® Security and Cisco Certified Specialist.

This course prepares you for the Cisco Certified Specialist - Security Core Certification.  

Required exam and recommended training
350-701 SCOR Implementing and Operating Cisco Security Core Technologies (SCOR)

Certification track - CCNP Security Certification - CCIE Data Center

SCOR (Core) + Concentration elective = CCNP Security Certification

The Implementing and Operating Cisco Security Core Technologies (SCOR) course is also available as part of our Cisco Security Passport, which helps conquer your security challenges.

Learning Objectives

  • Describe information security concepts and strategies within the network
  • Describe common TCP/IP, network application, and endpoint attacks
  • Describe how various network security technologies work together to guard against attacks
  • Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall
  • Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance
  • Describe and implement web content security features and functions provided by Cisco Web Security Appliance
  • Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console 
  • Introduce VPNs and describe cryptography solutions and algorithms
  • Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco IOS VTI-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco FirePower NGFW
  • Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and EAP authentication
  • Provide basic understanding of endpoint security and describe AMP for Endpoints architecture and basic features 
  • Examine various defenses on Cisco devices that protect the control and management planes
  • Configure and verify Cisco IOS Software Layer 2 and Layer 3 Data Plane Controls
  • Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions
  • Describe basics of cloud computing and common cloud attacks and how to secure cloud environment


  • Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course
  • Familiarity with Ethernet and TCP/IP networking
  • Working knowledge of the Windows operating system
  • Working knowledge of Cisco IOS networking and concepts
  • Familiarity with basics of networking security concepts


  1. Configure Network Settings And NAT On Cisco ASA
  2. Configure Cisco ASA Access Control Policies
  3. Configure Cisco Firepower NGFW NAT
  4. Configure Cisco Firepower NGFW Access Control Policy
  5. Configure Cisco Firepower NGFW Discovery and IPS Policy
  6. Configure Cisco NGFW Malware and File Policy
  7. Configure Listener, HAT, and RAT on Cisco ESA
  8. Configure Mail Policies
  9. Configure Proxy Services, Authentication, and HTTPS Decryption
  10. Enforce Acceptable Use Control and Malware Protection
  11. Examine the Umbrella Dashboard
  12. Examine Cisco Umbrella Investigate
  13. Explore DNS Ransomware Protection by Cisco Umbrella
  14. Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel
  15. Configure Point-to-Point VPN between the Cisco ASA and Cisco Firepower NGFW
  16. Configure Remote Access VPN on the Cisco Firepower NGFW
  17. Explore Cisco AMP for Endpoints
  18. Perform Endpoint Analysis Using AMP for Endpoints Console
  19. Explore File Ransomware Protection by Cisco AMP for Endpoints Console
  20. Explore Cisco Stealthwatch Enterprise v6.9.3
  21. Explore CTA in Stealthwatch Enterprise v7.0
  22. Explore the Cisco Cloudlock Dashboard and User Security
  23. Explore Cisco Cloudlock Application and Data Security
  24. Explore Cisco Stealthwatch Cloud
  25. Explore Stealthwatch Cloud Alert Settings, Watchlists, and Sensors

Course Information

Length: 5 day

Format: Lecture and Lab

Delivery Method: Virtual / Onsite

Max. Capacity: 12


Want to learn more? Please fill out the form below and one of our team will reach out to you shortly.

Geography & Location
Jun 28, 2021 - 5 day(s)
Jun 28, 2021
GTR-Remote London Time Zone
EMEA, GTR-Remote London Time Zone
$4295 USD
$4295 USD, 43 CLC
Jul 05, 2021 - 5 day(s)
Jul 05, 2021
GTR-Remote Central Time Zone
AMER, GTR-Remote Central Time Zone
$4295 USD
$4295 USD, 43 CLC
Aug 02, 2021 - 5 day(s)
Aug 02, 2021
Remote/Sydney Time Zone
APAC, Remote/Sydney Time Zone
$4295 USD
$4295 USD, 43 CLC

Who Should Attend

Security Engineer. Network Engineer. Network Designer, Network Administrator, Systems Engineer, Consulting Systems Engineer, Technical Solutions Architect, Cisco Integrators/Partners, Network Manager, Cisco integrators and partners