Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
edupls_header
certification
Filter by Categories
Start DateEnd DateClass Times (EST)Delivery/Location ?StatusPriceEnroll Now
6/23/20256/27/20259:00 AM - 5:00 PM35OPEN$3,866.00
9/22/20259/26/20259:00 AM - 5:00 PM35OPEN$3,866.00
12/15/202512/19/20259:00 AM - 5:00 PM35OPEN$3,866.00
6/23/2025 - 6/27/2025
9:00 AM - 5:00 PM
35
OPEN
$3,866.00
9/22/2025 - 9/26/2025
9:00 AM - 5:00 PM
35
OPEN
$3,866.00
12/15/2025 - 12/19/2025
9:00 AM - 5:00 PM
35
OPEN
$3,866.00

Train your entire team with our Private Group Training solutions. AstraTech specializes in creating customized training programs to fit your organization’s unique learning needs and business objectives. Take advantage of multiple student discounts, customized curriculum and flexible scheduling with Private Group Training from AstraTech!

    On-Demand Learning (ODL) is a self-paced training solution designed to work around your individual schedule, budget, and learning needs. Our ODL courses provide you with exclusive access to interactive platforms combining high-quality instructor videos from subject matter experts, official courseware and study materials, hands-on labs, practice exercises, skill assessments and knowledge checks. The modular, self-paced ODL course structure adapts to your unique learning needs and style, providing an optimal training experience.

    Train your entire team with our Private Group Training solutions. AstraTech specializes in creating customized training programs to fit your organization’s unique learning needs and business objectives. Take advantage of multiple student discounts, customized curriculum and flexible scheduling with Private Group Training from AstraTech!

    Cisco Implementing and Operating Cisco Security Core Technologies v2.0 (SCOR)

    $4,295 | 5 days

    Upgrade your tech skills with this training course. Launch your career to the stars with AstraTech IT Certification Training!

    Please select a Learning Method below to get started:

    • Cisco

    About this Course

    SKILL LEVEL: 
    • Advanced
    BRAND/TECHNOLOGY: 

    Cisco Implementing and Operating Cisco Security Core Technologies v2.0 (SCOR) Course Outline

    The Implementing and Operating Cisco Security Core Technologies (SCOR) training helps you gain the skills and technologies needed to implement core Cisco security solutions. This training will ready you to provide advanced threat protection against cybersecurity attacks and prepare you for senior-level security roles.

    This training prepares you for the 350-701 SCOR v1.0 exam. If passed, you earn the Cisco Certified Specialist – Security Core certification and satisfy the core exam requirement for the Cisco Certified Network Professional (CCNP) Security and Cisco Certified Internetwork Expert (CCIE) Security certifications. This training also earns you 64 Continuing Education (CE) credits towards recertification.

    • Security Engineers
    • Network Engineers
    • Network Designers
    • Network Administrators
    • Systems Engineers
    • Consulting Systems Engineers
    • Technical Solutions Architects
    • Cisco Integrators and Partners
    • Network Managers
    • Program Managers
    • Project Managers

    There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:

    • Familiarity with Ethernet and TCP/IP networking
    • Working knowledge of the Windows operating system
    • Working knowledge of Cisco IOS networking and concepts
    • Familiarity with basics of networking security concepts

    These skills can be found in the following Cisco Learning Offering: Implementing and Administering Cisco Solutions (CCNA?)

    • Describe information security concepts and strategies within the network
    • Describe security flaws in the transmission protocol/internet protocol (TCP/IP) and how they can be used to attack networks and hosts
    • Describe network application-based attacks
    • Describe how various network security technologies work together to guard against attacks
    • Implement access control on Cisco Secure Firewall Adaptive Security Appliance (ASA)
    • Deploy Cisco Secure Firewall Threat Defense basic configurations
    • Deploy Cisco Secure Firewall Threat Defense IPS, malware, and fire policies
    • Deploy Cisco Secure Email Gateway basic configurations
    • Deploy Cisco Secure Email Gateway policy configurations
    • Describe and implement basic web content security features and functions provided by Cisco Secure Web Appliance
    • Describe various attack techniques against the endpoints
    • Describe Cisco Umbrella? security capabilities, deployment models, policy management, and Investigate console
    • Provide basic understanding of endpoint security and be familiar with common endpoint security technologies
    • Describe Cisco Secure Endpoint architecture and basic features
    • Describe Cisco Secure Network Access solutions
    • Describe 802.1X and extensible authentication protocol (EAP) authentication
    • Configure devices for 802.1X operations
    • Introduce VPNs and describe cryptography solutions and algorithms
    • Describe Cisco secure site-to-site connectivity solutions
    • Deploy Cisco Internetwork Operating System (Cisco IOS?) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs
    • Configure point-to-point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
    • Describe Cisco secure remote access connectivity solutions
    • Deploy Cisco secure remote access connectivity solutions
    • Provide an overview of network infrastructure protection controls
    • Examine various defenses on Cisco devices that protect the control plane
    • Configure and verify Cisco IOS software layer 2 data plane controls
    • Configure and verify Cisco IOS software and Cisco ASA layer 3 data plane controls
    • Examine various defenses on Cisco devices that protect the management plane
    • Describe the baseline forms of telemetry recommended for network infrastructure and security devices
    • Describe deploying Cisco Secure Network Analytics
    • Describe basics of cloud computing and common cloud attacks
    • Describe how to secure cloud environment
    • Describe the deployment of Cisco Secure Cloud Analytics
    • Describe basics of software-defined networks and network programmability
    • 1. Network Security Technologies
    • 2. Cisco Secure Firewall ASA Deployment
    • 3. Cisco Secure Firewall Threat Defense Basics
    • 4. Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
    • 5. Cisco Secure Email Gateway Basics
    • 6. Cisco Secure Email Policy Configuration
    • 7. Cisco Secure Web Appliance Deployment
    • 8. VPN Technologies and Cryptography Concepts
    • 9. Cisco Secure Site-to-Site VPN Solutions
    • 10. Cisco IOS VTI-Based Point-to-Point IPsec VPNs
    • 11. Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
    • 12. Cisco Secure Remote-Access VPN Solutions
    • 13. Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
    • 14. Describing Information Security Concepts
    • 15. Describe Common TCP/IP Attacks
    • 16. Describe Common Network Application Attacks
    • 17. Common Endpoint Attacks
    • 18. Cisco Umbrella Deployment
    • 19. Endpoint Security Technologies
    • 20. Cisco Secure Endpoint
    • 21. Cisco Secure Network Access Solutions
    • 22. 802.1X Authentication
    • 23. 802.1X Authentication Configuration
    • 24. Network Infrastructure Protection
    • 25. Control Plane Security Solutions
    • 26. Layer 2 Data Plane Security Controls
    • 27. Layer 3 Data Plane Security Controls
    • 28. Management Plane Security Controls
    • 29. Traffic Telemetry Methods
    • 30. Cisco Secure Network Analytics Deployment
    • 31. Cloud Computing and Cloud Security
    • 32. Cloud Security
    • 33. Cisco Secure Cloud Analytics Deployment
    • 34. Software-Defined Networking