CCNP SCOR (350-701)

CCNP training Institute in Ahmedabad, Gujarat If you are interested taking CCNP SCOR then get in touch using the contact us info@ionxworld.com or use the phone numbers to contact us.

Call +91-7046794711 Chat +91-7046794711
main-img

CCNP SCOR Course Overview


The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco CCNP Security and CCIE Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications.

CCNP Security (SCOR) Course in Ahmedabad Gujarat

"CCNP Securty, CCNP Enterprise certification is a professional level certification for candidates aspiring to become certified Network Security and Enterprise technologies competent. After completion of CCNP Security Training, candidate will be able to plan, implement, verify, troubleshoot and automate local and wide-area enterprise Cisco networks and Security."

IONX is known as the Best institute for Cisco certification courses like CCNA, CCNP, CCIE etc in Ahmedabad, Gujarat, India because of its world class infrastructure and huge labs. Training methodology includes not only classroom training but also hands-on training on Cisco equipment. We also provide practical workbooks to our students which is a part of our course content.

In our CCNP training program candidate not only learns theoretical concepts of the technology but also gets familiar with the practical aspects. We have Live Cisco racks not only in our Labs but also in our classrooms which is a necessity in order to deliver best quality training. Even if you miss some classes due to any issue, you can rejoin any upcoming batch or even you can join any parallel batches to recover what you missed.

Enroll for CCNP SCOR Traning Free Demo Classs
Request Demo Class

₹45000/- | $750/- Duration: 120 Days

[Note: Prices displayed are after Discount and includes GST]
CCNP SCOR (350-701) Brochure

Syllabus of CCNP SCOR Course in Ahmedabad

  • Network Security Terminology
  • Goals Of Network Security
  • Threat Types - Mitigation
  • Assets - Classification Of Assets
  • Classify Counter Measures
  • Classify vulnerabilities
  • Network Security - Design Principles
  • Motivation Behind Network Attacks
  • Social Engineering Attacks
  • Phishing Attacks
  • Denial Of Service - DoS Attacks
  • Distributed Denial Of Service - DDoS Attacks
  • Spoofing Attacks
  • Spoofing Attacks - Mitigation
  • Man In The Middle Attacks - MiTM
  • Pasword Attacks
  • Pasword Attacks - Mitigation
  • Reflector Attacks
  • Amplification Attacks
  • Reconnaissance Attacks
  • Reconnaissance Attacks - Mitigation
  • Malicious Codes - Virus
  • Malicious Codes - Worms
  • Malicious Codes - Trojan Horses
  • Hacking
  • Hackers - Script Kiddies
  • Malware Service - Darknet
  • AAA - Network Security
  • Cisco Telemetry Services
  • Firewall
  • Intrusion Prevention System - IPS
  • Virtual Private Networks
  • Next Generation Firewalls
  • Cisco Lab Options
  • About GNS3
  • Installing GNS3 - Windows
  • Default Topology - GNS3 - IOS initial Configs
  • IOS Default Topology
  • GNS3 Topology-HOST Computer
  • GNS3 - VMware Setup
  • GNS3 - IOSv L2-L3
  • GNS3 - ASAv Setup
  • GNS3 - IOU-L2-L3
  • Network Infrastructure Protection
  • Identify Network Device Planes
  • Data Plane
  • Control Plane
  • Management Plane
  • Inband Vs OutBand Management
  • Remote Access - TELNET
  • Remote Access - SSH
  • Cisco Telemetry Services
  • Device- Network Events Logging
  • Syslog - Terminal Logging
  • Network Time Protocol
  • NTP Stratum Value
  • NTP Configuration - LAB
  • Control Plane Security - Possible Threats
  • Routing Protocol Authentication
  • Control Plane Policing - CoPP
  • Class-Map - Policy Map - Hierarchy
  • CoPP - Configuration Examples
  • Switch Security - Overview
  • Disable Unused Ports
  • Dynamic Trunking Protocol - DTP
  • DTP Vulnerabilities - Mitigation
  • Cisco Discovery Protocol - CDP
  • Link Layer Discovery Protocol - LLDP
  • CDP- LLDP Vulnerabilities - Mitigation
  • MAC Flooding Attack - Port Security
  • MAC Spoofing Attack - Port Security
  • Port Security - Configuration
  • Spanning Tree Port Fast
  • Native VLAN
  • DHCP Spoofing Attack - DHCP Spoofing
  • DHCP Snooping - Configuration
  • DHCP Starvation Attack - Mitigation
  • ARP Spoofing Attack - DAI
  • Dynamic ARP Inspection - Configuration
  • Protected Ports- Private VLAN Edge
  • Private VLAN
  • rivate VLAN - Configuration
  • Private VLAN - LAB
  • What is Firewall
  • Statefull Packet Filtering
  • Stateless Packet Filtering
  • Application Level Gateways - Proxy Servers
  • Next Generation Firewalls
  • FIrewall Vendors in Market
  • Cisco Statefull Firewalls - IOS - ASA
  • ASA Supported Features _ PART1
  • ASA Supported Features _ PART2
  • ASS Compare Models
  • Manage Cisco CLI - ASA - GUI
  • Basic CLI Modes - Commands
  • ASA Security Levels
  • ASA Interface Configurations
  • ASA Security Policies - Default
  • ASA Routing
  • ASA ACls - Overview
  • ASA ACLS - Basic Example
  • Traffic Between Same Security Levels
  • ACL Object Groups
  • ACL Object Groups - LAB
  • PRivate IP - Public IP
  • What is NAT ?
  • NAT Types
  • Dynamic NAT - on ASA
  • Dynamic PAT - with Exit interface
  • Dynamic NAT-PAT Combination
  • Static NAT - ASA
  • Static PAT- ASA
  • IOS - Zone Based Firewall
  • ZBF - Configuration Overview
  • ZBF - Security Zones
  • ZBF - Default Flow
  • Class-Map - Policy Map - Hierarchy
  • Dynamic NAT-PAT Combination
  • ZBF - Classify Traffic using Class-Maps
  • ZBF- Class-map Configuration
  • ZBF - POlicy Map - Zone Pairs
  • What is Cryptography
  • Goals of Cryptography
  • ZBF - Security Zones
  • Hashing-How it Works
  • Hashing with HMAC
  • What is Encryption - Decryption
  • Encryption Algorithms - Symmetric vs Assymetric
  • Cryptanalysis - Attacks
  • Asymmetric Encryption - Drawbacks
  • Public Key Infrastructure - PKI
  • Virutal Private Network - Introduction
  • VPN Types - Site to Site / Remote Access
  • VPN Logical Topologies
  • VPN Default Lab Setup - Routers
  • What is IPSec ?
  • IPsec Security Services
  • IPSec Modes - Tunnel vs Transport
  • How IPsec VPN Works
  • Step-1 - Interesting Traffic
  • Step-2 IKE Phase-1
  • Step-3 - IKE Phase 2
  • IKE Phase 2 - Configuration/ Verification
  • Remote Access VPN
  • What is SSL-TLS
  • How SSL-TLS Works
  • What is SSL VPN
  • SSL VPN - Modes
  • AAA - Network Security
  • AAA - Components
  • AAA Protocols - TACACS - RADIUS
  • AAA- Cisco Authentication Servers
  • AAA Authentication - Device Access
  • Authentication Local database
  • AAA External Servers
  • Authentication - External server (TACACS)
  • Authorization - Device Access
  • IOS Privilege Levels
  • Local Authorization using Privilege Levels
  • IOS Privilege Levels _ Limitations
  • Role based CLI Access - RBAC
  • RBAC Views - Types
  • RBAC Views - LAB1
  • Modify RBAC Views - LAB 2
  • Modify RBAC Views - LAB 3
  • RBAC - Super Views
  • Web Access - Possible Threats
  • Web Based Attacks-
  • Web Attack Examples
  • Web Security Solutions
  • Cisco Web Security - WSA-CWS
  • What is WSA ?
  • WSA- HOw it Works
  • WSA Deployment Modes
  • WSA models - Physical -Virtual Appliance
  • WSA Licensing Options
  • Email Based Threats
  • Cisco Email Security Appliance - ESA
  • What is Intrusion
  • Intrusion Prevention System - IPS
  • IDS vs IPS
  • Host Based IPS vs Network Based IPS
  • IPS Deployment Modes - INline vs Promiscious
  • Cisco IPS Solutions
  • IPS Threat Detection Methods
  • IPS Signature Alarm Types
  • IPS Signature Actions
  • IPS Evasion Methods - CounterMeasures
  • What is Network Management
  • Past-Present Methods of Network Mangement- PART 1
  • Past-Present Methods of Network Mangement- PART 2
  • SNMP- Simple Network Mangement Protocol
  • Challenges - Traditional Management
  • Network Automation - Goals
  • Types of Network Automation
  • What can be Automated - PART 1
  • What can be Automated - PART 2
  • Impact of Network Automation
  • Automation Origination Points
  • SDN - Software Defined Networking
  • SDN Controllers
  • Networks Managed by SDN Controllers
  • Identify Network Device Planes
  • Data Plane
  • Control Plane
  • Management Plane
  • SDN-Management Plane
  • SDN-Control Plane - Data Plane
  • SDN - Imperative Model
  • SDN - Declarative Model
  • SDN - Network Design Requirments
  • UNderlaY Networks
  • Overlay Networks
  • SDN Fabric
  • Application Programming Interface - API
  • API Types
  • API - With SDN Networks
  • NorthBound API
  • SouthBound API
  • Cisco DevNet
  • DevNet Certifications
  • DevNet Sandbox
  • DevNet Sandbox LABS
  • Sandbox LAB Access - Reservations
  • Cisco DNA Center
  • DNA Center Appliance
  • DNA Center- What can do - PART 1
  • DNA Center- What can do - PART 2
  • Web Service API
  • Web Service API - Commonly Used
  • REST API
  • Config Management Tools
  • Config Management Tools - Capabilities
  • Configuration Management Tools - Similarities
  • Master-Agent
  • Agent Based vs Agentless
  • Push-Pull Model
  • Configuration Files
  • PUPPET - Config MGMT Tool
  • PUPPET-Master Agent Database
  • PUPPET - Manifest
  • PUPPET-Module-Forge
  • PUPPET-Agent- Agentless
  • PUPPET-PULL Model Steps
  • CHEF- Config MGMT Tool
  • CHEF- Terminology
  • ANSIBLE- COnfig MGMT Tool
  • ANSIBLE- Control Station
  • ANSIBLE- PlayBook-Inventory
  • ANSIBLE- Templates-Variables
  • API Data Formats
  • JSON Overview
  • JSON Data Types
  • JSON Syntax Rules
  • JSON Data Interpretation
  • Job Assistance program

    Your intent to master next level skills are appreciated

    main-img

    Find CCNP SCOR Online Course in Other Cities

    To meet the learning needs of people spread across various geographical locations, we are offering our high-quality training services at the location of your choice to ensure you obtain maximum impact for your training investment. Choose your city below.

    Find Out More

    Career Course





    Frequently Asked Questions

    main-img

  • The Implementing and Operating Cisco Security Core Technologies v1. 0 (SCOR 350-701) exam is a 120-minute exam associated with the CCNP Security, Cisco Certified Specialist - Security Core, and CCIE Security certifications.
  • CCNP certification is suitable for those with at least one year of experience in networking. Individuals who obtain the certification are known to possess a precious skill set that is required in enterprise roles such as network engineer, systems engineer, support engineer, network technician, and more.
  • Can you do CCNA Security Directly? You would also need to re-certify this certification at the same time re-certifying us also going to renew both the CCNA's. You are needed to appear for the CCNA Routing & Switching exam before you could appear for the CCNA Security.
  • How Difficult is CCNP Security? The CCNP is generally regarded by most test takers as being more difficult than the CCNA. This is partially because there are many more areas covered on the CCNP exam. Also, the depth of material is more intense with the CCNP than the CCNA