(Click Category to List Courses)
42 - IT-S Information Technology - Security and Audit
IT-S 112 - Implementing and Operating Cisco Security Core Technologies (350-701)
Code | Start Date | Duration | Venue | |
---|---|---|---|---|
IT-S 112 | 09 December 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 112 | 10 February 2025 | 5 Days | Istanbul | Registration Form Link |
IT-S 112 | 07 April 2025 | 5 Days | Istanbul | Registration Form Link |
IT-S 112 | 30 June 2025 | 5 Days | Istanbul | Registration Form Link |
IT-S 112 | 28 July 2025 | 5 Days | Istanbul | Registration Form Link |
IT-S 112 | 22 September 2025 | 5 Days | Istanbul | Registration Form Link |
IT-S 112 | 17 November 2025 | 5 Days | Istanbul | Registration Form Link |
IT-S 112 | 29 December 2025 | 5 Days | Istanbul | Registration Form Link |
Course Description
This course deeps participants’ knowledge of implementing and operating core security technologies including network security, cloud security, content security, endpoint protection and detection, secure network access, visibility and enforcements. The course helps candidates to prepare for Implementing and Operating Cisco Security Core Technologies exam.
Course Objectives
- Describing basic network security and common threats
- Comparing network security solutions
- Identify security solutions for cloud environments
- Compare Endpoint Protection Platforms (EPP) and Endpoint Detection & Response (EDR) solutions
- Describe the components, capabilities, and benefits of these security products and solutions
Who Should Attend?
- Security Analyst
- Security Systems Engineer
- Chief Information Security Officer
- Director of Security
- Network Architect
Course Details/Schedule
Day 1
- Cybersecurity Fundamentals
- Common threats & security vulnerabilities
- Cryptography components
- Security intelligence authoring, sharing, and consumption
- North Bound and South Bound
- DNAC APIs
Day 2
- Network security
- NetFlow and Flexible NetFlow records
- Segmentation
- Access control policies
- AVC, URL filtering
- Malware protection
- Management options
- AAA for device and network access
- Secure network management of perimeter security
- Site-to-site VPN
- Remote access VPN
Day 3
- Securing the clouds
- Security solutions for cloud environments
- Customer vs. provider security responsibility
- DevSecOps
- Security capabilities, deployment models, and policy management
- Cloud logging
Day 4
- Content security
- Traffic redirection and capture methods
- Web proxy identity and authentication
- Web and email security deployment
- Secure internet gateway
- Cisco Umbrella
Day 5
- Endpoint Protection Platforms (EPP)
- Outbreak control and quarantines
- Multifactor Authentication (MFA)
- Posture assessment solutions
- Security network access, Visibility and Enforcement
- Network access with CoA
- Device compliance and application control
- Exfiltration techniques
- Network telemetry