TRAINING CATEGORIES
(Click Category to List Courses)

42 - IT-S Information Technology - Security and Audit


IT-S 112 - Implementing and Operating Cisco Security Core Technologies (350-701)

Code Start Date Duration Venue
IT-S 112 01 April 2024 5 Days Istanbul Registration Form Link
IT-S 112 27 May 2024 5 Days Istanbul Registration Form Link
IT-S 112 24 June 2024 5 Days Istanbul Registration Form Link
IT-S 112 22 July 2024 5 Days Istanbul Registration Form Link
IT-S 112 19 August 2024 5 Days Istanbul Registration Form Link
IT-S 112 16 September 2024 5 Days Istanbul Registration Form Link
IT-S 112 14 October 2024 5 Days Istanbul Registration Form Link
IT-S 112 11 November 2024 5 Days Istanbul Registration Form Link
IT-S 112 09 December 2024 5 Days Istanbul Registration Form Link
Please contact us for fees

 

Course Description

This course deeps participants’ knowledge of implementing and operating core security technologies including network security, cloud security, content security, endpoint protection and detection, secure network access, visibility and enforcements. The course helps candidates to prepare for Implementing and Operating Cisco Security Core Technologies exam.

Course Objectives

  • Describing basic network security and common threats 
  • Comparing network security solutions 
  • Identify security solutions for cloud environments
  • Compare Endpoint Protection Platforms (EPP) and Endpoint Detection & Response (EDR) solutions
  • Describe the components, capabilities, and benefits of these security products and solutions

Who Should Attend?

  • Security Analyst
  • Security Systems Engineer
  • Chief Information Security Officer
  • Director of Security
  • Network Architect

Course Details/Schedule

Day 1

  • Cybersecurity Fundamentals
  • Common threats & security vulnerabilities
  • Cryptography components
  • Security intelligence authoring, sharing, and consumption
  • North Bound and South Bound
  • DNAC APIs

Day 2

  • Network security 
  • NetFlow and Flexible NetFlow records
  • Segmentation
  • Access control policies
  • AVC, URL filtering
  • Malware protection
  • Management options
  • AAA for device and network access
  • Secure network management of perimeter security
  • Site-to-site VPN
  • Remote access VPN 

Day 3

  • Securing the clouds
  • Security solutions for cloud environments
  • Customer vs. provider security responsibility
  • DevSecOps
  • Security capabilities, deployment models, and policy management
  • Cloud logging

Day 4

  • Content security 
  • Traffic redirection and capture methods
  • Web proxy identity and authentication
  • Web and email security deployment
  • Secure internet gateway
  • Cisco Umbrella

Day 5

  • Endpoint Protection Platforms (EPP)
  • Outbreak control and quarantines
  • Multifactor Authentication (MFA)
  • Posture assessment solutions
  • Security network access, Visibility and Enforcement 
  • Network access with CoA
  • Device compliance and application control
  • Exfiltration techniques
  • Network telemetry