top of page

Choose Cisco SCOR 350-701 Course in Malaysia

Completely project-based Cisco SCOR 350-701 Course.

Course Price

RM 8,000

RM 6,500

Duration: 5 days/40 hours live instructor-led training.

Speak with our Course Advisor

Overview

The Cisco SCOR 350-701 certification is designed for IT professionals seeking to enhance their skills in security core technologies. This course equips candidates with the necessary knowledge to implement and manage Cisco security solutions, crucial in today’s cybersecurity landscape. With a focus on secure network design, threat management, and operational efficiency, the SCOR certification validates an individual's expertise in maintaining the integrity of network environments.

Highlights
  • 40 hours of live instructor-led training

  • Practical lab exercises to reinforce theoretical knowledge in real-world scenarios

  • Comprehensive exam practice questions—over 600 latest questions accessible via our dedicated server

  • E-book resources with tools and software for deeper understanding

  • Flexible learning options: Choose between live online classes or physical classroom settings

  • Outstanding reputation: 4.8-star Google rating from previous students

  • High success rate: 95% exam passing rate on the first attempt

+

-

  • Core Security Concepts: Understand the foundational elements of network security, including CIA triad and risk management.

  • Implementing Security Solutions: Learn to deploy Cisco security solutions such as firewalls, intrusion prevention systems, and endpoint security.

  • Secure Network Access: Gain insights into securing network access using VPNs, authentication protocols, and access control lists.

  • Threat Intelligence and Management: Explore how to identify, analyze, and respond to potential security threats.

  • Security Automation: Learn to use automation tools and scripting to enhance security operations.

+

-

A background in networking principles is beneficial. Candidates with 1-2 years of experience in implementing security solutions will find this course particularly advantageous. Familiarity with basic IP addressing and security concepts will also aid in grasping advanced topics more effectively.

+

-

This course is ideal for various IT roles, including:

  • Security Engineers

  • Network Administrators

  • IT Support Professionals

  • Cybersecurity Analysts

+

-

Completing this course will provide you with the skills to implement and manage security solutions effectively, preparing you for the SCOR 350-701 exam and enhancing your career in cybersecurity.

-

+

  • Expert Guidance: Learn from certified instructors with extensive industry experience.

  • Hands-On Training: Engage in practical exercises that reinforce theoretical concepts.

  • Community Support: Join a network of professionals and exchange knowledge and experiences.

-

+

  • Lifetime Access to recorded sessions for revision and reference.

  • Sample Papers for exam preparation.

  • Certificate of Completion to highlight your dedication to professional growth.

-

+

  • Configure Cisco security appliances and solutions.

  • Understand and implement security policies and procedures.

  • Master advanced security technologies and their integration into existing infrastructure.

  • Develop skills for incident response and threat mitigation.

+

-

  • Career Advancement: Achieve recognition as a Cisco-certified professional in security technologies.

  • Industry Standards: Demonstrate your capability in managing and securing network environments effectively.

  • Professional Growth: Enhance your marketability and job prospects within the IT industry.

+

-

  • Course Fee: RM 6, 500 (Terms and Conditions Apply)

  • Duration: 5 days/40 hours

+

-

The inquiry process comprises three simple steps.

  • Submit Inquiry- Tell us a bit about yourself and the questions you want to enquire about. Use our CHAT feature or submit an enquiry form. You can also WhatsApp us on +601112216870 (Mr Vaheed)

  • Reviewing–Your questions will be processed and answered within a day or two 

  • Response–Answers will typically be sent through email. However, you may tell us the option you prefer us to contact you in

+

-

  • Physical Classroom Training (Malaysia)

  • On-site Company Training (Malaysia)

  • Online Training via Microsoft Teams/ZOOM. (Malaysia and International)

By enrolling in the Cisco SPCOR 350-701 course, you're taking a significant step toward mastering the technologies that power service provider networks. Join us today!

Contact Us

+

-

Module 1: Security Fundamentals

  • Overview of Threats in On-Premises and Cloud Settings

    • On-Premises Threats: These include viruses, trojans, denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks, phishing schemes, rootkits, man-in-the-middle attacks, SQL injection, cross-site scripting, and various types of malware.

    • Cloud Threats: Key concerns involve data breaches, insecure APIs, DoS/DDoS attacks, and compromised user credentials.

  • Common Security Vulnerabilities

    • Examine vulnerabilities like software bugs, weak or hardcoded passwords, SQL injection, lack of encryption, buffer overflows, path traversal issues, and cross-site scripting or forgery.

  • Functions of Cryptographic Components

    • Discuss cryptographic elements such as hashing, encryption, Public Key Infrastructure (PKI), Secure Sockets Layer (SSL), Internet Protocol Security (IPsec), NAT Traversal for IPv4 in IPsec, and both pre-shared key and certificate-based authentication.

  • VPN Deployment Types

    • Compare site-to-site and remote access VPNs, including options like Virtual Tunnel Interface (sVTI), IPsec, Cryptomap, Dynamic Multipoint VPN (DMVPN), and Flexible VPN (FLEXVPN), along with high availability considerations and Cisco AnyConnect.

  • Security Intelligence Management

    • Describe the processes of authoring, sharing, and utilizing security intelligence.

  • Endpoint Protection Against Phishing and Social Engineering

    • Discuss how endpoints play a crucial role in safeguarding users from phishing and social engineering attacks.

  • SDN Architecture APIs

    • Explain the functions of North Bound and South Bound APIs in Software-Defined Networking (SDN).

  • DNAC APIs Utilization

    • Clarify how DNAC APIs facilitate network provisioning, optimization, monitoring, and troubleshooting.

  • Python Scripting for API Calls

    • Interpret basic Python scripts used to interact with Cisco security appliance APIs.

 

Module 2: Network Security Strategies

  • Intrusion Prevention and Firewall Solutions

    • Compare various network security solutions that offer intrusion prevention and firewall capabilities.

  • Deployment Models for Network Security

    • Describe different deployment architectures for network security solutions that incorporate intrusion prevention and firewall functionalities.

  • NetFlow and Flexible NetFlow

    • Outline the components, features, and advantages of NetFlow and Flexible NetFlow records.

  • Configuring Network Infrastructure Security

    • Implement and verify security methods for routers, switches, and wireless networks, covering Layer 2 techniques like VLAN segmentation, port security, DHCP snooping, Dynamic ARP inspection, storm control, Private VLANs, and defenses against various attacks (e.g., MAC, ARP, VLAN hopping).

  • Device Hardening Techniques

    • Focus on securing network infrastructure devices across the control plane, data plane, management plane, and routing protocol security.

  • Policy Implementation for Security

    • Set up segmentation, access control policies, Application Visibility and Control (AVC), URL filtering, and malware defenses.

  • Management Options for Security Solutions

    • Discuss management options for intrusion prevention and perimeter security, addressing single vs. multi-device management, in-band vs. out-of-band configurations, and associated security risks.

  • Authentication, Authorization, and Accounting (AAA)

    • Configure AAA for device and network access, including TACACS+, RADIUS, accounting, and dynamic ACLs.

  • Secure Network Management Configuration

    • Establish secure management protocols for perimeter security and infrastructure devices, using SNMPv3, authentication, encryption, and secure logging.

  • VPN Configuration and Verification

    • Set up and verify both site-to-site and remote access VPNs, using Cisco routers and the AnyConnect client, including debug commands for IPsec tunnel monitoring and troubleshooting.

 

Module 3: Cloud Security Measures

  • Cloud Environment Security Solutions

    • Identify security solutions suitable for different cloud models: public, private, hybrid, and community clouds, and cloud service types (SaaS, PaaS, IaaS as defined in NIST 800-145).

  • Shared Security Responsibilities

    • Compare the security responsibilities of customers and providers across various cloud service models, including aspects like patch management and security assessments.

  • DevSecOps Concept

    • Describe the DevSecOps framework, focusing on CI/CD pipelines, container orchestration, and security measures.

  • Application and Data Security in the Cloud

    • Implement strategies for securing applications and data within cloud environments.

  • Security Capabilities and Policy Management

    • Identify the necessary security capabilities, deployment models, and policy management techniques for cloud security.

  • Cloud Logging and Monitoring

    • Configure methodologies for effective logging and monitoring in cloud environments.

  • Application and Workload Security

    • Discuss key concepts surrounding the security of applications and workloads in the cloud.

 

Module 4: Content Security Strategies

  • Traffic Redirection and Capture

    • Implement techniques for redirecting and capturing traffic.

  • Web Proxy Authentication

    • Explain the role of web proxies in user identity authentication, including transparent identification methods.

  • Comparative Analysis of Email and Web Security Solutions

    • Compare local and cloud-based solutions for email and web security (e.g., ESA, CES, WSA) in terms of features and benefits.

  • Email and Web Security Deployment

    • Configure and validate deployment strategies for email and web security to protect both on-premises and remote users.

  • Email Security Features Configuration

    • Implement security features for email, including spam filtering, anti-malware protection, data loss prevention (DLP), blacklisting, and email encryption.

  • Internet Gateway Security

    • Set up and verify secure internet gateway features such as URL filtering, malware scanning, and TLS decryption.

  • Cisco Umbrella Overview

    • Describe the components and advantages of Cisco Umbrella in content security.

  • Web Security Controls on Cisco Umbrella

    • Configure and verify web security settings on Cisco Umbrella, including identity management and reporting functionalities.

 

Module 5: Endpoint Protection and Detection

  • Comparison of EPP and EDR Solutions

    • Contrast Endpoint Protection Platforms (EPP) with Endpoint Detection and Response (EDR) solutions.

  • Understanding Antimalware and Security Measures

    • Explain concepts such as antimalware, retrospective security, Indications of Compromise (IOC), antivirus solutions, dynamic file analysis, and endpoint telemetry.

  • Outbreak Control Measures

    • Configure and validate outbreak control procedures and quarantines to minimize infections.

  • Justifying Endpoint Security

    • Discuss the rationale for implementing endpoint-based security measures.

  • Value of Endpoint Device Management

    • Highlight the importance of endpoint management and asset inventory, such as Mobile Device Management (MDM).

  • Multifactor Authentication (MFA)

    • Describe the significance of a multifactor authentication strategy for enhancing security.

  • Endpoint Posture Assessment Solutions

    • Explain the role of endpoint posture assessment in maintaining security.

  • Importance of Endpoint Patching

    • Discuss the necessity of a strategic approach to endpoint patching.

 

Module 6: Secure Network Access and Enforcement

  • Identity Management and Secure Access

    • Describe concepts related to identity management, including guest services, profiling, posture assessment, and Bring Your Own Device (BYOD) policies.

  • Network Access Device Configuration

    • Configure and validate functionality for network access devices such as 802.1X, MAC Authentication Bypass (MAB), and Web Authentication.

  • Change of Authorization (CoA)

    • Explain the concept and benefits of Change of Authorization in network access.

  • Device Compliance and Application Control

    • Discuss the advantages of maintaining device compliance and controlling application access.

  • Exfiltration Techniques

    • Describe methods used for data exfiltration, such as DNS tunneling and various protocol exploitations.

  • Benefits of Network Telemetry

    • Outline the benefits associated with implementing network telemetry solutions.

  • Cisco Security Products Overview

    • Describe the components and advantages of various Cisco security products, including:

      • Cisco Stealthwatch

      • Cisco Stealthwatch Cloud

      • Cisco pxGrid

      • Cisco Umbrella Investigate

      • Cisco Cognitive Threat Analytics

      • Cisco Encrypted Traffic Analytics

      • Cisco AnyConnect Network Visibility Module (NVM)

WHY NEXPERTS ACADEMY

CERTIFIED-01.png

- CERTIFIED TRAINERS

EXPERIENCE-01.png

- HIGHLY EXPERIENCED
WITH INTERVIEW PREPARATION

24 HRS-01.png

- 24/7 SUPPORT

RECORDING-01.png

- LIFETIME ACCESS TO
RECORDED SESSIONS

CALENDAR-01.png

- FLEXIBLE SCHEDULE

ONE ON ONE-01.png

- ONE ON ONE ASSISTANCE

bottom of page