Online Courses
- 1. Cisco Certified Network Associate - CCNA 200-301
- 2. CCNP ENTERPRISE – Core 350-401
- 3. CCNP ENTERPRISE – Advanced Routing 300-410
- 4. CCNP ENTERPRISE – SDWAN 300-415 – WAN Automation
- 5. SD-ACCESS – Cisco DNAC- LAN Automation
- 6. CCNP SECURITY - 350-701 Security Core
- 7. CCNP SECURITY - 300-730 Virtual Private Networks (VPN)
- 8. CCNP SECURITY - 300-710 Firepower + NGIPS
- 9. CCNP SECURITY – Web /Email Security (300-720/725)
- 10. CCNP SECURITY - 300-715 Identity Service Engine (ISE)
- 11. CCNP SERVICE PROVIDER – 350-501 Core
- 12. CCNP SERVICE PROVIDER – 350-510 Advanced Routing
- 13. CCNP SERVICE PROVIDER – 300-515 VPN Services
- 14. CCNP DATACENTER – 350-601 Core
- 15. CCNP DATACENTER – 300-620 ACI (Application Centric Infrastructure)
- 16. CCNP DATACENTER – Nexus
- 17. CCIE ENTPERISE INFRASTRUCTURE
- 18. CCIE Security
- 19. CCIE Service Provider
- 20. JNCIA - Enterprise Routing and Switching (JN0-102)
- 21. Cisco ASA firewall / Cisco Firepower-
- 22. Checkpoint Firewall (CCSA)
- 23. Fortigate Firewall (NSE 4-5 )
- 24. PaloAlto Firewall
- 25. F5 Load balancers – LTM
- 26. Python Programming – for Network Engineers
- 27. CCNA Devnet – 300-901
- 28. Cisco Ansible- Automating networks
- 29. Microsoft Certified Engineer ( MCSE 2016)
- 30. Vmware Vsphere 6.5
- 31. AWS Solutions Architect
- 32. Microsoft Azure Administrator
350-701 SCOR
Implementing and Operating Cisco Security Core Technologies
Duration – 6 Weeks ( 120 hrs/day)
Price – 20,000 INR ( 300 USD )
DEMO VIDEO (YouTube links)
Training Program Includes
Contact us to reserve your slot for Online Trainings
For more Details Mail us on info@noasolutions.com
Faster communication – WhatsApp – +91 7036826345
Course Content
- Software and networking become more and more interconnected every day.
- Security teams can take advantage of automation to scale their security solutions.
- Today’s security professionals need a broader range of skills and deeper focus in strategic technology areas.
- The new CCNP Security certification program gives you exactly that breadth and depth.
- The core exam is also the qualifying exam for CCIE Security Certification.
This exam tests your knowledge of implementing and operating core security technologies, including:
- Network security
- Cloud security
- Content security
- Endpoint protection and detection
- Secure network access
- Visibility and enforcement
- SDN and Network Automation Concepts
Who this course is for:
- Network Security Engineers
- Security Engineers
Cisco Certifications
- About Cisco
- Cisco Certification Updates
- Cisco Re-Certification
- CCNP Certifications
- 005 CCIE Certifications
- 006 Cisco Certification Migration Options
- Required Exams for CCNP
CCNP SCOR - 350-701
- CCNP Security Certifications
- CCNP SCOR-350-701
- SCOR-Contents
Network Security Concepts
- Network Security Terminology
- Goals of Network Security
- Understanding Threat Types -Mitigation
- Assets - Classification of Assets
- Classify Countermeasures
- Classify Vulnerabilities
- Network Security - Design Principles
Common Security Attacks - Mitigation
- Motivations Behind Network Attacks
- Social Engineering Attacks
- Phishing Attacks
- Social Engineering - Phishing Mitigation
- Denail of Service Attacks - DoS
- Distributed Denial of Service Attacks - DDoS
- Spoofing Attacks
- Spoofing Attacks - Mitigation
- Man in the Middle Attacks - MiTM
- Password Attacks
- Password Attacks - Mitigation
- Reflector Attacks
- Amplification Attacks
- Reconnaissance Attacks
- Reconnaissance Attacks - Mitigation
Malicious Codes - HACKING
- Malicious Codes - VIRUS
- Malicious Codes - WORMS
- Malicious Codes - TROJAN HORSES
- Hacking
- Hackers - Script Kiddies
- Malware services Darknet
Threat Defense Technologies
- What is Firewall
- Next Generation Firewalls
- AAA- Network Security
- Virtual Private Networks
- Cisco Traffic Telemetry methods
- Intrusion Prevention System - IPS
LABS VIRTUAL - GNS3
- Cisco Lab Options
- About GNS3
- Installing GNS3 on Windows
- GNS3 - Adding IOS Images
- Default Topology- IOS Routers -Initial Configurations
- IOS Default Topology
- Connecting GNS3 Topology to Host Computer
- GNS3- VMWARE Integration
- GNS3 - IOSv L2-L3 Configuration Steps
- GNS3 - ASAv Setup
- GNS3- IOU- L2-L3 Configuration Steps
Network Infrastructure Protection
- Network Infrastructure Protection
- Identify Network Planes
- Data Plane
- Control Plane
- Management Plane
Remote Management - TELNET -SSH
- Inband vs OutBand
- Remote Access - Telnet
- Remote Access - SSH
Cisco Telemetry Services
- Cisco Traffic Telemetry methods
- Device-Network Events Logging
- Syslog - Terminal Logging
- Network Time Protocol
- NTP -Stratum Value
- LAB - NTP - Configuration
Control Plane Security
- Control Plane - Possible Threats
- Routing Protocol Authentication
- Control Plane Policing -CoPP
- Class Map -Policy Map -Hierarchy
- CoPP_ Configuration Example
Layer 2 Security - Basic Options
- Switch Security - Overview
- Disable Unused Ports
- Dynamic Trunking Protocol
- DTP Vulnerabilities - Mitigation
- VLAN Hopping Attack- Mitigation
- CDP Overview
- LLDP Overview
- CDP-LLDP- Vulnerabilities - Mitigation
Layer 2 Security - Advanced
- MAC Flooding Attack - Port Security
- MAC Spoofing Attack - Port Security
- Port Security - Configuration
- Spanning-tree Portfast
- What is Native VLAN
- DHCP Spoofing Attack- DHCP Snooping
- DHCP Snooping - Configuration
- DHCP Starvation Attack - Mitigation
- ARP Spoofing Attack - Dynamic ARP Inspection -DAI
- Dynamic ARP Inspection - Configuration
- Protected Ports - Private VLAN Edge
- Private VLAN - Overview
- Private VLAN - Configuration
- Private VLAN - Configuration Lab
- Protected Ports-Private VLAN Edge
Firewalls - Introduction
- What is Firewall
- Stateful packet Filtering
- Stateless Packet Filtering
- Application Level Gateways - Proxy Servers
- Next Generation Firewalls
- Which Firewall - Vendors
Cisco ASA Firewall
- Cisco Stateful Firewalls - IOS-ASA
- ASA-Supported Features-Part 1
- ASA-Supported Features-Part 2
- ASA - Compare models
Cisco ASA -CLI
- Manage Cisco ASA-CLI-GUI
- ASA Basic CLI Modes - Commands
- ASA Security levels
- ASA Interface configuration
- ASA Security Policies - Default
- ASA - Routing
ASA - ACL - Object Groups
- ASA ACLs - Overview
- ACL ACLs- Basic Example
- Traffic between Same Security level
- ACL Object-Groups
- ACL Object-Groups - LAB
ASA - Network Address Translation
- Public-Private IP
- What is NAT
- NAT Types
- Dynamic NAT on ASA
- Dynamic PAT on ASA
- Dynamic PAT using Exit Interface
- Dynamic NAT-PAT Combination
- Static NAT on ASA
- Static PAT on ASA
Zone Based Firewall - ZBF
- IOS - Zone based Firewall
- ZBF- Configuration overview
- ZBF- Security zones
- ZBF - Default Traffic flow
- Class map -Policy map -Hierarchy
- ZBF - Classify Traffic using Class-maps
- ZBF- Class-map Configuration
- ZBF- Policy Map- Zone Pairs
Cryptography
- What is Cryptography
- Goals of Cryptography
- What is Hashing How it works
- Hashing with HMAC
- What is Encryption - Decryption
- Encryption Algorithms - Symmetric vs Asymmetric
- Cryptanalysis - Attacks
- Asymmetric Encryption - Drawbacks
- Public Key Infrastructure
Virtual Private Networks - VPN
- VPN-Introduction
- VPN Types
- VPN Logical Topologies
- VPN Default Lab Setup- Routers
IPSEC - Internet Protocol Security
- What is IPSEC
- IPSEC Security Services
- IPSEC Modes - Tunnel vs Transport
IPSEC Site to Site VPN
- How IPsec VPN works
- Step-1 Interesting Traffic Configuration
- Step-2 IKE Phase-1
- Step-3- IKE - Phase 2
- IKE Phase -2 Configuration- Verification
Remote VPN- SSL VPN
- Remote Access VPN
- What is SSL - TLS
- How SSL-TLS Works
- What is SSL VPN
- SSL VPN Modes
AAA - Authentication-Authorization-Accounting
- AAA- Network Security
- AAA - Components
- AAA - Protocols -TACACS- RADIUS
- AAA - Cisco Authentication Servers
AAA - Authentication
- AAA Authentication - Device Access
- Authentication - Local Database
- AAA - External Servers
- LAB- Authentication - TACACS
AAA Authorization
- Authorization - Device Access
- IOS Privilege Levels
- LAB -Local Authorization- Privilege Levels
- IOS Privilege Levels - Limitations
- Role based CLI Access - RBAC
- RBAC - Views Types
- LAB1- RBAC Views
- LAB2 - Modify RBAC Views
- LAB3 - RBAC Views
- LAB4 - RBAC Super Views
Web Based Attacks - Web Security
- Web Access-Possible Threats
- Web Based Attacks -Threats
- Web Attacks-Examples
- Web Security Solutions
Cisco WSA - Web Security Appliance
- Cisco Web Security-WSA-CWS
- What is WSA
- WSA-How it Works
- WSA Deployment Modes
- WSA Models-Physical-Virtual
- WSA Licensing Options
Cisco ESA - Email Security Appliance
- Email Based Threats
- Cisco Email Security - ESA - CES
Intrusion Prevention System - IPS
- What is Intrusion?
- Intrusion Prevention System - IPS
- IDS vs IPS
- Host based IPS vs Network Based IPS
- IPS Deployments - Inline vs Promiscuous
- Cisco IPS Solutions
- IPS Threat Detection Methods
- Signature Alarm Types
- IPS Signature Actions
- IPS Evasion Methods - Countermeasures
What is Network Management?
- What is Network Management
- Past-Present Methods of Network Management - PART 1
- Past-Present Methods of Network Management - PART 2
- Simple Network Management Protocol - SNMP
What is Network Automation?
- Challenges - Traditional Management
- Network Automation- Goals
- Types of Network Automation
- What can be Automated- PART 1
- What can be Automated - PART 2
- Impact of Network Automation
Software Defined Networking - SDN & SDN Controllers
- Automation Origination Points
- SDN- Software Defined Networking
- SDN Controllers
- Networks Managed by SDN Controllers
SDN-Control - Management - Data Planes
- Identify Network Device Planes
- Identify Network Device Planes
- Data Plane
- Control Plane
- Management Plane
- SDN- Management Plane
- SDN - Control Plane- Data Plane
SDN Models - Architecture
- SDN - Imperative Model
- SDN - Declarative Model
- SDN-Network Design Requirements
- Underlay Networks
- Overlay Networks
- SDN Fabric
Application Programming Interface - API
- API - Application Programming Interface
- API - Types
- API - with SDN Networks
- NorthBound API
- SounthBOund API
Cisco Devnet - SandBox
- Cisco DEVNET
- DevNET Certifications
- DevNET SandBox
- Sandbox LABS
- Sandbox Lab Access-Reservations
Cisco DNA Center
- Cisco DNA Center
- DNA Center Appliance
- DNA Center- What can do - PART 1
- DNA Center- What can do - PART 2
Web Service API - REST API
- Web Service API
- Web Service API - Commonly Used
- REST API
Network Automation Tools
- Config MGMT Tools
- Config MGMT Tools - Capabilities
- Config-MGMT tools - Similarities
- Master - Agent
- Agent based- Agentless
- Push-Pull Model
- Configuration Files
PUPPET Config Management Tool
- Puppet Master-Agent-Database
- PUPPET-Tool
- Puppet-Manifest
- Puppet-Module-Forge
- Puppet- PULL Model Steps
- Puppet Agent-Agentless
CHEF Config Management Tool
- CHEF- Config MGMT Tool
- CHEF-Terminology
ANSIBLE Config MGMT Tool
- ANSIBLE-Tool
- ANSIBLE-Control Station
- ANSIBLE -Playbook-Inventory
- ANISBLE - Templates-Variables
JSON DATA Encoding
- API Data Formats
- JSON Overview
- JSON Data Types
- JSON Syntax Rules
- JSON Data Interpretation