PDFs and exam guides are not so efficient, right? Prepare for your Cisco examination with our training course. The 350-701 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to Cisco certification exam. Pass the Cisco 350-701 test with flying colors.
Curriculum for 350-701 Certification Video Course
Name of Video | Time |
---|---|
![]() 1. Cisco Certification Updates - FEB 2020 |
11:00 |
![]() 2. Cisco Re-Certifications |
1:00 |
![]() 3. CCNP Certifications |
1:00 |
![]() 4. CCIE Certifications |
2:00 |
![]() 5. Cisco Certification Migration Options |
6:00 |
![]() 6. CCNP Required Exams |
3:00 |
Name of Video | Time |
---|---|
![]() 1. CCNP Security Certifications |
7:00 |
![]() 2. CCNP SCOR - 350-701 |
1:00 |
![]() 3. SCOR 350-701 Contents |
7:00 |
Name of Video | Time |
---|---|
![]() 1. Network Security Terminology |
6:00 |
![]() 2. Goals of Network Security |
10:00 |
![]() 3. Threat Types - Mitigation |
9:00 |
![]() 4. Assets - Classification of Assets |
6:00 |
![]() 5. Classify Counter Measures |
4:00 |
![]() 6. Classify Vulnerabilities |
2:00 |
![]() 7. Network Security - Design Principles |
10:00 |
Name of Video | Time |
---|---|
![]() 1. Motivations behind Network Attacks |
3:00 |
![]() 2. Social Engineering Attacks |
4:00 |
![]() 3. Phishing Attacks |
4:00 |
![]() 4. Social Engineering Attacks |
4:00 |
![]() 5. Denial of Service Attacks - DoS |
5:00 |
![]() 6. Distributed Denial of Service Attakcs - DDoS |
4:00 |
![]() 7. Spoofing Attacks |
4:00 |
![]() 8. Spoofing Attacks - Mitigation |
4:00 |
![]() 9. Man in the Middle Attacks -MiTM |
2:00 |
![]() 10. Password Attacks |
5:00 |
![]() 11. Password Attacks - Mitigation |
4:00 |
![]() 12. Reflector Attacks |
2:00 |
![]() 13. Amplification Attacks |
2:00 |
![]() 14. Reconnaissance Attacks |
5:00 |
![]() 15. Reconnaissance Attacks - Mitigation |
2:00 |
Name of Video | Time |
---|---|
![]() 1. Malicious Codes - VIRUS |
2:00 |
![]() 2. Malicious Codes - WORMS |
1:00 |
![]() 3. Malicious Codes - TROJAN HORSES |
1:00 |
![]() 4. Hacking |
1:00 |
![]() 5. Hackers - Script Kiddies |
1:00 |
![]() 6. Malware Service - DARKNET |
1:00 |
Name of Video | Time |
---|---|
![]() 1. AAA - Network Security |
11:00 |
![]() 2. Cisco Telemetry Services |
4:00 |
![]() 3. Firewall |
8:00 |
![]() 4. Intrusion Prevention System - IPS |
4:00 |
![]() 5. Virtual Private Networks |
4:00 |
![]() 6. Next Generation Firewalls |
6:00 |
Name of Video | Time |
---|---|
![]() 1. Cisco Lab Options |
8:00 |
![]() 2. About GNS3 |
4:00 |
![]() 3. Installing GNS3 - Windows |
7:00 |
![]() 4. GNS3 - IOS Images |
6:00 |
![]() 5. Default Topology - GNS3 - IOS initial Configs |
5:00 |
![]() 6. IOS Default Topology |
9:00 |
![]() 7. GNS3 Topology-HOST Computer |
6:00 |
![]() 8. GNS3 - VMware Setup |
9:00 |
![]() 9. GNS3 - IOSv L2-L3 |
6:00 |
![]() 10. GNS3 - ASAv Setup |
4:00 |
![]() 11. GNS3 - IOU-L2-L3 |
3:00 |
Name of Video | Time |
---|---|
![]() 1. Network Infrastructure Protection |
5:00 |
![]() 2. Identify Network Device Planes |
2:00 |
![]() 3. Data Plane |
6:00 |
![]() 4. Control Plane |
3:00 |
![]() 5. Management Plane |
3:00 |
Name of Video | Time |
---|---|
![]() 1. Inband Vs OutBand Management |
7:00 |
![]() 2. Remote Access - TELNET |
6:00 |
![]() 3. Remote Access - SSH |
9:00 |
Name of Video | Time |
---|---|
![]() 1. Cisco Telemetry Services |
4:00 |
![]() 2. Device- Network Events Logging |
10:00 |
![]() 3. Syslog - Terminal Logging |
7:00 |
![]() 4. Network Time Protocol |
7:00 |
![]() 5. NTP Stratum Value |
4:00 |
![]() 6. NTP Configuration - LAB |
9:00 |
Name of Video | Time |
---|---|
![]() 1. Control Plane Security - Possible Threats |
9:00 |
![]() 2. Routing Protocol Authentication |
12:00 |
![]() 3. Control Plane Policing - CoPP |
7:00 |
![]() 4. Class-Map - Policy Map - Hierarchy |
5:00 |
![]() 5. CoPP - Configuration Examples |
12:00 |
Name of Video | Time |
---|---|
![]() 1. Switch Security - Overview |
2:00 |
![]() 2. Disable Unused Ports |
1:00 |
![]() 3. Dynamic Trunking Protocol - DTP |
8:00 |
![]() 4. DTP Vulnerabilities - Mitigation |
2:00 |
![]() 5. VLAN Hopping Attacks - Mitigation |
5:00 |
![]() 6. Cisco Discovery Protocol - CDP |
18:00 |
![]() 7. Link Layer Discovery Protocol - LLDP |
3:00 |
![]() 8. CDP- LLDP Vulnerabilities - Mitigation |
2:00 |
Name of Video | Time |
---|---|
![]() 1. MAC Flooding Attack - Port Security |
12:00 |
![]() 2. MAC Spoofing Attack - Port Security |
7:00 |
![]() 3. Port Security - Configuration |
11:00 |
![]() 4. Spanning Tree Port Fast |
7:00 |
![]() 5. Native VLAN |
8:00 |
![]() 6. DHCP Spoofing Attack - DHCP Spoofing |
8:00 |
![]() 7. DHCP Snooping - Configuration |
16:00 |
![]() 8. DHCP Starvation Attack - Mitigation |
2:00 |
![]() 9. ARP Spoofing Attack - DAI |
12:00 |
![]() 10. Dynamic ARP Inspection - Configuration |
12:00 |
![]() 11. Protected Ports- Private VLAN Edge |
3:00 |
![]() 12. Private VLAN |
9:00 |
![]() 13. Private VLAN - Configuration |
5:00 |
![]() 14. Private VLAN - LAB |
20:00 |
Name of Video | Time |
---|---|
![]() 1. What is Firewall |
8:00 |
![]() 2. Statefull Packet Filtering |
8:00 |
![]() 3. Stateless Packet Filtering |
4:00 |
![]() 4. Application Level Gateways - Proxy Servers |
5:00 |
![]() 5. Next Generation Firewalls |
6:00 |
![]() 6. FIrewall Vendors in Market |
6:00 |
Name of Video | Time |
---|---|
![]() 1. Cisco Statefull Firewalls - IOS - ASA |
3:00 |
![]() 2. ASA Supported Features _ PART1 |
9:00 |
![]() 3. ASA Supported Features _ PART2 |
11:00 |
![]() 4. ASS Compare Models |
7:00 |
Name of Video | Time |
---|---|
![]() 1. Manage Cisco CLI - ASA - GUI |
3:00 |
![]() 2. Basic CLI Modes - Commands |
4:00 |
![]() 3. ASA Security Levels |
10:00 |
![]() 4. ASA Interface Configurations |
5:00 |
![]() 5. ASA Security Policies - Default |
11:00 |
![]() 6. ASA Routing |
5:00 |
Name of Video | Time |
---|---|
![]() 1. ASA ACls - Overview |
9:00 |
![]() 2. ASA ACLS - Basic Example |
7:00 |
![]() 3. Traffic Between Same Security Levels |
3:00 |
![]() 4. ACL Object Groups |
10:00 |
![]() 5. ACL Object Groups - LAB |
12:00 |
Name of Video | Time |
---|---|
![]() 1. PRivate IP - Public IP |
5:00 |
![]() 2. What is NAT ? |
3:00 |
![]() 3. NAT Types |
6:00 |
![]() 4. Dynamic NAT - on ASA |
10:00 |
![]() 5. Dynamic PAT- ASA |
5:00 |
![]() 6. Dynamic PAT - with Exit interface |
5:00 |
![]() 7. Dynamic NAT-PAT Combination |
2:00 |
![]() 8. Static NAT - ASA |
12:00 |
![]() 9. Static PAT- ASA |
11:00 |
Name of Video | Time |
---|---|
![]() 1. IOS - Zone Based Firewall |
3:00 |
![]() 2. ZBF - Configuration Overview |
4:00 |
![]() 3. ZBF - Security Zones |
3:00 |
![]() 4. ZBF - Default Flow |
3:00 |
![]() 5. Class-Map - Policy Map - Hierarchy |
5:00 |
![]() 6. ZBF - Classify Traffic using Class-Maps |
6:00 |
![]() 7. ZBF- Class-map Configuration |
5:00 |
![]() 8. ZBF - POlicy Map - Zone Pairs |
11:00 |
Name of Video | Time |
---|---|
![]() 1. What is Cryptography |
3:00 |
![]() 2. Goals of Cryptography |
3:00 |
![]() 3. Hashing-How it Works |
3:00 |
![]() 4. Hashing with HMAC |
3:00 |
![]() 5. What is Encryption - Decryption |
1:00 |
![]() 6. Encryption Algorithms - Symmetric vs Assymetric |
5:00 |
![]() 7. Cryptanalysis - Attacks |
4:00 |
![]() 8. Asymmetric Encryption - Drawbacks |
3:00 |
![]() 9. Public Key Infrastructure - PKI |
4:00 |
Name of Video | Time |
---|---|
![]() 1. Virutal Private Network - Introduction |
5:00 |
![]() 2. VPN Types - Site to Site / Remote Access |
4:00 |
![]() 3. VPN Logical Topologies |
1:00 |
![]() 4. VPN Default Lab Setup - Routers |
5:00 |
Name of Video | Time |
---|---|
![]() 1. What is IPSec ? |
3:00 |
![]() 2. IPsec Security Services |
7:00 |
![]() 3. IPSec Modes - Tunnel vs Transport |
5:00 |
Name of Video | Time |
---|---|
![]() 1. How IPsec VPN Works |
5:00 |
![]() 2. Step-1 - Interesting Traffic |
3:00 |
![]() 3. Step-2 IKE Phase-1 |
8:00 |
![]() 4. Step-3 - IKE Phase 2 |
9:00 |
![]() 5. IKE Phase 2 - Configuration/ Verification |
7:00 |
Name of Video | Time |
---|---|
![]() 1. Remote Access VPN |
3:00 |
![]() 2. What is SSL-TLS |
3:00 |
![]() 3. How SSL-TLS Works |
8:00 |
![]() 4. What is SSL VPN |
4:00 |
![]() 5. SSL VPN - Modes |
6:00 |
Name of Video | Time |
---|---|
![]() 1. AAA - Network Security |
11:00 |
![]() 2. AAA - Components |
4:00 |
![]() 3. AAA Protocols - TACACS - RADIUS |
8:00 |
![]() 4. AAA- Cisco Authentication Servers |
4:00 |
Name of Video | Time |
---|---|
![]() 1. AAA Authentication - Device Access |
3:00 |
![]() 2. Authentication Local database |
10:00 |
![]() 3. AAA External Servers |
3:00 |
![]() 4. Authentication - External server (TACACS) |
12:00 |
Name of Video | Time |
---|---|
![]() 1. Authorization - Device Access |
3:00 |
![]() 2. IOS Privilege Levels |
9:00 |
![]() 3. Local Authorization using Privilege Levels |
14:00 |
![]() 4. IOS Privilege Levels _ Limitations |
5:00 |
![]() 5. Role based CLI Access - RBAC |
6:00 |
![]() 6. RBAC Views - Types |
4:00 |
![]() 7. RBAC Views - LAB1 |
10:00 |
![]() 8. Modify RBAC Views - LAB 2 |
4:00 |
![]() 9. Modify RBAC Views - LAB 3 |
6:00 |
![]() 10. RBAC - Super Views |
5:00 |
Name of Video | Time |
---|---|
![]() 1. Web Access - Possible Threats |
4:00 |
![]() 2. Web Based Attacks- |
5:00 |
![]() 3. Web Attack Examples |
10:00 |
![]() 4. Web Security Solutions |
5:00 |
Name of Video | Time |
---|---|
![]() 1. Cisco Web Security - WSA-CWS |
5:00 |
![]() 2. What is WSA ? |
9:00 |
![]() 3. WSA- HOw it Works |
5:00 |
![]() 4. WSA Deployment Modes |
6:00 |
![]() 5. WSA models - Physical -Virtual Appliance |
5:00 |
![]() 6. WSA Licensing Options |
7:00 |
Name of Video | Time |
---|---|
![]() 1. Email Based Threats |
2:00 |
![]() 2. Cisco Email Security Appliance - ESA |
3:00 |
Name of Video | Time |
---|---|
![]() 1. Intrusion Prevention System - IPS |
3:00 |
![]() 2. IDS vs IPS |
2:00 |
![]() 3. Host Based IPS vs Network Based IPS |
6:00 |
![]() 4. IPS Deployment Modes - INline vs Promiscious |
3:00 |
![]() 5. Cisco IPS Solutions |
5:00 |
![]() 6. IPS Threat Detection Methods |
7:00 |
![]() 7. IPS Signature Alarm Types |
3:00 |
![]() 8. IPS Signature Actions |
3:00 |
![]() 9. IPS Evasion Methods - CounterMeasures |
6:00 |
Name of Video | Time |
---|---|
![]() 1. What is Network Management |
8:00 |
![]() 2. Past-Present Methods of Network Mangement- PART 1 |
14:00 |
![]() 3. Past-Present Methods of Network Mangement- PART 2 |
7:00 |
![]() 4. SNMP- Simple Network Mangement Protocol |
18:00 |
Name of Video | Time |
---|---|
![]() 1. Challenges - Traditional Management |
11:00 |
![]() 2. Network Automation - Goals |
16:00 |
![]() 3. Types of Network Automation |
6:00 |
![]() 4. What can be Automated - PART 1 |
12:00 |
![]() 5. What can be Automated - PART 2 |
9:00 |
![]() 6. Impact of Network Automation |
8:00 |
Name of Video | Time |
---|---|
![]() 1. Automation Origination Points |
8:00 |
![]() 2. SDN - Software Defined Networking |
15:00 |
![]() 3. SDN Controllers |
9:00 |
![]() 4. Networks Managed by SDN Controllers |
13:00 |
Name of Video | Time |
---|---|
![]() 1. Management Plane |
3:00 |
![]() 2. SDN-Management Plane |
7:00 |
Name of Video | Time |
---|---|
![]() 1. SDN - Imperative Model |
5:00 |
![]() 2. SDN - Declarative Model |
7:00 |
![]() 3. SDN - Network Design Requirments |
9:00 |
![]() 4. UNderlaY Networks |
7:00 |
![]() 5. Overlay Networks |
7:00 |
![]() 6. SDN Fabric |
6:00 |
Name of Video | Time |
---|---|
![]() 1. Application Programming Interface - API |
11:00 |
![]() 2. API Types |
4:00 |
![]() 3. API - With SDN Networks |
9:00 |
![]() 4. NorthBound API |
9:00 |
![]() 5. SouthBound API |
8:00 |
Name of Video | Time |
---|---|
![]() 1. Cisco DevNet |
5:00 |
![]() 2. DevNet Certifications |
5:00 |
![]() 3. DevNet Sandbox |
6:00 |
![]() 4. DevNet Sandbox LABS |
8:00 |
![]() 5. Sandbox LAB Access - Reservations |
3:00 |
Name of Video | Time |
---|---|
![]() 1. Cisco DNA Center |
16:00 |
![]() 2. DNA Center Appliance |
4:00 |
![]() 3. DNA Center- What can do - PART 1 |
11:00 |
![]() 4. DNA Center- What can do - PART 2 |
13:00 |
Name of Video | Time |
---|---|
![]() 1. Web Service API |
8:00 |
![]() 2. Web Service API - Commonly Used |
8:00 |
![]() 3. REST API |
8:00 |
Name of Video | Time |
---|---|
![]() 1. Config Management Tools |
6:00 |
![]() 2. Config Management Tools - Capabilities |
9:00 |
![]() 3. Master-Agent |
6:00 |
![]() 4. Agent Based vs Agentless |
7:00 |
![]() 5. Push-Pull Model |
10:00 |
![]() 6. Configuration Files |
5:00 |
Name of Video | Time |
---|---|
![]() 1. PUPPET - Config MGMT Tool |
3:00 |
![]() 2. PUPPET-Master Agent Database |
3:00 |
![]() 3. PUPPET - Manifest |
5:00 |
![]() 4. PUPPET-Module-Forge |
6:00 |
![]() 5. PUPPET-Agent- Agentless |
3:00 |
![]() 6. PUPPET-PULL Model Steps |
4:00 |
Name of Video | Time |
---|---|
![]() 1. CHEF- Config MGMT Tool |
6:00 |
![]() 2. CHEF- Terminology |
7:00 |
Name of Video | Time |
---|---|
![]() 1. ANSIBLE- COnfig MGMT Tool |
8:00 |
![]() 2. ANSIBLE- Control Station |
3:00 |
![]() 3. ANSIBLE- PlayBook-Inventory |
5:00 |
![]() 4. ANSIBLE- Templates-Variables |
7:00 |
Name of Video | Time |
---|---|
![]() 1. API Data Formats |
8:00 |
![]() 2. JSON Overview |
8:00 |
![]() 3. JSON Data Types |
7:00 |
![]() 4. JSON Syntax Rules |
3:00 |
![]() 5. JSON Data Interpretation |
7:00 |
100% Latest & Updated Cisco SCOR 350-701 Practice Test Questions, Exam Dumps & Verified Answers!
30 Days Free Updates, Instant Download!
350-701 Premium Bundle
Cisco 350-701 Training Course
Want verified and proven knowledge for Implementing and Operating Cisco Security Core Technologies? Believe it's easy when you have ExamSnap's Implementing and Operating Cisco Security Core Technologies certification video training course by your side which along with our Cisco 350-701 Exam Dumps & Practice Test questions provide a complete solution to pass your exam Read More.
Prepared by Top Experts, the top IT Trainers ensure that when it comes to your IT exam prep and you can count on ExamSnap Implementing and Operating Cisco Security Core Technologies certification video training course that goes in line with the corresponding Cisco 350-701 exam dumps, study guide, and practice test questions & answers.
Purchase Individually
Cisco Training Courses
Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.
LIMITED OFFER: GET 30% Discount
This is ONE TIME OFFER
A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.
Download Free Demo of VCE Exam Simulator
Experience Avanset VCE Exam Simulator for yourself.
Simply submit your e-mail address below to get started with our interactive software demo of your free trial.