Cisco Platinum Learning Partner Logo

SCOR

Implementing and Operating Cisco Security Core Technologies

Cisco Platinum Learning Partner Logo

5 days Instructor Led Training plus 3 days self-study. The lab exercises can be accessed after the course for 60 hours over a period of 90 days.

Implementing and Operating Cisco Security Core Technologies (SCOR) training provides you with the skills and technologies you need to implement key Cisco security solutions. This training prepares you to provide advanced protection against cybersecurity attacks and prepares you for senior level security roles. Gain hands-on experience implementing core security technologies and learn best practices for Cisco security solutions.

Course Contents

  • Describe information security concepts and strategies within the network 
  • Describe security flaws in the transmission protocol/internet protocol (TCP/IP) and how they can be used to attack networks and hosts 
  • Describe network application-based attacks 
  • Describe how various network security technologies work together to guard against attacks 
  • Implement access control on Cisco Secure Firewall Adaptive Security Appliance (ASA) 
  • Deploy Cisco Secure Firewall Threat Defense basic configurations 
  • Deploy Cisco Secure Firewall Threat Defense IPS, malware, and fire policies 
  • Deploy Cisco Secure Email Gateway basic configurations 
  • Deploy Cisco Secure Email Gateway policy configurations 
  • Describe and implement basic web content security features and functions provided by Cisco Secure Web Appliance 
  • Describe various attack techniques against the endpoints 
  • Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console 
  • Provide basic understanding of endpoint security and be familiar with common endpoint security technologies 
  • Describe Cisco Secure Endpoint architecture and basic features 
  • Describe Cisco Secure Network Access solutions 
  • Describe 802.1X and extensible authentication protocol (EAP) authentication 
  • Configure devices for 802.1X operations 
  • Introduce VPNs and describe cryptography solutions and algorithms 
  • Describe Cisco secure site-to-site connectivity solutions 
  •  Deploy Cisco Internetwork Operating System (Cisco IOS®) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs 
  • Configure point-to-point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense 
  • Describe Cisco secure remote access connectivity solutions 
  • Deploy Cisco secure remote access connectivity solutions 
  • Provide an overview of network infrastructure protection controls 
  • Examine various defenses on Cisco devices that protect the control plane 
  • Configure and verify Cisco IOS software layer 2 data plane controls 
  • Configure and verify Cisco IOS software and Cisco ASA layer 3 data plane controls 
  • Examine various defenses on Cisco devices that protect the management plane 
  • Describe the baseline forms of telemetry recommended for network infrastructure and security devices 
  • Describe deploying Cisco Secure Network Analytics 
  • Describe basics of cloud computing and common cloud attacks 
  • Describe how to secure cloud environment 
  • Describe the deployment of Cisco Secure Cloud Analytics 
  • Describe basics of software-defined networks and network programmability

E-Book Symbol You will receive the original course documentation from Cisco in English language as a Cisco E-Book. In the Cisco Digital Learning Version, the content of the courseware is integrated into the learning interface instead.

Request in-house training now

Target Group

  • Security Engineers 
  • Network Engineers 
  • Network Designers 
  • Network Administrators 
  • Systems Engineers 
  • Consulting Systems Engineers 
  • Technical Solutions Architects 
  • Cisco Integrators and Partners 
  • Network Managers 
  • Program Managers 
  • Project Managers 

Knowledge Prerequisites

There are no prerequisites for this training course. However, it is recommended that you have the following knowledge and skills before attending this course:

  • Familiarity with Ethernet and TCP/IP networks
  • Good knowledge of the Windows operating system
  • Knowledge of Cisco IOS networks and concepts
  • Familiarity with the basics of network security concepts

Complementary and Continuative Courses

SFWIPF – Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention
SISE – Implementing and Configuring Cisco Identity Services Engine
SESA – Securing Email with Cisco Email Security Appliance
SWSA – Securing the Web with Cisco Web Security Appliance
SVPN – Implementing Secure Solutions with Virtual Private Networks
SAUI – Implementing Automation for Cisco Security Solutions
SFWIPA – Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention
SCAZT – Designing and Implementing Secure Cloud Access for Users and Endpoints
Zertifizierungen Symbol You are interested in a certification? The course at hand is part of the following certification(s):

Certification as CCNP Security Certification

Certification as CCIE Security

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Hybrid training

Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Cisco Digital Learning

This course is available in the Cisco Digital Learning Library. These recently developed, multi-modal training events include HD videos moderated by lecturers with stored searchable text and subtitles, as well as a exercises, labs, and explanatory text and graphics. We provide this offer to you via our myExperTeach learning portal. Effective of the activation of the account, access to the courses will be granted for a duration of 6 months. In the case of packet solutions (Cisco Digital Learning Subscriptions), this time period will amount to 12 months.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request in-house training now
PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.

5 days Instructor Led Training plus 3 days self-study. The lab exercises can be accessed after the course for 60 hours over a period of 90 days.

Implementing and Operating Cisco Security Core Technologies (SCOR) training provides you with the skills and technologies you need to implement key Cisco security solutions. This training prepares you to provide advanced protection against cybersecurity attacks and prepares you for senior level security roles. Gain hands-on experience implementing core security technologies and learn best practices for Cisco security solutions.

Course Contents

  • Describe information security concepts and strategies within the network 
  • Describe security flaws in the transmission protocol/internet protocol (TCP/IP) and how they can be used to attack networks and hosts 
  • Describe network application-based attacks 
  • Describe how various network security technologies work together to guard against attacks 
  • Implement access control on Cisco Secure Firewall Adaptive Security Appliance (ASA) 
  • Deploy Cisco Secure Firewall Threat Defense basic configurations 
  • Deploy Cisco Secure Firewall Threat Defense IPS, malware, and fire policies 
  • Deploy Cisco Secure Email Gateway basic configurations 
  • Deploy Cisco Secure Email Gateway policy configurations 
  • Describe and implement basic web content security features and functions provided by Cisco Secure Web Appliance 
  • Describe various attack techniques against the endpoints 
  • Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console 
  • Provide basic understanding of endpoint security and be familiar with common endpoint security technologies 
  • Describe Cisco Secure Endpoint architecture and basic features 
  • Describe Cisco Secure Network Access solutions 
  • Describe 802.1X and extensible authentication protocol (EAP) authentication 
  • Configure devices for 802.1X operations 
  • Introduce VPNs and describe cryptography solutions and algorithms 
  • Describe Cisco secure site-to-site connectivity solutions 
  •  Deploy Cisco Internetwork Operating System (Cisco IOS®) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs 
  • Configure point-to-point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense 
  • Describe Cisco secure remote access connectivity solutions 
  • Deploy Cisco secure remote access connectivity solutions 
  • Provide an overview of network infrastructure protection controls 
  • Examine various defenses on Cisco devices that protect the control plane 
  • Configure and verify Cisco IOS software layer 2 data plane controls 
  • Configure and verify Cisco IOS software and Cisco ASA layer 3 data plane controls 
  • Examine various defenses on Cisco devices that protect the management plane 
  • Describe the baseline forms of telemetry recommended for network infrastructure and security devices 
  • Describe deploying Cisco Secure Network Analytics 
  • Describe basics of cloud computing and common cloud attacks 
  • Describe how to secure cloud environment 
  • Describe the deployment of Cisco Secure Cloud Analytics 
  • Describe basics of software-defined networks and network programmability

E-Book Symbol You will receive the original course documentation from Cisco in English language as a Cisco E-Book. In the Cisco Digital Learning Version, the content of the courseware is integrated into the learning interface instead.

Request in-house training now

Target Group

  • Security Engineers 
  • Network Engineers 
  • Network Designers 
  • Network Administrators 
  • Systems Engineers 
  • Consulting Systems Engineers 
  • Technical Solutions Architects 
  • Cisco Integrators and Partners 
  • Network Managers 
  • Program Managers 
  • Project Managers 

Knowledge Prerequisites

There are no prerequisites for this training course. However, it is recommended that you have the following knowledge and skills before attending this course:

  • Familiarity with Ethernet and TCP/IP networks
  • Good knowledge of the Windows operating system
  • Knowledge of Cisco IOS networks and concepts
  • Familiarity with the basics of network security concepts

Complementary and Continuative Courses

SFWIPF – Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention
SISE – Implementing and Configuring Cisco Identity Services Engine
SESA – Securing Email with Cisco Email Security Appliance
SWSA – Securing the Web with Cisco Web Security Appliance
SVPN – Implementing Secure Solutions with Virtual Private Networks
SAUI – Implementing Automation for Cisco Security Solutions
SFWIPA – Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention
SCAZT – Designing and Implementing Secure Cloud Access for Users and Endpoints

Zertifizierungen Symbol You are interested in a certification? The course at hand is part of the following certification(s):

Certification as CCNP Security Certification

Certification as CCIE Security

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Hybrid training

Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Cisco Digital Learning

This course is available in the Cisco Digital Learning Library. These recently developed, multi-modal training events include HD videos moderated by lecturers with stored searchable text and subtitles, as well as a exercises, labs, and explanatory text and graphics. We provide this offer to you via our myExperTeach learning portal. Effective of the activation of the account, access to the courses will be granted for a duration of 6 months. In the case of packet solutions (Cisco Digital Learning Subscriptions), this time period will amount to 12 months.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request in-house training now

PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.