HAPPY BOOKSGIVING
Use code BOOKSGIVING during checkout to save 40%-55% on books and eBooks. Shop now.
Register your product to gain access to bonus material or receive a coupon.
CCNP and CCIE Security Core SCOR 350-701 Exam Cram is the perfect study guide to help you pass the CCNP and CCIE Security Core SCOR 350-701 exam, providing coverage and practice questions for every exam topic. The book contains an extensive set of preparation tools, including topic overviews, exam alerts, CramSavers, CramQuizzes, chapter-ending review questions, author notes, tips, and an extensive glossary.
The book also contains the extremely useful Cram Sheet: a collection of essential facts in an easy to review format. Complementing all these great study tools is the powerful Pearson Test Prep practice test software, complete with hundreds of exam-realistic practice questions. This assessment software offers you a wealth of customization options and reporting features, allowing you to test your knowledge in study mode, practice mode, or flashcard mode.
Covers the critical information youll need to know to score higher on your CCNP and CCIE Security Core SCOR 350-701 exam
CCNP and CCIE Security Core SCOR 350-701 Exam Cram, Premium Edition eBook and Practice Test
The exciting CCNP and CCIE Security Core SCOR 350-701 Exam Cram Premium Edition eBook and Practice Test is a digital-only certification preparation product combining an eBook with enhanced Pearson Test Prep practice test software. The Premium Edition eBook and Practice Test contains the following items:
About the Premium Edition Practice Test
This Premium Edition contains an enhanced online version of the Pearson Test Prep practice test software with four full practice exams. In addition, it contains all the chapter-opening assessment questions from the book. The online version allows you to access the practice tests that come bundled with our best-selling study guides via the Internet on any desktop, laptop, tablet, or smartphone device with Internet connectivity. The new web-based version also allows you to download the software to your desktop, so you can use the practice test even when you don't have an Internet connection. The desktop version syncs with your online version when an Internet connection is established, to update and track your progress. This integrated learning package offers these additional benefits:
Download the sample pages (includes pages 1-10 of Chapter 1)
Introduction. . . . . . . . . . . . xviii
CHAPTER 1: Security Concepts.. . . . . . . . . . . 1
Explain Common Threats Against On-Premises and Cloud Environments.. . . . . . . . . 3
Compare Common Security Vulnerabilities.. . . . . 19
Describe Functions of the Cryptography Components. . . . 25
Compare Site-to-Site VPN and Remote Access VPN Deployment Types.. . . . . . . . . 31
Describe Security Intelligence Authoring, Sharing, and Consumption.. 38
Explain the Role of the Endpoint in Protecting Humans from Phishing and Social Engineering Attacks.. . . . . . 41
Explain Northbound and Southbound APIs in the SDN Architecture.. 44
Explain DNAC APIs for Network Provisioning, Optimization, Monitoring, and Troubleshooting.. . . . . . . 48
Interpret Basic Python Scripts Used to Call Cisco Security Appliance APIs.. . . . . . . . . . 51
What Next?.. . . . . . . . . . . 56
CHAPTER 2: Network Security.. . . . . . . . . . . 57
Compare Network Security Solutions and Provide Intrusion Prevention and Firewall Capabilities.. . . . . . 60
Describe Deployment Models of Network Security Solutions and Architectures That Provide
Intrusion Prevention and Firewall Capabilities.. . . . . . . . . 65
Describe the Components, Capabilities, and Benefits of NetFlow and Flexible NetFlow Records.. . . . . . . . 70
Traditional NetFlow vs. Flexible NetFlow.. . . . . 74
Configure and Verify Network Infrastructure Security Methods (Router, Switch, and Wireless).. . . . . . . 77
Implement Segmentation, Access Control Policies, AVC, URL Filtering, and Malware Protection. . . . . . . 89
Implement Management Options for Network Security Solutions.. . 93
Configure AAA for Device and Network Access.. . . . . 97
Configure Secure Network Management of Perimeter Security an Infrastructure Devices.. . . . . . . . . 101
Configure and Verify Site-to-Site VPN and Remote Access VPN.. . 106
What Next?.. . . . . . . . . . . 119
CHAPTER 3: Securing the Cloud.. . . . . . . . . . 121
Identify Security Solutions for Cloud Environments.. . . . 122
Compare Security Responsibilities for the Different Cloud Service Models.. . . . . . . . . . 129
Describe the Concepts of DevSecOps (CI/CD Pipeline), Container Orchestration, and Secure
Software Development.. . . . 132
Implementing Application Security.. . . . . . . 136
Identify Security Capabilities, Deployment Models, and Policy Management to Secure the Cloud.. . . . . . . 142
Configure Cloud Logging and Monitoring. . . . . . 144
Application Security Concepts.. . . . . . . . 146
What Next?.. . . . . . . . . . . 150
CHAPTER 4: Content Security.. . . . . . . . . . . 151
Web Proxy Fundamentals. . . . . . . . . 158
Web Proxy Identity and Authentication.. . . . . . 167
Cisco Secure Web Appliance Identification and Authentication. 167
Content Security Overview.. . . . . . . . 171
Deploying Cisco Secure Web Appliance and Secure Email Gateway.. 184
Secure Email Gateway Configuration.. . . . . . 190
Cisco Secure Web Appliance Configuration.. . . . . 202
Cisco Umbrella Overview.. . . . . . . . 209
Cisco Umbrella Configuration.. . . . . . . . 216
What Next?.. . . . . . . . . . . 222
CHAPTER 5: Endpoint Protection and Detection.. . . . . . . . 223
Endpoint Protection and Endpoint Detection and Response. . . 225
Cisco Secure Endpoint.. . . . . . . . . 227
Outbreak Control and Quarantines.. . . . . . . 230
Justifications for Endpoint Security.. . . . . . . 239
Endpoint Management and Asset Inventory Tools.. . . . 241
Uses and Importance of a Multifactor Authentication Strategy.. . 246
Endpoint Posture Assessments to Ensure Endpoint Security. . . 252
Endpoint Patching Strategy.. . . . . . . . 254
What Next?.. . . . . . . . . . . 256
CHAPTER 6: Secure Network Access, Visibility, and Enforcement.. . . . 257
Identity Management Concepts.. . . . . . . 262
AAA Configuration.. . . . . . . . . . 275
RADIUS Change of Authorization.. . . . . . . 292
RADIUS CoA Use Cases. . . . . . . . 292
Application Visibility and Control.. . . . . . . 297
Data Exfiltration. . . . . . . . . . 300
Network Telemetry.. . . . . . . . . . 305
Cisco Security Solutions.. . . . . . . . . 308
What Next?.. . . . . . . . . . . 319
Cram Sheet. . . . . . . . . . . . 321
Online Element:
Glossary
9780137282517, TOC, 2/19/24