Compare with 1 course

Cisco Implementing and Operating Security Core Technologies

Cisco Implementing and Operating Security Core Technologies

GH₵4300

GH₵4500

The Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) course focuses on core knowledge and skills needed to master the topics on the Cisco Certified Specialist - Security Core Certification. Those topics include cybersecurity fundamentals, network security, cloud security, identity management, secure network access, endpoint protection and detection, and visibility and enforcement.

Learn more
Has discount
Expiry period 6 Months
Made in English
Last updated at Mon Oct 2025
Level
Intermediate
Total lectures 0
Total quizzes 0
Total duration Hours
Total enrolment 0
Number of reviews 0
Avg rating
Short description The Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) course focuses on core knowledge and skills needed to master the topics on the Cisco Certified Specialist - Security Core Certification. Those topics include cybersecurity fundamentals, network security, cloud security, identity management, secure network access, endpoint protection and detection, and visibility and enforcement.
Outcomes
  • Explain how to monitor for and protect against security threats on-premises and in cloud environments
  • Describe reports that are used to manage threats, predict vulnerabilities and troubleshoot issues
  • Compare network security solutions and deployment models
  • Configure different AAA for networks, secure network management, and VPNs
  • Identify and describe how to secure the cloud environment
  • Configure content security features
  • Explain endpoint protection and detection solutions
  • Describe secure network access, visibility, and enforcement
Requirements
  • Internet
  • Laptop or Desktop
  • 3 to 5 years of experience in IT and cybersecurity
  • Knowledge of implementing and operating core security technologies; understanding cloud security; hands-on experience with next-generation firewalls, intrusion prevention systems, and other network infrastructure devices; understanding of content security, endpoint protection and detection, and secure network access, visibility an enforcement; and understanding of cybersecurity with hands-on experience in implementing security controls