For a better view on Inspire Cayman Training, Update Your Browser.

Cisco (Online Courses)

Elevate your career trajectory with our premier online course, designed to sharpen your competitive edge. Explore our curated selection of top-tier digital programs to hone your skills and propel your professional journey forward. Experience transformative learning tailored to empower your career advancement in today's dynamic landscape.
Course Category
Price on Request
Start Learning
This Course Includes
  • 58 hours 15 minutes
    of self-paced video lessons
  • 60 Programs
    crafting your path to success
  • Completion Certificate
    awarded on course completion

CBROPS: Attack Surfaces, Vulnerability, & Analysis Tools

Price on Request 30 minutes
There are many things in cybersecurity that sound similar but are not. In this course, you'll learn to distinguish the attack surface from vulnerability. You'll also learn the basics of the tcpdump and NetFlow tools. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operation
Perks of Course
Certificate: Yes
CPD Points: 30
Compliance Standards: AICC

CBROPS: CVSS, Deployments, Access Control, & Data Visibility

Price on Request 1 hour 15 minutes
A SOC data analyst may depend on external data to help with understanding potential attacks against systems. In this course, you'll learn how the CVSS helps and what information it provides to a cybersecurity data analyst. You'll examine the implementation of security methods and how they fit into security design. You'll review how access control is implemented across an organization and some of the available access control models. Finally, it's important to know about network data visibility challenges, so you'll learn what they are and how to deal with them. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
Perks of Course
Certificate: Yes
CPD Points: 77
Compliance Standards: AICC

CBROPS: Data & Attack Types

Price on Request 50 minutes
In this course, you'll learn about data types that provide valuable information for security monitoring. You'll explore different network attacks, including protocol-based, DoS, DDoS and MITM attacks. Finally, you'll also look at common web application attacks like SQL injection, command injection, and cross-site scripting. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
Perks of Course
Certificate: Yes
CPD Points: 52
Compliance Standards: AICC

CBROPS: Data Loss, Host Isolation, & Detection Methods

Price on Request 50 minutes
In this course, you'll learn to identify potential data loss indicators noted from a traffic profile. Then, you'll explore the 5-tuple approach for isolating a host. Finally, there are different detection methods that are used when securing networks dynamically. You'll review the similarities between them and how they operate to bring about usable results. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
Perks of Course
Certificate: Yes
CPD Points: 51
Compliance Standards: AICC

CBROPS: File Extraction, Event Artifacts, & Regular Expressions

Price on Request 1 hour 5 minutes
In this course, you'll learn how to extract files from a TCP stream from a PCAP file using Wireshark. Next, you'll explore how to identify intrusion elements from a given pcap file using Wireshark. You'll learn how to interpret common artifacts from events for an alert using the Cisco FMC. Finally, you'll examine how to use basic regular expressions with grep and the Cisco CLI. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
Perks of Course
Certificate: Yes
CPD Points: 66
Compliance Standards: AICC

CBROPS: Firewall, Filtering, Visibility, & Control Data

Price on Request 1 hour
A key part of your role as an SOC data analyst is knowing what tool will give you the type of data type you want to analyze. In this course, you'll learn about useful next-gen and stateful firewall data. You'll explore content filtering, as well as web and e-mail content filtering, and why they are useful. Next, you'll review application level visibility and control data. Finally, you'll learn how the use of different technology can cause unexpected data visibility challenges. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
Perks of Course
Certificate: Yes
CPD Points: 62
Compliance Standards: AICC

CBROPS: Host-based Analysis & the Role of Attribution

Price on Request 1 hour 10 minutes
In this course, you'll learn about host-based attacks in their various forms. Next, you'll explore components of Windows 10 and Ubuntu that are useful in host-based analysis. Finally, you'll examine the concept of attribution and its importance when investigating an organizational security breach. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
Perks of Course
Certificate: Yes
CPD Points: 69
Compliance Standards: AICC

CBROPS: Incident Response, Security Management, & Analysis

Price on Request 55 minutes
In this course, you'll review NIST800-86 to learn basic forensic techniques for incident response. You'll examine management concepts needed to be known and addressed in a security policy. Finally, you'll explore the relationship between metrics and scope analysis in a SOC. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
Perks of Course
Certificate: Yes
CPD Points: 54
Compliance Standards: AICC

CBROPS: Log Evidence, Disk Images, & Malware Analysis Output

Price on Request 50 minutes
In this course, you'll examine the importance of logs, as well as types of evidence that can be acquired from them. Next, you'll learn how critical disk images can be during an investigation and about the comparisons and analysis that can transpire in an investigation. Finally, you'll review some of the most important information that can be found in the out of malware analysis tools. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
Perks of Course
Certificate: Yes
CPD Points: 51
Compliance Standards: AICC

CBROPS: Protected Data, Profiling, Forensics, & IRP

Price on Request 1 hour 5 minutes
In this course, you'll learn how to identify protected data in a network, as well as how to identify elements in network and server profiling. You'll explore the use of NIST SP 800-61 to identify forensic elements and how to apply them to the incident handling process. Finally, you'll learn how NIST SP 800-61 guides incident handling and review the elements of an incident response plan. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
Perks of Course
Certificate: Yes
CPD Points: 67
Compliance Standards: AICC

CBROPS: Security Events, Firewall Operations, & Traffic Analysis

Price on Request 1 hour 10 minutes
In this course, you'll learn to categorize intrusion events according to the cyber kill chain and diamond intrusion models. Next, with so many tools available, you'll examine which ones should be used to identify different security events. You'll learn the differences between deep packet inspection, packet filtering, and stateful firewall operations. Finally, you'll review the differences between inline traffic interrogation, taps, and traffic monitoring. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
Perks of Course
Certificate: Yes
CPD Points: 72
Compliance Standards: AICC

CBROPS: Social Engineering, Evasion, Obfuscation, & Certificates

Price on Request 55 minutes
In this course, you'll examine multiple examples of social engineering attacks that you should be familiar with as an analyst. Attacks are not always easily identified, so you'll learn about the different evasion and obfuscation techniques. Finally, you'll learn about the different components of digital certificates and what these components do. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
Perks of Course
Certificate: Yes
CPD Points: 53
Compliance Standards: AICC

CBROPS: The CIA Triad & Security Approaches

Price on Request 1 hour 10 minutes
For those aspiring or current IT professionals pursuing a job role as an entry or associate-level cybersecurity analyst, or for those pursuing the Cisco Certified CyberOps Associate certification, this course will introduce you to cybersecurity operations in a security operation center. You'll review security concepts, policies, and procedures used by a CyberOps Associate working within a SOC. You'll learn about the CIA triad, a model of implementing security on networks. Next, you'll explore basic models for cybersecurity and various security approaches. Finally, you'll review security terminology you should be familiar with and common security practices and tools for the CyberOps Associate. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
Perks of Course
Certificate: Yes
CPD Points: 68
Compliance Standards: AICC

CBROPS: Threat Actors, Security, & Risk Management

Price on Request 55 minutes
In this course, you'll learn about threat actor types and review related examples. You'll then explore commonly confused security concepts - risk, threat, vulnerability, and exploit. Finally, you'll examine risk management concepts, including risk scoring/weighting, risk reduction, and risk assessment. This course is one of a collection that prepares learners for the 200-201: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) exam.
Perks of Course
Certificate: Yes
CPD Points: 56
Compliance Standards: AICC

RSTECH: Cisco Equipment, Components, & Port Characteristics

Price on Request 1 hour
Network field technicians need to look at a Cisco network and recognize what each device does, the physical characteristics of those devices, how they interact with other components on the network, and what to consider before troubleshooting them. In this course, you'll nail down how to ID networking equipment by function alone and grasp its role in both the context of the operational network and in troubleshooting. You'll start by categorizing network equipment by function before identifying how they operate in context and how they facilitate troubleshooting. You'll then examine how Cisco devices work with different networking media and the potential requirements for their use. Finally, you'll investigate the physical and functional characteristics of the ports on Cisco devices. This course can be used in preparation for the 100-490: Supporting Cisco Routing and Switching Network Devices (RSTECH) exam and to attain the Cisco Certified Technician (CTT) Routing & Switching certification.
Perks of Course
Certificate: Yes
CPD Points: 60
Compliance Standards: AICC

RSTECH: Cisco Memory Functions & Removing Cisco Devices

Price on Request 40 minutes
The complex expertise of field technicians involves knowing how to differentiating devices with the same functional nature by the diversity of that function. You need to be able to take that information and decide how to troubleshoot - keeping in mind all requirements before carrying out the resolution. In this course, you'll explore the memory-related characteristics of Cisco IOS devices and how to decipher what's involved in device replacement. You'll start by examining how Cisco IOS devices use different types of memory. You'll then define how to troubleshoot these devices based on their memory type. Next, you'll review what's expected of a field technician. You'll end this course by outlining what you need to think about before device removal and replacement. This course can be used in preparation for the 100-490: Supporting Cisco Routing and Switching Network Devices (RSTECH) exam and to attain the Cisco Certified Technician (CTT) Routing & Switching certification.
Perks of Course
Certificate: Yes
CPD Points: 39
Compliance Standards: AICC

RSTECH: IOS Commands, Startup-Config, & IOX-XE Modes

Price on Request 50 minutes
To practice as a certified Cisco technician, not only do you need to identify problems and solutions theoretically, you also need to be able to implement troubleshooting techniques on Cisco devices. To do this, you need to be confident using the appropriate IOS commands to get a device to do what you want it to do. In this course, you'll learn how to interact directly with the CLI of a Cisco IOS device by using standard commands and responding to specific prompts. In addition to this, you'll examine how to create, back up, and restore the startup-config of a device, recognizing why this is important for ensuring the device functions in the same way as the device it replaces. Finally, you'll learn to differentiate between the IOS-XE modes and how to identify them on an IOS-XE Cisco device. This course can be used in preparation for the 100-490: Supporting Cisco Routing and Switching Network Devices (RSTECH) exam and to attain the Cisco Certified Technician (CTT) Routing & Switching certification.
Perks of Course
Certificate: Yes
CPD Points: 50
Compliance Standards: AICC

RSTECH: Network Responsibilities, Addressing, & Utilities

Price on Request 50 minutes
Significantly reduced network performance or an unavailable network has severe consequences for a business's employees and end-users. Prompt and timely troubleshooting ensures that the knock-off effect of a faulty network is kept to a minimum. To minimize this collateral damage, network technicians need to find out what the fault is, where it is, and how best to rectify it. In this course, you'll gain some of the core skills needed to efficiently and effectively diagnose, repair, and restore networking and system devices. You'll start by investigating the purpose of service demarcation concepts and how to apply them. Next, you'll examine several network IP addressing protocols and their importance. Lastly, you'll delve into the frequently used standard networking utilities, like Telnet, SSH, TFTP, FTP, and PuTTY. This course can be used in preparation for the 100-490: Supporting Cisco Routing and Switching Network Devices (RSTECH) exam and to attain the Cisco Certified Technician (CTT) Routing & Switching certification.
Perks of Course
Certificate: Yes
CPD Points: 52
Compliance Standards: AICC

RSTECH: Networking Hardware, Models, & Technologies

Price on Request 1 hour
Troubleshooting networking issues, be it as a technician in the field or in-house, involves identifying the offending hardware and applying the correct theoretical concepts. In this course, you'll learn to identify standard networking devices, systems, concepts, models, and technologies so you can solve client networking and connectivity issues regardless of physical location or setup. You'll start by exploring the fundamental networking concepts and routing and switching devices outlined in the Cisco RSTECH exam. You'll expand on this to identify standard networking equipment by functionality. Next, you'll investigate what comprises the vital networking models OSI and TCP/IP. You'll then classify Layer 1 and Layer 2 technologies, distinguishing cabling from standards. At the end of this course, you'll recognize typical connectivity issues and how to configure devices remotely. This course can be used in preparation for the 100-490: Supporting Cisco Routing and Switching Network Devices (RSTECH) exam and to attain the Cisco Certified Technician (CTT) Routing & Switching certification.
Perks of Course
Certificate: Yes
CPD Points: 59
Compliance Standards: AICC

RSTECH: OS Types, IOS Access, & Terminal Emulation

Price on Request 50 minutes
When delving into a client's networking environment, a field technician needs to suss out each component and their interdependence as efficiently and accurately as possible. In this course, you'll build on your diagnostic skills by exploring Cisco OS types, some popular connection techniques, and two standard network protocols for remote device communication, access, and management. You'll start by investigating the different Cisco OS types you're likely to encounter daily. You'll then learn how to distinguish them by their primary differentiators. Next, you'll examine how to connect to a Cisco IOS device directly and what's needed to access it. Finally, you'll learn how to use terminal emulation for Cisco IOS device access by employing the network protocols Telnet and SSH. This course can be used in preparation for the 100-490: Supporting Cisco Routing and Switching Network Devices (RSTECH) exam and to attain the Cisco Certified Technician (CTT) Routing & Switching certification.
Perks of Course
Certificate: Yes
CPD Points: 51
Compliance Standards: AICC

RSTECH: Troubleshooting, Upgrading, Recovering, & Resetting

Price on Request 1 hour 20 minutes
In order to take on the responsibility of troubleshooting and recovering Cisco devices, you need to be able to recognize a series of basic IOS troubleshooting commands. As a technician, you will also need to be familiar with using Windows tools to perform basic network troubleshooting tasks. In this course, you'll learn the basic commands and tools available in Windows 10 that can help you troubleshoot network connectivity. Next, you'll explore the tasks and commands needed to upgrade the Cisco IOS. You'll examine how to perform password recovery on a Cisco device and explore additional miscellaneous tools that you may encounter when you need to troubleshoot or reconfingure a device. Finally, you'll learn how to perform a factory reset on a Cisco IOS device. This course can be used in preparation for the 100-490: Supporting Cisco Routing and Switching Network Devices (RSTECH) exam and to attain the Cisco Certified Technician (CTT) Routing & Switching certification.
Perks of Course
Certificate: Yes
CPD Points: 80
Compliance Standards: AICC

SCOR: Cisco Firepower, Traffic Management, Identity, & Authentication

Price on Request 1 hour
In this course, you'll learn about the ASAv, FMCv, and FTDv in AWS, as well as how you would register an FTD in the FMC. Next, you'll move on to explore the need to deploy web security solutions transparently and how to implement this using the Web Cache Communication Protocol. You'll also learn how to view the implementation with a Cisco ASA. Finally, you'll learn about Cisco's Web Security Appliance, how it handles web requests in the network, and the importance of identity and authentication on the Cisco WSA. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 62
Compliance Standards: AICC

SCOR: Cisco Umbrella & Endpoint Security

Price on Request 50 minutes
When it comes to an IP and DNS-centric approach to network security, there is nothing quite like Cisco Umbrella. In this course, you'll learn about the Cisco Umbrella solution, including how to ensure it is properly configured and verified. Next, you'll examine EPP and EDR and their roles in securing network endpoints. You'll learn about the importance and uses of Cisco AMP and about a variety of other products that can be used to assist with keeping your endpoints secure. Finally, you'll explore the Outbreak Control functionality of Cisco AMP for Endpoints is the Outbreak Control. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 52
Compliance Standards: AICC

SCOR: Cloud Deployment, Service Models, Responsibilities, & Security

Price on Request 1 hour
In this course, you'll learn about the cloud in general, including the NIST definition of cloud (NIST 800-145) and cloud deployment and service models. You'll discover that you don't have to sacrifice security when you move to the cloud and explore the types of security responsibilities that exist with the cloud and the parties that are responsible for them. Finally, you'll learn about various cloud security processes and solutions that you should be familiar with if the cloud is an important aspect of your IT infrastructure, including cloud logging, auditing, and the security of workloads. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 61
Compliance Standards: AICC

SCOR: Configuring and Verifying VPN & IPsec

Price on Request 1 hour 5 minutes
There are many different styles of site-to-site VPNs possible because there are Cisco-centric types, as well as open standard designs. In this course, you'll examine a typical configuration of a site-to-site VPN, such as the DMVPN configuration and verification. Then you'll explore the many types of remote access VPN Cisco supports, including having a Cisco ASA provide VPN access to remote clients. Finally, you'll learn how to determine if your traffic is being protected in your IPsec site-to-site VPN built between Cisco devices. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 66
Compliance Standards: AICC

SCOR: Device Compliance, Exfiltration, Telemetry, & Security Products

Price on Request 50 minutes
In this course, you'll learn how device compliance and application control can be achieved using Cisco products. You'll explore why data exfiltration is one of the central concerns for security professionals. Next, you'll learn about network telemetry and model-driven telemetry and their increasing popularity in the industry. You'll also examine an example of how you might use telemetry in the Cisco network. Finally, you'll learn about the impressive number of security technologies in the Cisco solution portfolio, broken down by category and individual products in each category. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 49
Compliance Standards: AICC

SCOR: DHCP Snooping, DAI, IP Source Guard, Private VLANs, & Storm Control

Price on Request 1 hour 10 minutes
When you think about attacking a network with a rogue DHCP device, you realize it is such a relatively easy attack to carry out. In this course, you'll learn about the DHCP snooping feature and how it is configured. Next, you'll examine how multiple different security features can leverage the DHCP snooping database that results from a proper implementation of DHCP snooping, including a demonstration of both the DAI and IP Source Guard features. You'll learn about the often intimidating security feature private VLANs, including the details of these structures and the reason why they exist. Finally, you'll explore traffic storms, including when they occur, how they create excessive traffic and can degrade network performance, and how to use the traffic storm control feature. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 71
Compliance Standards: AICC

SCOR: Guest Services, BYOD, 802.1X, & CoA

Price on Request 45 minutes
In lower security environments, there is often a desire to permit guest access to the network. These guests might get limited Internet access or even access to some of the non-sensitive network resources and data. In this course, you'll learn about the Identity Service Engine, which is the component in the Cisco security portfolio that can make this access seamless to configure and implement. You'll also learn about guest access and BYOD for the network. Next, you'll move on to examine the use of 802.1X in high security enterprises to ensure that each network user is authenticated and then authorized for their network and resource access. You'll also look at related technologies like MAB and WebAuth. Finally, you'll explore the RADIUS Change of Authorization feature, which can be critical for certain network security functions. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 43
Compliance Standards: AICC

SCOR: MDM, MFA, & Endpoint Solutions

Price on Request 1 hour
Mobile Device Management is widespread and getting more so all the time. MDM permits the management and control of all mobile devices that make their way to the typical enterprise today and in this course you'll learn about MDM as a cloud-based solution. Next, you'll look at the three main factors you can use to implement MFA and why you might choose some factors over the others. You'll examine the use of posture assessment as part of the overall security design and the key elements of this approach. Finally, you'll learn about the challenges of keeping systems patched, as well as various endpoint patching issues and approaches. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 62
Compliance Standards: AICC

SCOR: Network Access & Secure Network Management

Price on Request 1 hour 30 minutes
In this course, you'll learn about options for the management of Cisco Firepower devices, including FMC, FDM, and ASDM. You'll explore how AAA can protect access through the device and to the device. Next, you'll learn about the RADIUS and TACACS+ security protocols, as well as commands you should use to ensure authentication to a Cisco device. Finally, you'll learn about critical best practices in secure network management for your enterprise and the syntax used with SNMP version 3. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 47
Compliance Standards: AICC

SCOR: PKI & IKE

Price on Request 50 minutes
A major aspect of Internet-based security these days hinges upon the Public Key Infrastructure. In this course, you'll learn the basics of this critical set of technologies. PKI is the magic behind the use of seamless SSL/TLS authentication and encryption on the public Internet and this clever implementation of asymmetric encryption algorithms can also be used in your private enterprise. You'll continue your exploration of PKI by learning how to fulfill a certificate request. Finally, you'll learn about the Internet Key Exchange, including the differences between IKE v1 and v2. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 48
Compliance Standards: AICC

SCOR: Port Security, VLAN Hopping, Network Hardening, & Access Control

Price on Request 55 minutes
Port security is not one of the most important features when it comes to securing your network and it does have its challenges, but this feature is definitely a nice layer of defense in your overall defense-in-depth strategy. In this course, you'll learn about port security, as well as the VLAN hopping attack and how it can be prevented. You'll explore several security techniques you can use to help harden the network against security attacks and how it can benefit you to break the network and network device functionality down into the three planes of operation - management, data, and control planes. You'll also examine examples of security technologies you can use at each plane of operation to harden the overall network. Finally, you'll learn about different approaches to providing secure access to data in network systems, including MAC, DAC, and RBAC. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 57
Compliance Standards: AICC

SCOR: SDN APIs & Security Appliance API Calls

Price on Request 40 minutes
In this course, you'll learn about SDN and the northbound and southbound APIs used with it. You'll also learn about the RESTful APIs that you can make use of for the programmability of your Cisco security devices. You'll also discover how these API calls can be used in an actual network environment and how to quickly get started with programmatic code referencing these important APIs. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 39
Compliance Standards: AICC

SCOR: Security Basics & Common Threats

Price on Request 1 hour
In this course, you'll first review basic SCOR concepts and why they are important. Next, you'll move on to explore common language when it comes to securing your lT architecture and how to correctly use this language when discussing your security environment. You'll examine common attack methods in order to properly secure your on-prem IT environment. With the popularity of the cloud, computer criminals have begun targeting these areas with more and more frequency. To wrap up this course, you'll learn about some of the most common attacks against the cloud. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 58
Compliance Standards: AICC

SCOR: Security Models & Frameworks

Price on Request 1 hour
There is often confusion about why there are intrusion prevention devices when we already have firewalls. Aren't these devices doing the same thing? In this course, you'll learn the differences between these network security functions and tools. You'll also look at some specialized devices in more detail, including the Web Security Appliance and the Email Security Appliance. You'll move on to explore how you can deploy the ASA and Firepower in different ways like routed or transparent mode. Next, you'll learn about NetFlow and Flexible NetFlow, valuable tools for monitoring the flows of data through your network. You'll also see how you can safely leverage the power of Flexible NetFlow to help control your network. Finally, you'll learn about techniques for adding segmentation to your network, including EPGs in Cisco ACI and SGTs. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 60
Compliance Standards: AICC

SCOR: Security Vulnerabilities, Attack Mitigations, & Cryptographic Solutions

Price on Request 1 hour 15 minutes
There are many common vulnerabilities in software and systems and you must understand them to effectively secure your network systems. In this course, you'll learn about some of these vulnerabilities, as well as common attack mitigation techniques for network application style attacks. Before reviewing cybersecurity technologies in greater detail, you'll first look at the basics of cryptography and the critical role it plays in computer and network security. Finally, you'll explore some current cryptographic solutions and what they are used for. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 77
Compliance Standards: AICC

SCOR: VPNs, Security Intelligence, & Social Engineering Attacks

Price on Request 1 hour 15 minutes
There is no denying it, VPN is a hugely popular part of the modern Internet. In this course, you'll learn about different types of VPN, its uses, and various technologies you can use. Next, you'll explore security devices and their ability to help you author, share, and consume security intelligence data. You'll examine social engineering attacks that are very prevalent today, including how to protect against them and the software you can use for defense. Finally, you'll learn about some of the most common attacks today, including many different variations of phishing attacks. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 74
Compliance Standards: AICC

SCOR: Working with ESA, CES, & WSA

Price on Request 1 hour 15 minutes
Cisco has demonstrated its commitment to securing the enterprise with many different solutions that focus on specific needs, such as the Email Security Appliance, Cisco Cloud Email Security, and the Web Security Appliance. In this course, you'll learn the key facts about all three of these solutions. You'll explore how the WSA and ESA are impressive appliances when it comes to securing your web and e-mail infrastructures and about the components that make up these solutions. Even if you're not currently planning on implementing a WSA in your enterprise, it can be beneficial to see what a typical configuration is like. So next you'll look at the options available with the WSA. Finally, you'll learn about the steps involved in a typical ESA configuration and verification and how the ESA can function for you in the enterprise. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 74
Compliance Standards: AICC

SENSS 1.0: ASA Firewall Access Control

Price on Request 1 hour 30 minutes
Discover how Access Control Lists (ACLs) and Network Objects can be used to configure and build firewall rules on Cisco devices.
Perks of Course
Certificate: Yes
CPD Points: 60
Compliance Standards: AICC

SENSS 1.0: ASA Firewall Configuration & Access Control

Price on Request 1 hour 10 minutes
Explore how to configure a new Cisco ASA firewall, including the initial configuration commands needed to enable the firewall and how to secure administrative access to the device in preparation of placing a firewall into production use.
Perks of Course
Certificate: Yes
CPD Points: 68
Compliance Standards: AICC

SENSS 1.0: Centralized Logging & Device Management

Price on Request 40 minutes
Examine the importance of having a central location to store device logs from an organization's network infrastructure and explore some of the centralized device management solutions available from Cisco.
Perks of Course
Certificate: Yes
CPD Points: 40
Compliance Standards: AICC

SENSS 1.0: Cisco Port-Based Traffic Control

Price on Request 50 minutes
Discover Storm Control and how it can be used to prevent broadcast attacks and use port security to link ports to MAC addresses to prevent unauthorized hardware on a network.
Perks of Course
Certificate: Yes
CPD Points: 49
Compliance Standards: AICC

SENSS 1.0: DHCP Snooping & IP Source Guard

Price on Request 40 minutes
Discover how DHCP snooping, ARP inspection, and IP Source Guard can be configured and used to prevent network attacks.
Perks of Course
Certificate: Yes
CPD Points: 42
Compliance Standards: AICC

SENSS 1.0: High Availability & Private VLANs

Price on Request 1 hour
Explore high availability by clustering Cisco devices and use private VLANs to isolate systems in a multi-tenant environment.
Perks of Course
Certificate: Yes
CPD Points: 62
Compliance Standards: AICC

SENSS 1.0: IPv6 Support & Traffic Inspection

Price on Request 1 hour 30 minutes
Explore IPv6, how to use IPv6 NAT, and how to use the advanced traffic inspection features to prevent network attacks.
Perks of Course
Certificate: Yes
CPD Points: 48
Compliance Standards: AICC

SENSS 1.0: Role-Based Access Control

Price on Request 55 minutes
Explore how to harden an IOS device to prevent unauthorized access by configuring filtered command sets that can be assigned to users based on their role. Examine IOS zone-based firewalls and the steps necessary to enable them.
Perks of Course
Certificate: Yes
CPD Points: 53
Compliance Standards: AICC

SENSS 1.0: Traffic & Device Monitoring

Price on Request 50 minutes
Explore how NetFlow can be leveraged to gain visibility into the types of traffic passing through a network and how SNMP can be used to poll performance and configuration data from a Cisco device.
Perks of Course
Certificate: Yes
CPD Points: 50
Compliance Standards: AICC

SENSS 1.0: Transparent Firewalls & Security Contexts

Price on Request 1 hour
Discover transparent and virtual firewalls and how they can be used to improve network security.
Perks of Course
Certificate: Yes
CPD Points: 61
Compliance Standards: AICC

SENSS 1.0: Twice NAT & Network Object NAT

Price on Request 55 minutes
Explore network address translation on Cisco devices using Twice NAT and the newer Network Object NAT.
Perks of Course
Certificate: Yes
CPD Points: 57
Compliance Standards: AICC

SENSS 1.0: Zone-Based Firewalls

Price on Request 35 minutes
Explore the final steps in configuring an IOS-based router as a network firewall and special zones that can be used alongside the configuration. Discover how the "self" zone functions and how single zone traffic is handled.
Perks of Course
Certificate: Yes
CPD Points: 36
Compliance Standards: AICC

SNCF: Access Control, FTD, & Prefilter Policies

Price on Request 55 minutes
Access control policies are critically important as almost all of your traffic will pass through this policy at some point. This policy dictates whether traffic will be passed, blocked, or logged by your Firepower device. In this course, you'll learn about the creation of access control policies. Next, you'll examine how Cisco's Firepower Threat Defense (FTD) can take many actions against traffic at many different points in the traffic flow through the device. Finally, you'll explore the powerful prefilter policy actions of Firepower FTD and why you will want to take advantage of them. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 56
Compliance Standards: AICC

SNCF: Cisco Firewall, IPS Systems, & the FMCv in AWS

Price on Request 1 hour 5 minutes
Cisco Firepower devices from Cisco Systems have become very popular in enterprise environments. In this course, you'll first review the requirements of the SNCF 300-710 exam. Next, you'll look at the history of firewalls and IPS systems in the Cisco product portfolio. You'll learn about the AWS version of the FMCv, including the restrictions, limitations, and capabilities of this device. Finally, you'll examine the steps involved in constructing the Virtual Private Cloud when building a Firepower lab. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 64
Compliance Standards: AICC

SNCF: Deploying NGFWv & Adding It to the FMCv

Price on Request 50 minutes
In this course, you'll learn about the Cisco Firepower Next-Generation Firewall Virtual (NGFWv) appliance for AWS, including the requirements and caveats of a cloud-based implementation. You'll explore the typical steps for the deployment of an NGFWv in AWS, including integration with the FMCv for the management of your security devices. Finally, you'll learn how to add your NGFWv to the FMCv for the most robust management and configuration options. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 52
Compliance Standards: AICC

SNCF: Failover, Multi-instance Deployments, & Clustering

Price on Request 45 minutes
In this course, you'll learn how to configure multiple Firepower devices for redundancy purposes. Then, you'll look at multi-instance deployments of Cisco Firepower. Finally, you'll learn how clustering helps you to ramp up the horsepower and availability of your Cisco Firepower implementation. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 47
Compliance Standards: AICC

SNCF: FMC Settings, Object Management, & Intrusion Rules

Price on Request 55 minutes
There are many options for management of the Cisco Firepower Management Center (FMC) using the console. In this course, you'll learn about the key features of the FMC that can make your life as a security engineer much, much easier. Objects permit you to define reusable object components that you can leverage for the fast configuration of policies, searches, reports, and dashboards. You'll learn how you can manage the objects that help define your network and your security operations. Finally, you'll examine the Intrusion Rules section of the Objects area and how it allows you to modify the IPS rules for the Firepower device. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 54
Compliance Standards: AICC

SNCF: FMCv Deployment & Initial Setup

Price on Request 45 minutes
Are you ready to see the deployment of Cisco Firepower Management Center (FMC)? In this course, you'll learn the basics of an FMC deployment with an example that uses the Cisco Firepower Management Center Virtual (FMCv) image in AWS. Then, you'll move on to examine the initial configurations you should make to your FMCv after you have successfully installed the FMC. You'll also explore the FMCv interface. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 44
Compliance Standards: AICC

SNCF: NAT, QoS, VPN, & Device Management

Price on Request 40 minutes
Cisco Firepower devices support different NAT variations and VPN configurations. In this course, you'll learn about the many variations of NAT supported by Firepower, including the classic options of static and dynamic. You'll learn that Firepower devices also support the different configuration approaches to NAT on the Cisco security devices, including auto NAT and manual NAT. Next, you'll explore the QoS support Firepower provides, as well as support limitations. You'll learn about the types of VPNs that are supported on Firepower systems. Finally, you'll examine why you might want to break your Firepower deployment into domains in large enterprise environments. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 40
Compliance Standards: AICC

SNCF: Network Discovery, Identity and DNS Policies, & Correlation

Price on Request 1 hour 5 minutes
The network discovery policy on the Firepower Management Center controls how the system collects data on your organization's network assets and which network segments and ports are monitored. In this course, you'll learn about this policy and how to configure it. Next, you'll examine the authentication options that are possible thanks to identity policies. You'll learn about DNS-based security intelligence and how it allows you to allow or block traffic based on the domain name requested by a client using an Allow or Block list. Cisco provides domain name intelligence, so you'll learn how to customize this and even add your own domains. Finally, you'll explore why you might want to have your FTD engage in event correlation to enact some remediation for a very tricky and specific situation. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 66
Compliance Standards: AICC

SNCF: NGFW Modes, Interface Types, & Link Redundancy

Price on Request 1 hour
There are multiple ways in which you can deploy a Next-Generation Firewall (NGFW) from Cisco Systems. In this course, you'll learn about the standard routed mode as well as alternative transparent mode. You'll also learn about the flexibility of Firepower devices, which is due in part to the many different types of interfaces supported. Finally, you'll explore the options that exist on Cisco Firepower devices for link redundancy. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 58
Compliance Standards: AICC

SNCF: Security Intelligence & Policies

Price on Request 1 hour 10 minutes
You'll definitely want to take advantage of all the great security intelligence that Cisco Talos can provide dynamically. In this course, you'll learn about the integration of security intelligence with Firepower polices and the number of security checks and safeguards that the Cisco Firepower devices bring to your network. You'll also learn about the powerful malware and file policies you can create and associate with your access control policy. Next, you'll look at the FTD's intrusion prevention capabilities with a close examination of the intrusion polices. Finally, you'll learn about the SSL inspection feature, which allows you to either block encrypted traffic without inspecting it or inspect encrypted or decrypted traffic with access control. This course can be used in preparation for the 300-710: Securing Networks with Cisco Firepower (SNCF) certification exam.
Perks of Course
Certificate: Yes
CPD Points: 71
Compliance Standards: AICC