Implementing and Operating Cisco Security Core Technologies (SCOR) v2.0

Enhance your cybersecurity skills with Cisco SCOR v2.0, which focuses on essential security technologies for safeguarding modern networks. This course tackles common challenges professionals encounter when integrating firewalls, VPNs, and endpoint security. Through hands-on labs and expert-led instruction, you’ll gain practical experience and knowledge to effectively protect your organization’s digital assets.
Course Details

Price:

$4,295.00

Days:

1

Location:

Virtual

Course Overview

Enhance your cybersecurity skills with Cisco SCOR v2.0, which focuses on essential security technologies for safeguarding modern networks. This course tackles common challenges professionals encounter when integrating firewalls, VPNs, and endpoint security. Through hands-on labs and expert-led instruction, you’ll gain practical experience and knowledge to effectively protect your organization’s digital assets.

– • Describe information security concepts and strategies within the network
– • Describe security flaws in the transmission protocol/internet protocol (TCP/IP) and how they can be used to attack networks and hosts
– • Describe network application-based attacks
– • Describe how various network security technologies work together to guard against attacks
– • Implement access control on Cisco Secure Firewall Adaptive Security Appliance (ASA)
– • Deploy Cisco Secure Firewall Threat Defense basic configurations
– • Deploy Cisco Secure Firewall Threat Defense IPS, malware, and fire policies
– • Deploy Cisco Secure Email Gateway basic configurations
– • Deploy Cisco Secure Email Gateway policy configurations
– • Describe and implement basic web content security features and functions provided by Cisco Secure Web Appliance
– • Describe various attack techniques against the endpoints
– • Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console
– • Provide basic understanding of endpoint security and be familiar with common endpoint security technologies
– • Describe Cisco Secure Endpoint architecture and basic features
– • Describe Cisco Secure Network Access solutions
– • Describe 802.1X and extensible authentication protocol (EAP) authentication
– • Configure devices for 802.1X operations
– • Introduce VPNs and describe cryptography solutions and algorithms
– • Describe Cisco secure site-to-site connectivity solutions
– • Deploy Cisco Internetwork Operating System (Cisco IOS®) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs
– • Configure point-to-point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Describe Cisco secure remote access connectivity solutions
– • Deploy Cisco secure remote access connectivity solutions
– • Provide an overview of network infrastructure protection controls
– • Examine various defenses on Cisco devices that protect the control plane
– • Configure and verify Cisco IOS software layer 2 data plane controls
– • Configure and verify Cisco IOS software and Cisco ASA layer 3 data plane controls
– • Examine various defenses on Cisco devices that protect the management plane
– • Describe the baseline forms of telemetry recommended for network infrastructure and security devices
– • Describe deploying Cisco Secure Network Analytics
– • Describe basics of cloud computing and common cloud attacks
– • Describe how to secure cloud environment
– • Describe the deployment of Cisco Secure Cloud Analytics
– • Describe basics of software-defined networks and network programmability

• Intermediate knowledge of Cisco IOS or IOS XE
• Familiarity with Cisco IOS or IOS XE and Cisco IOS XR software configuration
• Knowledge of IPv4 and IPv6 transmission control protocol (TCP)/IP networking
• Intermediate knowledge of IP routing protocols
• Understanding of MPLS technologies
• Familiarity with VPN technologies
• Familiarity with Ethernet and TCP/IP networking
• Working knowledge of the Windows operating system
• Working knowledge of Cisco IOS networking and concepts
• Familiarity with basics of networking security concepts

– • Cisco Secure Email Policy Configuration
– • Cisco Secure Email Policy Configuration
– • Cisco Secure Email Policy Configuration
– • Cisco Secure Email Policy Configuration
– • Cisco Secure Web Appliance Deployment
– • Cisco Secure Web Appliance Deployment
– • Cisco Secure Web Appliance Deployment
– • Cisco Secure Web Appliance Deployment
– • VPN Technologies and Cryptography Concepts
– • VPN Technologies and Cryptography Concepts
– • VPN Technologies and Cryptography Concepts
– • VPN Technologies and Cryptography Concepts
– • Cisco Secure Site-to-Site VPN Solutions
– • Cisco Secure Site-to-Site VPN Solutions
– • Cisco Secure Site-to-Site VPN Solutions
– • Cisco Secure Site-to-Site VPN Solutions
– • Cisco IOS VTI-Based Point-to-Point IPsec VPNs
– • Cisco IOS VTI-Based Point-to-Point IPsec VPNs
– • Cisco IOS VTI-Based Point-to-Point IPsec VPNs
– • Cisco IOS VTI-Based Point-to-Point IPsec VPNs
– • Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Cisco Secure Remote-Access VPN Solutions
– • Cisco Secure Remote-Access VPN Solutions
– • Cisco Secure Remote-Access VPN Solutions
– • Cisco Secure Remote-Access VPN Solutions
– • Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Describing Information Security Concepts
– • Describing Information Security Concepts
– • Describing Information Security Concepts
– • Describing Information Security Concepts
– • Describe Common TCP/IP Attacks
– • Describe Common TCP/IP Attacks
– • Describe Common TCP/IP Attacks
– • Describe Common TCP/IP Attacks
– • Describe Common Network Application Attacks
– • Describe Common Network Application Attacks
– • Describe Common Network Application Attacks
– • Describe Common Network Application Attacks
– • Common Endpoint Attacks
– • Common Endpoint Attacks
– • Common Endpoint Attacks
– • Common Endpoint Attacks
– • Cisco Umbrella Deployment
– • Cisco Umbrella Deployment
– • Cisco Umbrella Deployment
– • Cisco Umbrella Deployment
– • Endpoint Security Technologies
– • Endpoint Security Technologies
– • Endpoint Security Technologies
– • Endpoint Security Technologies
– • Cisco Secure Endpoint
– • Cisco Secure Endpoint
– • Cisco Secure Endpoint
– • Cisco Secure Endpoint
– • Cisco Secure Network Access Solutions
– • Cisco Secure Network Access Solutions
– • Cisco Secure Network Access Solutions
– • Cisco Secure Network Access Solutions
– • 802.1X Authentication
– • 802.1X Authentication
– • 802.1X Authentication
– • 802.1X Authentication
– • 802.1X Authentication Configuration
– • 802.1X Authentication Configuration
– • 802.1X Authentication Configuration
– • 802.1X Authentication Configuration
– • Network Infrastructure Protection
– • Network Infrastructure Protection
– • Network Infrastructure Protection
– • Network Infrastructure Protection
– • Control Plane Security Solutions
– • Control Plane Security Solutions
– • Control Plane Security Solutions
– • Control Plane Security Solutions
– • Layer 2 Data Plane Security Controls
– • Layer 2 Data Plane Security Controls
– • Layer 2 Data Plane Security Controls
– • Layer 2 Data Plane Security Controls
– • Layer 3 Data Plane Security Controls
– • Layer 3 Data Plane Security Controls
– • Layer 3 Data Plane Security Controls
– • Layer 3 Data Plane Security Controls
– • Management Plane Security Controls
– • Management Plane Security Controls
– • Management Plane Security Controls
– • Management Plane Security Controls
– • Traffic Telemetry Methods
– • Traffic Telemetry Methods
– • Traffic Telemetry Methods
– • Traffic Telemetry Methods
– • Cisco Secure Network Analytics Deployment
– • Cisco Secure Network Analytics Deployment
– • Cisco Secure Network Analytics Deployment
– • Cisco Secure Network Analytics Deployment
– • Cloud Computing and Cloud Security
– • Cloud Computing and Cloud Security
– • Cloud Computing and Cloud Security
– • Cloud Computing and Cloud Security
– • Cloud Security
– • Cloud Security
– • Cloud Security
– • Cloud Security
– • Cisco Secure Cloud Analytics Deployment
– • Cisco Secure Cloud Analytics Deployment
– • Cisco Secure Cloud Analytics Deployment
– • Cisco Secure Cloud Analytics Deployment
– • Software-Defined Networking
– • Software-Defined Networking
– • Software-Defined Networking
– • Software-Defined Networking
– • Lab Outline
– • Lab Outline
– • Lab Outline
– • Lab Outline
– • Network Security Technologies
– • Network Security Technologies
– • Network Security Technologies
– • Network Security Technologies
– • Cisco Secure Firewall ASA Deployment
– • Cisco Secure Firewall ASA Deployment
– • Cisco Secure Firewall ASA Deployment
– • Cisco Secure Firewall ASA Deployment
– • Cisco Secure Firewall Threat Defense Basics
– • Cisco Secure Firewall Threat Defense Basics
– • Cisco Secure Firewall Threat Defense Basics
– • Cisco Secure Firewall Threat Defense Basics
– • Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
– • Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
– • Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
– • Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
– • Cisco Secure Email Gateway Basics
– • Cisco Secure Email Gateway Basics
– • Cisco Secure Email Gateway Basics
– • Cisco Secure Email Gateway Basics
– • Network Security Technologies
– • Network Security Technologies
– • Network Security Technologies
– • Network Security Technologies
– • Cisco Secure Firewall ASA Deployment
– • Cisco Secure Firewall ASA Deployment
– • Cisco Secure Firewall ASA Deployment
– • Cisco Secure Firewall ASA Deployment
– • Cisco Secure Firewall Threat Defense Basics
– • Cisco Secure Firewall Threat Defense Basics
– • Cisco Secure Firewall Threat Defense Basics
– • Cisco Secure Firewall Threat Defense Basics
– • Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
– • Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
– • Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
– • Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
– • Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
– • Cisco Secure Email Gateway Basics
– • Cisco Secure Email Gateway Basics
– • Cisco Secure Email Gateway Basics
– • Cisco Secure Email Gateway Basics
– • Cisco Secure Email Policy Configuration
– • Cisco Secure Email Policy Configuration
– • Cisco Secure Email Policy Configuration
– • Cisco Secure Email Policy Configuration
– • Cisco Secure Web Appliance Deployment
– • Cisco Secure Web Appliance Deployment
– • Cisco Secure Web Appliance Deployment
– • Cisco Secure Web Appliance Deployment
– • VPN Technologies and Cryptography Concepts
– • VPN Technologies and Cryptography Concepts
– • VPN Technologies and Cryptography Concepts
– • VPN Technologies and Cryptography Concepts
– • Cisco Secure Site-to-Site VPN Solutions
– • Cisco Secure Site-to-Site VPN Solutions
– • Cisco Secure Site-to-Site VPN Solutions
– • Cisco Secure Site-to-Site VPN Solutions
– • Cisco IOS VTI-Based Point-to-Point IPsec VPNs
– • Cisco IOS VTI-Based Point-to-Point IPsec VPNs
– • Cisco IOS VTI-Based Point-to-Point IPsec VPNs
– • Cisco IOS VTI-Based Point-to-Point IPsec VPNs
– • Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Cisco Secure Remote-Access VPN Solutions
– • Cisco Secure Remote-Access VPN Solutions
– • Cisco Secure Remote-Access VPN Solutions
– • Cisco Secure Remote-Access VPN Solutions
– • Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
– • Describing Information Security Concepts
– • Describing Information Security Concepts
– • Describing Information Security Concepts
– • Describing Information Security Concepts
– • Describe Common TCP/IP Attacks
– • Describe Common TCP/IP Attacks
– • Describe Common TCP/IP Attacks
– • Describe Common TCP/IP Attacks
– • Describe Common Network Application Attacks
– • Describe Common Network Application Attacks
– • Describe Common Network Application Attacks
– • Describe Common Network Application Attacks
– • Common Endpoint Attacks
– • Common Endpoint Attacks
– • Common Endpoint Attacks
– • Common Endpoint Attacks
– • Cisco Umbrella Deployment
– • Cisco Umbrella Deployment
– • Cisco Umbrella Deployment
– • Cisco Umbrella Deployment
– • Endpoint Security Technologies
– • Endpoint Security Technologies
– • Endpoint Security Technologies
– • Endpoint Security Technologies
– • Cisco Secure Endpoint
– • Cisco Secure Endpoint
– • Cisco Secure Endpoint
– • Cisco Secure Endpoint
– • Cisco Secure Network Access Solutions
– • Cisco Secure Network Access Solutions
– • Cisco Secure Network Access Solutions
– • Cisco Secure Network Access Solutions
– • 802.1X Authentication
– • 802.1X Authentication
– • 802.1X Authentication
– • 802.1X Authentication
– • 802.1X Authentication Configuration
– • 802.1X Authentication Configuration
– • 802.1X Authentication Configuration
– • 802.1X Authentication Configuration
– • Network Infrastructure Protection
– • Network Infrastructure Protection
– • Network Infrastructure Protection
– • Network Infrastructure Protection
– • Control Plane Security Solutions
– • Control Plane Security Solutions
– • Control Plane Security Solutions
– • Control Plane Security Solutions
– • Layer 2 Data Plane Security Controls
– • Layer 2 Data Plane Security Controls
– • Layer 2 Data Plane Security Controls
– • Layer 2 Data Plane Security Controls
– • Layer 3 Data Plane Security Controls
– • Layer 3 Data Plane Security Controls
– • Layer 3 Data Plane Security Controls
– • Layer 3 Data Plane Security Controls
– • Management Plane Security Controls
– • Management Plane Security Controls
– • Management Plane Security Controls
– • Management Plane Security Controls
– • Traffic Telemetry Methods
– • Traffic Telemetry Methods
– • Traffic Telemetry Methods
– • Traffic Telemetry Methods
– • Cisco Secure Network Analytics Deployment
– • Cisco Secure Network Analytics Deployment
– • Cisco Secure Network Analytics Deployment
– • Cisco Secure Network Analytics Deployment
– • Cloud Computing and Cloud Security
– • Cloud Computing and Cloud Security
– • Cloud Computing and Cloud Security
– • Cloud Computing and Cloud Security
– • Cloud Security
– • Cloud Security
– • Cloud Security
– • Cloud Security
– • Cisco Secure Cloud Analytics Deployment
– • Cisco Secure Cloud Analytics Deployment
– • Cisco Secure Cloud Analytics Deployment
– • Cisco Secure Cloud Analytics Deployment
– • Software-Defined Networking
– • Software-Defined Networking
– • Software-Defined Networking
– • Software-Defined Networking
– • Lab Outline
– • Lab Outline
– • Lab Outline
– • Lab Outline

Class Dates & Times
Filters Sort results
Reset Apply
6/9/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$4,295.00
7/14/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$4,295.00
8/11/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$4,295.00
9/15/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$4,295.00
10/6/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$4,295.00
11/3/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$4,295.00
12/8/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$4,295.00
— Questions?

Information Request

— Empower Change

Invest in Skills & Equality

Support Diversity, Equity, and Inclusion with Every Purchase.

Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.