This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book.
Learn, prepare, and practice for CCNP and CCIE Security Core SCOR 350-701 exam success with this Exam Cram from Pearson IT Certification, a leader in IT Certification learning.
Master CCNP and CCIE Security Core SCOR 350-701 exam topics
Assess your knowledge with chapter-ending quizzes
Review key concepts with exam-preparation tasks
CCNP and CCIE Security Core SCOR 350-701 Exam Cram is a best-of-breed exam study guide. Three Cisco experts share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.
The book presents you with an organized test-preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.
Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that will allow you to succeed on the exam the first time, including:
Compare common security vulnerabilities, such as software bugs, weak and/or hardcoded passwords, OWASP top ten, missing encryption ciphers, buffer overflow, path traversal, and cross-site scripting/forgery
Configure AAA for device and network access, such as TACACS+ and RADIUS
Implement segmentation, access control policies, AVC, URL filtering, malware protection, and intrusion policies
Identify security capabilities, deployment models, and policy management to secure the cloud
Configure cloud logging and monitoring methodologies
Implement traffic redirection and capture methods for web proxy
Describe the components, capabilities, and benefits of Cisco Umbrella
Configure endpoint antimalware protection using Cisco Secure Endpoint
Describe the uses and importance of a multifactor authentication (MFA) strategy
Describe identity management and secure network access concepts, such as guest services, profiling, posture assessment and BYOD
Explain exfiltration techniques (DNS tunneling, HTTPS, email, FTP/SSH/SCP/SFTP, ICMP, Messenger, IRC, and NTP)
|