SCOR (350-701)

The Cisco 350-701 SCOR exam certifies your expertise in implementing and operating core security technologies across network, cloud, content, and endpoint protection. This 120-minute exam earns you the Cisco Certified Specialist – Security Core certification, fulfills the core exam requirement for both CCNP and CCIE Security certifications, and supports recertification. It covers secure access, threat visibility, enforcement, and advanced security controls—making it essential for professionals securing modern IT environments.
No distractions. Just you!

Course Description

Key Takeaways
  • Describe information security concepts and strategies within the network
  • Describe security flaws in the transmission protocol/internet protocol (TCP/IP) and how they can be used to attack networks and hosts
  • Describe network application-based attacks
  • Describe how various network security technologies work together to guard against attacks
  • Implement access control on Cisco Secure Firewall Adaptive Security Appliance (ASA)
  • Deploy Cisco Secure Firewall Threat Defense basic configurations
  • Deploy Cisco Secure Firewall Threat Defense IPS, malware, and fire policies
  • Deploy Cisco Secure Email Gateway basic configurations
  • Deploy Cisco Secure Email Gateway policy configurations
  • Describe and implement basic web content security features and functions provided by Cisco Secure Web Appliance
  • Describe various attack techniques against the endpoints
  • Describe Cisco Umbrella® security capabilities, deployment models, policy management, and Investigate console
  • Provide basic understanding of endpoint security and be familiar with common endpoint security technologies
  • Describe Cisco Secure Endpoint architecture and basic features
  • Describe Cisco Secure Network Access solutions
  • Describe 802.1X and extensible authentication protocol (EAP) authentication
  • Configure devices for 802.1X operations
  • Introduce VPNs and describe cryptography solutions and algorithms
  • Describe Cisco secure site-to-site connectivity solutions
  • Deploy Cisco Internetwork Operating System (Cisco IOS®) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs
  • Configure point-to-point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
  • Describe Cisco secure remote access connectivity solutions
  • Deploy Cisco secure remote access connectivity solutions
  • Provide an overview of network infrastructure protection controls
  • Examine various defenses on Cisco devices that protect the control plane
  • Configure and verify Cisco IOS software layer 2 data plane controls
  • Configure and verify Cisco IOS software and Cisco ASA layer 3 data plane controls
  • Examine various defenses on Cisco devices that protect the management plane
  • Describe the baseline forms of telemetry recommended for network infrastructure and security devices
  • Describe deploying Cisco Secure Network Analytics
  • Describe basics of cloud computing and common cloud attacks
  • Describe how to secure cloud environment
  • Describe the deployment of Cisco Secure Cloud Analytics
  • Describe basics of software-defined networks and network programmability
Who should attend
  • Security Engineers
  • Network Engineers
  • Network Designers
  • Network Administrators
  • Systems Engineers
  • Consulting Systems Engineers
  • Technical Solutions Architects
  • Cisco Integrators and Partners
  • Network Managers
Prerequisites
  • Familiarity with Ethernet and TCP/IP networking
  • Working knowledge of the Windows operating system
  • Working knowledge of Cisco IOS networking and concepts
  • Familiarity with basics of networking security concepts
Course Outline
  • Section 1: Network Security Technologies
  • Section 2: Cisco Secure Firewall ASA Deployment
  • Section 3: Cisco Secure Firewall Threat Defense Basics
  • Section 4: Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies
  • Section 5: Cisco Secure Email Gateway Basics
  • Section 6: Cisco Secure Email Policy Configuration
  • Section 7: Cisco Secure Web Appliance Deployment
  • Section 8: VPN Technologies and Cryptography Concepts
  • Section 9: Cisco Secure Site-to-Site VPN Solutions
  • Section 10: Cisco IOS VTI-Based Point-to-Point IPsec VPNs
  • Section 11: Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
  • Section 12: Cisco Secure Remote-Access VPN Solutions
  • Section 13: Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense
  • Section 14: Describing Information Security Concepts
  • Section 15: Describe Common TCP/IP Attacks
  • Section 16: Describe Common Network Application Attacks
  • Section 17: Common Endpoint Attacks
  • Section 18: Cisco Umbrella Deployment
  • Section 19: Endpoint Security Technologies
  • Section 20: Cisco Secure Endpoint
  • Section 21: Cisco Secure Network Access Solutions
  • Section 22: 802.1X Authentication
  • Section 23: 802.1X Authentication Configuration
  • Section 24: Network Infrastructure Protection
  • Section 25: Control Plane Security Solutions
  • Section 26: Layer 2 Data Plane Security Controls
  • Section 27: Layer 3 Data Plane Security Controls
  • Section 28: Management Plane Security Controls
  • Section 29: Traffic Telemetry Methods
  • Section 30: Cisco Secure Network Analytics Deployment
  • Section 31: Cloud Computing and Cloud Security
  • Section 32: Cloud Security
  • Section 33: Cisco Secure Cloud Analytics Deployment
  • Section 34: Software-Defined Networking
Lab Outline
  • Discovery 1: Configure Network Settings and NAT on Cisco Secure Firewall ASA
  • Discovery 2: Configure Cisco Secure Firewall ASA Access Control Policies
  • Discovery 3: Configure Cisco Secure Firewall Threat Defense NAT
  • Discovery 4: Configure Cisco Secure Firewall Threat Defense Access Control Policy
  • Discovery 5: Configure Cisco Secure Firewall Threat Defense Discovery and IPS Policy
  • Discovery 6: Configure Cisco Secure Firewall Threat Defense Malware and File Policy
  • Discovery 7: Configure Listener, HAT, and RAT on Cisco Secure Email Gateway
  • Discovery 8: Configure Cisco Secure Email Policies
  • Discovery 9: Configure Proxy Services, Authentication, and HTTPS Decryption
  • Discovery 10: Enforce Acceptable Use Control and Malware Protection
  • Discovery 12: Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel
  • Discovery 13: Configure Point-to-Point VPN Between Cisco Secure Firewall Threat Defense Devices
  • Discovery 14: Configure Remote Access VPN on the Cisco Secure Firewall Threat Defense
  • Simulation 1: Examine Cisco Umbrella Dashboard and DNS Security
  • Simulation 2: Explore Cisco Umbrella Secure Web Gateway and Cloud-Delivered Firewall
  • Simulation 3: Explore Cisco Umbrella CASB Functionalities
  • Simulation 4: Explore Cisco Secure Endpoint
  • Simulation 5: Perform Endpoint Analysis Using Cisco Secure Endpoint Console
  • Simulation 6: Explore File Ransomware Protection by Cisco Secure Endpoint Console
  • Simulation 7: Explore Secure Network Analytics v7.4.2
  • Simulation 8: Explore Global Threat Alerts Integration and ETA Cryptographic Audit
  • Simulation 9: Explore Cloud Analytics Dashboard and Operations
  • Simulation 10: Explore Secure Cloud Private and Public Cloud Monitoring
Exam Details

Need Customized Curriculum?

GET A FREE DEMO CLASS

Choose Your Preferred Learning Mode

One-To-One Training

Personalized Schedule one-on-one Expert Guidance Private Session – Just You & the Instructor Guaranteed-To-Run Tailored for Your Success

ONLINE TRAINING

Learn Anytime, Anywhere Self-Paced & Interactive Budget-Friendly, High-Impact Smart Learning for Smart Professionals

CORPORATE TRAINING

Available Onsite / Online Team-Based Learning, Your Way Tailored for Business Goals Training That Grows With Your Team On-Demand Expert Instructors

Can’t find the right Learning Mode?

Our instructors

MOHAMMED GUFRAN

17 years of Experience
Enterprise Networking | Network Security | Software Defined Networking & Automation

AKMAL YAZDANI

18+ years of Experience
Azure & AWS services |Managing and Implementing Windows servers

MUHAMMAD MUSAB

4+ Years of Experience
Cisco Technologies | Cisco and HPE ARUBA Technologies | Routing and Switching

RANIA GABRIEL GEORGE HAKIM

25+ years of Experience
Enterprise Networking | Network Security | Software Defined Networking & Automation

MOHD FARAZ HARMIS

25+ years of Experience
Managing and Implementing Microsoft Azure cloud | Active Directory

SHAHEEN AKHTAR

17 years of Experience
TCP | and UDP protocols, along | with expertise in firewalls such as Palo Alto

Here's What People Are Saying About Cybersec Trainings

Emanuel Paun

Mohammad was an amazing professor. I do not have a strong networking background and Mohammad was very patient in teaching me the basics in topics like wireless. The way he taught (hands on/labs) really helped solidify everything we learned through the 5 days of classes. I have nothing but positive feedback for the way he taught these course and his personality was amazing. 10/10 professor.

Alberto Feoli

Mohammed did it very well and way he explains concepts very good! Thanks for all your time and effort to help us understand.

Agnes Audige

Mohammed was able to present the class with real-world examples and kept me constantly engaged.

Shaun Alli

Pleasure to learn from Mohammed. The information was provided in a clear and direct fashion. Lots of bonus relevant information provided to help me with my goal. Thanks

Jerry Glass

Mohammed went the extra mile to clarify issues and make the labs more useful.

Greg Retallack

Musab did a great job and was pleasant to work with.

Bob Underkofler

The instructor did a good job and answered my questions when necessary. The language barrier was a bit of an issue for me, but that may be more my problem than the instructors.

Matthew Witte

Musab was an outstanding instructor. He was very knowledgeable and explained difficult concepts in an easy to understand manner. I would enthusiastically recommend Musab to my colleagues.

James Russell

The instructor was excellent. Presenting real world examples to assist with the lack of labs to re-enforce the material. The instructor kept the course interesting and kept us engage in the topics.

Why Network Binary Trainings?

Expertise and Reputation

Comprehensive Training Programs

Industry-Relevant Curriculum

Certification and Career Advancement

Certified & Experienced Instructors

FAQs

If I take the SCOR course, which certification exam will it prepare me for, and how will it help me succeed in it?

Implementing & Operating Cisco Security Core Technologies — exam code 350-701, 120 minutes, 64 CE credits.

By the end of SCOR training, what practical skills and real-world knowledge will I walk away with?

Network, cloud & endpoint security, VPNs, Cisco Umbrella, Secure Firewall, Secure Email/Web, infrastructure protection, and telemetry basics.

Is SCOR course the right fit for me, and what kind of learners will benefit the most from it?

Security & network engineers, designers, admins, architects, Cisco partners, and managers responsible for enterprise security.

Do I need any prior experience or qualifications before enrolling, or can beginners also join?

Familiarity with Ethernet/TCP-IP, Windows OS, Cisco IOS, and fundamental security concepts.

Will I get to practice through hands-on labs and real-life scenarios during the SCOR course?

Yes — 20+ discovery & simulation labs covering Secure Firewall, VPNs, Umbrella, Secure Endpoint, and more.

Dear Learner

Take a step closer to grow and glow in your career.

loader-infosectrain

Connect with Us

Dear Learner

Take a step closer to grow and glow in your career.

loader-infosectrain

Connect with Us

UP TO 20% OFF On Courses!