Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0

Categories: Cisco, Cybersecurity

About Course

Course Objectives

  • Describe information security concepts, strategies, and common network attacks.

  • Implement access control using Cisco ASA and Firepower NGFW devices.

  • Deploy email and web content security using Cisco Email Security Appliance and Web Security Appliance.

  • Configure Cisco Umbrella, VPNs, and cryptography solutions.

  • Implement secure site-to-site and remote access VPNs using Cisco IOS and NGFW platforms.

  • Configure endpoint security using AMP for Endpoints.

  • Secure network infrastructure with control, management, and data plane protections.

  • Monitor and analyze network traffic using Stealthwatch Enterprise and Cloud.

  • Understand cloud security fundamentals and software-defined networking (SDN) concepts.

Course Outline

  1. Information Security Concepts – Overview, assets, vulnerabilities, countermeasures, and risk management.

  2. Common TCP/IP, Network Application, and Endpoint Attacks – Legacy vulnerabilities, DNS attacks, malware, and reconnaissance.

  3. Network Security Technologies – Defense-in-depth, segmentation, and virtualization.

  4. Deploying Cisco ASA and Firepower NGFW – Access control, NAT, policies, packet processing, and objects.

  5. Email and Web Content Security – Email pipeline, SMTP, proxy services, authentication, malware protection.

  6. Cisco Umbrella – Architecture, deployment, roaming client, and investigative console.

  7. VPN and Cryptography – Site-to-site and remote access VPNs, IPsec, VTI, and SSL VPNs.

  8. Cisco Secure Network Access & 802.1X – AAA, authentication methods, and role-based access.

  9. Endpoint Security – AMP for Endpoints, host-based firewalls, anti-virus, and IPS.

  10. Network Infrastructure Protection – Control plane, management plane, Layer 2/3 data plane security.

  11. Traffic Telemetry and Monitoring – NTP, logging, NetFlow, and telemetry.

  12. Cisco Stealthwatch Enterprise & Cloud – Network and cloud monitoring, CTA, alerting, watchlists.

  13. Cloud Security & SDN Concepts – Cloud threats, security responsibilities, SDN fundamentals, and network programmability.

Lab Outline

  • Configure ASA and Firepower NGFW NAT and access control policies.

  • Configure IPS, malware, file policies, and discovery on Firepower NGFW.

  • Configure ESA mail policies and proxy services.

  • Explore Cisco Umbrella dashboards, investigate console, and ransomware protection.

  • Configure site-to-site and remote access VPNs (VTI/IPsec/SSL) on ASA and NGFW.

  • Explore AMP for Endpoints, perform endpoint analysis, and configure ransomware protection.

  • Explore Stealthwatch Enterprise, Cognitive Threat Analytics, and Cloudlock dashboards.

  • Explore Stealthwatch Cloud monitoring, alert settings, and sensors.

World Food Programme (WFP)

Our work with the World Food Programme (WFP) focused on enabling the effective adoption of digital field technologies and essential digital literacy capabilities. Participants utilized mobile-based data collection platforms within operational contexts, enhancing accuracy, consistency, and confidence in digital data handling. The engagement strengthened WFP’s ability to rely on digital tools to support field operations and humanitarian programs.

Raya

For Raya, we delivered technology enablement focused on automation-driven operations and scalable application development. Participants gained hands-on experience with automation technologies and modern front-end development frameworks, supporting more efficient processes and the delivery of flexible, high-performance digital solutions aligned with business growth objectives.

EgyptAir

Our engagement with EgyptAir focused on enabling the effective use of application development technologies alongside the adoption of cybersecurity and secure computing practices within operational environments. Participants worked with Microsoft-based development platforms and programming technologies while gaining practical exposure to secure application usage, access control mechanisms, and threat-aware system interaction. This integrated technology enablement supported more secure digital operations, improved system reliability, and reinforced cyber resilience across aviation technology environments.

Banque Misr

We collaborated with Banque Misr to enable integrated enterprise technology capabilities across multiple domains. The engagement supported effective utilization of IT infrastructure environments, data analytics platforms, and professional capability development frameworks, allowing teams to operate confidently within complex enterprise systems. Our delivery approach focused on practical technology adoption, operational alignment, and building sustainable competencies that support reliable banking services and informed, data-driven decision-making.

Course Booking Form