By browsing this site, you agree to the use of cookies, which enhance your experience, analyze how you integrate with our site and customize our content to your personal needs and search. Saiba mais
0
English
Português
Select country:
Antigua & Barbuda
Argentina
Bahamas
Barbados
Belize
Bolivia
Brazil
Chile
Colombia
Costa Rica
Cuba
Dominica
Dominican Republic
Ecuador
El Salvador
Grenada
Guatemala
Guyana
Honduras
Jamaica
Mexico
Nicaragua
Panama
Paraguay
Peru
Puerto Rico
Saint Kitts & Nevis
Saint Lucia
Saint Vincent & Grenadines
Suriname
Trinidad & Tobago
Uruguay
Venezuela
Albania
Austria
Belgium
Bosnia & Herzegovina
Bulgaria
Croatia
Cyprus
Czech Republic
Denmark
Estonia
Finland
France
Germany
Greece
Hungary
Iceland
Ireland
Italy
Latvia
Lithuania
Luxembourg
Malta
Montenegro
Netherlands
North Macedonia
Norway
Poland
Portugal
Romania
Serbia
Slovakia
Slovenia
Spain
Sweden
Switzerland
Turkey
Ukraine
United Kingdom
Canada
United States
Australia
Cambodia
China
Hong Kong
India
Indonesia
Japan
Malaysia
Micronesia
New Zealand
Pakistan
Philippines
Singapore
South Korea
Taiwan
Thailand
Vietnam
Bahrain
Iran
Iraq
Israel
Jordan
Kuwait
Lebanon
Oman
Qatar
Saudi Arabia
Syria
United Arab Emirates
Algeria
Egypt
Kenya
Morocco
Nigeria
Senegal
South Africa
Sudan
Tunisia
Implementing and Operating Cisco Security Core Technologies (SCOR) – Perfil
Esquema Detallado del Curso
Network Security Technologies Cisco Secure Firewall ASA Deployment Cisco Secure Firewall Threat Defense Basics Cisco Secure Firewall Threat Defense IPS, Malware, and File Policies Cisco Secure Email Gateway Basics Cisco Secure Email Policy Configuration Cisco Secure Web Appliance Deployment VPN Technologies and Cryptography Concepts Cisco Secure Site-to-Site VPN Solutions Cisco IOS VTI-Based Point-to-Point IPsec VPNs Point-to-Point IPsec VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense Cisco Secure Remote-Access VPN Solutions Remote-Access SSL VPNs on the Cisco Secure Firewall ASA and Cisco Secure Firewall Threat Defense Describing Information Security Concepts Describe Common TCP/IP Attacks Describe Common Network Application Attacks Common Endpoint Attacks Cisco Umbrella Deployment Endpoint Security Technologies Cisco Secure Endpoint Cisco Secure Network Access Solutions 802.1X Authentication 802.1X Authentication Configuration Network Infrastructure Protection Control Plane Security Solutions Layer 2 Data Plane Security Controls Layer 3 Data Plane Security Controls Management Plane Security Controls Traffic Telemetry Methods Cisco Secure Network Analytics Deployment Cloud Computing and Cloud Security Cloud Security Cisco Secure Cloud Analytics Deployment Software-Defined Networking