| Section | Weight | Objectives |
| Security Concepts | 25% | 1.Explain common threats against on-premises and cloud environments
3.Describe functions of the cryptography components such as hashing, encryption, PKI, SSL, IPsec, NAT-T IPv4 for IPsec, pre-shared key and certificate based authorization 4.Compare site-to-site VPN and remote access VPN deployment types such as sVTI, IPsec, Cryptomap, DMVPN, FLEXVPN including high availability considerations, and AnyConnect 5.Describe security intelligence authoring, sharing, and consumption 6.Explain the role of the endpoint in protecting humans from phishing and social engineering attacks 7.Explain North Bound and South Bound APIs in the SDN architecture 8.Explain DNAC APIs for network provisioning, optimization, monitoring, and troubleshooting 9.Interpret basic Python scripts used to call Cisco Security appliances APIs |
| Secure Network Access, Visibility, and Enforcement | 15% | 1.Describe identity management and secure network access concepts such as guest services, profiling, posture assessment and BYOD 2.Configure and verify network access device functionality such as 802.1X, MAB, WebAuth 3.Describe network access with CoA 4.Describe the benefits of device compliance and application control 5.Explain exfiltration techniques (DNS tunneling, HTTPS, email, FTP/SSH/SCP/SFTP, ICMP, Messenger, IRC, NTP) 6.Describe the benefits of network telemetry 7.Describe the components, capabilities, and benefits of these security products and solutions
|
| Securing the Cloud | 15% | 1.Identify security solutions for cloud environments
4.Implement application and data security in cloud environments 5.Identify security capabilities, deployment models, and policy management to secure the cloud 6.Configure cloud logging and monitoring methodologies 7.Describe application and workload security concepts |
| Endpoint Protection and Detection | 10% | 1.Compare Endpoint Protection Platforms (EPP) and Endpoint Detection & Response (EDR) solutions 2.Explain antimalware, retrospective security, Indication of Compromise (IOC), antivirus, dynamic file analysis, and endpoint-sourced telemetry 3.Configure and verify outbreak control and quarantines to limit infection 4.Describe justifications for endpoint-based security 5.Describe the value of endpoint device management and asset inventory such as MDM 6.Describe the uses and importance of a multifactor authentication (MFA) strategy 7.Describe endpoint posture assessment solutions to ensure endpoint security 8.Explain the importance of an endpoint patching strategy |



ractice 350-701 Exam[/url]| Welcome Firefly Open Source Community (https://bbs.t-firefly.com/) | Powered by Discuz! X3.1 |