Implementing and Operating Cisco Security Core Technologies (SCOR) - Lab Topology
Lab Topology
Please note that this course lab access is extended for 1 week following the ILT session, for students to complete all additional self-study lab exercises.
- Configure Network Settings and NAT on Cisco Secure Firewall ASA
 - Configure Cisco Secure Firewall ASA Access Control Policies
 - Configure Cisco Secure Firewall Threat Defense NAT
 - Configure Cisco Secure Firewall Threat Defense Access Control Policy
 - Configure Cisco Secure Firewall Threat Defense Discovery and IPS Policy
 - Configure Cisco Secure Firewall Threat Defense Malware and File Policy
 - Configure Listener, HAT, and RAT on Cisco Email Secure Email Gateway
 - Configure Cisco Secure Email Policies
 - Configure Proxy Services, Authentication, and HTTPS Decryption
 - Enforce Acceptable Use Control and Malware Protection
 - Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel
 - Configure Point-to-Point VPN between Cisco Secure Firewall Threat Defense Devices
 - Configure Remote Access VPN on the Cisco Secure Firewall Threat Defense
 - Examine Cisco Umbrella Dashboard and DNS Security
 - Examine Cisco Umbrella Secure Web Gateway and Cloud-Delivered Firewall
 - Explore Cisco Umbrella CASB Funtionalities
 - Explore Cisco Secure Endpoint
 - Perform Endpoint Analysis Using Cisco Secure Endpoint Console
 - Explore File Ransomware Protection by Cisco Secure Endpoint Console
 - Explore Secure Network Analytics v7.4.2
 - Explore Global Threat Alerts Integration and ETA Cryptographic Audit
 - Explore Cloud Analytics Dashboard and Operations
 - Explore Secure Cloud Private and Public Cloud Monitoring