SCOR: Security Vulnerabilities, Attack Mitigations, & Cryptographic Solutions


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

There are many common vulnerabilities in software and systems and you must understand them to effectively secure your network systems. In this course, you'll learn about some of these vulnerabilities, as well as common attack mitigation techniques for network application style attacks. Before reviewing cybersecurity technologies in greater detail, you'll first look at the basics of cryptography and the critical role it plays in computer and network security. Finally, you'll explore some current cryptographic solutions and what they are used for. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.



Expected Duration (hours)
1.3

Lesson Objectives

SCOR: Security Vulnerabilities, Attack Mitigations, & Cryptographic Solutions

  • identify authentication-based vulnerabilities
  • prevent SQL injection attacks
  • protect against brute force attacks
  • determine proper mitigation techniques for injection attacks
  • identify Cisco products to help guard DNS
  • identify mitigation techniques for web-based attacks
  • determine the methods used to create a cipher
  • identify the role of encryption
  • identify the type of cipher being used
  • determine the type of encryption that uses the same key
  • identify symmetric encryption algorithms
  • identify the cryptography service to provide data integrity
  • identify the type of encryption used
  • Course Number:
    it_ciscortv_02_enus

    Expertise Level
    Expert