SCOR: Device Compliance, Exfiltration, Telemetry, & Security Products


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

In this course, you'll learn how device compliance and application control can be achieved using Cisco products. You'll explore why data exfiltration is one of the central concerns for security professionals. Next, you'll learn about network telemetry and model-driven telemetry and their increasing popularity in the industry. You'll also examine an example of how you might use telemetry in the Cisco network. Finally, you'll learn about the impressive number of security technologies in the Cisco solution portfolio, broken down by category and individual products in each category. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.



Expected Duration (hours)
0.8

Lesson Objectives

SCOR: Device Compliance, Exfiltration, Telemetry, & Security Products

  • identify the component that is used for time when a compliance check occurs
  • recognize device compliance options
  • recognize the Cisco agent software to use to implement device compliance
  • identify security controls to combat data exfiltration
  • recognize the action of unauthorized transferring of enterprise data
  • identify the components of Cisco Model Drive Telemetry
  • recognize the Cisco operating system that provides the Cisco Model Driven Telemetry feature
  • recognize the tool to provide security analytics
  • recognize tools used to improve cloud-based security
  • Course Number:
    it_ciscortv_17_enus

    Expertise Level
    Expert