SCOR Core: Threats, Defences, and Architecture
SCOR (350-701) splits into five domains. Security concepts cover the CIA triad, vulnerability versus threat versus risk, cryptographic foundations (symmetric/asymmetric, PKI, certificate chains), and authentication protocols (RADIUS, TACACS+, 802.1X). Network security tests Cisco firewall concepts — ASA security levels, zone-based policy on IOS-XE, and Firepower Threat Defence (FTD) policy architecture (prefilter, access control, intrusion, file, identity policies). Understand the difference between ASA and FTD in terms of management (ASDM versus FMC versus FDM).
Firepower: FMC Architecture and Policy Layers
FTD managed by FMC (Firepower Management Center) is the enterprise deployment model. Policy hierarchy: Platform Settings (device hardening) > Access Control Policy > Sub-policies (intrusion, file, identity). Network Analysis Policy (NAP) controls the preprocessors that feed Snort rules. Snort rules: header (protocol, source/dest IP/port, direction) and options (content, pcre, detection_filter, threshold, classtype). Understand how intrusion events, file events, and connection events differ in the event database. Security Intelligence (SI) blocks known-bad IPs/domains/URLs before access control rules are evaluated — it's the first line of defence.
VPN Technologies: Site-to-Site and Remote Access
IKEv1 Phase 1 (main mode: 6 messages, identity protected; aggressive mode: 3 messages, identity in cleartext) establishes the IKE SA. Phase 2 (quick mode) establishes IPsec SAs. IKEv2 consolidates this into IKE_SA_INIT and IKE_AUTH exchanges — simpler and more efficient. FlexVPN uses IKEv2 natively and supports dynamic routing over VPN tunnels. DMVPN phases: Phase 1 (hub-and-spoke only), Phase 2 (spoke-to-spoke via NHRP resolution, split-horizon disabled on hub), Phase 3 (NHRP shortcuts, hub forwards first packet then updates routing). AnyConnect remote access uses SSL/TLS or IKEv2/IPsec.
Cloud Security, Content Security, and Automation
Cloud security concepts: shared responsibility model (IaaS/PaaS/SaaS boundaries), CASB (Cloud Access Security Broker) for visibility and control of SaaS applications, CSPM (Cloud Security Posture Management) for misconfiguration detection. Content security: Cisco Email Security (ESA) — inbound mail policies, outbreak filters, DLP, encryption; Cisco Web Security (WSA) — URL filtering, AVC, SSL decryption, WCCP redirect. Umbrella: DNS-layer security, SIG (Secure Internet Gateway), Roaming Client, and Investigate for threat intelligence. Automation: pxGrid for context sharing between security products, Cisco DNA Center for policy, SecureX for cross-platform orchestration. Python with requests or Cisco SDK for Firepower/ISE/Umbrella APIs.