Search Pass4Sure

CCNP Security: SCOR and Concentration — What the Exam Really Covers

A detailed breakdown of SCOR 350-701 and CCNP Security concentration options — what the largest domains test, Cisco ISE vs Firepower concentration comparison, and how to prepare for enterprise security certification.

CCNP Security: SCOR and Concentration — What the Exam Really Covers

Security engineers who attempt CCNP Security expecting a deeper version of CCNA security are surprised. CCNP Security covers network security architecture at enterprise scale — firewall policy, VPN design, identity services, threat intelligence integration — not just the access control lists and port security from the associate tier.

Understanding what each component actually tests lets you study correctly rather than discovering gaps on exam day.


The CCNP Security Structure

Like CCNP Enterprise, CCNP Security requires two exams:

  • SCOR (350-701): Implementing and Operating Cisco Security Core Technologies — mandatory

  • Concentration — one of six options

Concentration Code Focus
SVPN 300-730 Implementing Secure Solutions with VPNs
SISE 300-715 Implementing and Configuring Cisco Identity Services Engine
SNCF 300-720 Securing Email with Cisco Email Security
SWSA 300-725 Securing the Web with Cisco Web Security
SSFIPS 300-710 Securing Networks with Cisco Firepower
SASE 300-740 Cisco SASE

The two most commonly chosen concentrations: SISE (Identity Services Engine — ISE) and SSFIPS (Firepower — Cisco's NGFW platform). Both appear regularly in enterprise environments.


SCOR (350-701): What It Actually Tests

Domain Weight
Security Concepts 25%
Network Security 20%
Cloud Security 15%
Content Security 10%
Endpoint Protection and Detection 15%
Secure Network Access, Visibility, and Enforcement 15%

Security Concepts at 25% is the largest domain and the one that catches candidates who approach CCNP Security as a "configure the firewall" exam.

Cryptography and PKI

The exam tests cryptography at a depth that requires conceptual understanding, not just knowing which algorithms exist:

Symmetric vs asymmetric encryption:

  • Symmetric (AES, 3DES): fast, uses same key to encrypt and decrypt. Problem: how do you securely exchange the key?

  • Asymmetric (RSA, ECDH): uses public/private key pair. Slow but solves key distribution. Used to exchange a symmetric session key securely.

TLS handshake process: the exam tests what happens during TLS negotiation — cipher suite negotiation, certificate verification, key exchange. This is directly relevant to understanding where security controls intercept traffic.

PKI components:

  • Certificate Authority (CA): issues and signs certificates

  • Registration Authority (RA): handles enrollment requests

  • OCSP: Online Certificate Status Protocol — real-time certificate revocation check

  • CRL: Certificate Revocation List — periodic list of revoked certificates

Cisco Umbrella and DNS-Layer Security

Cisco Umbrella (acquired from OpenDNS) provides DNS-layer security — blocking malicious domains before connections are established.

The exam tests:

  • How Umbrella works (recursive DNS resolver that checks domains against threat intelligence)

  • Deployment models (DNS forwarding, roaming client)

  • Integration with Cisco Secure Internet Gateway

"SCOR's coverage of Cisco Umbrella trips candidates who haven't used it. The conceptual question isn't 'what does DNS-layer security mean' — that's obvious. The exam asks about Umbrella's architecture, deployment models, and how it integrates with ISE for identity-based policy. That requires specific product knowledge." — Mike Garza, CCIE Security, CBT Nuggets instructor


Network Security (20%)

This domain covers Cisco's firewall and IPS/IDS technologies.

Cisco ASA vs Cisco Firepower NGFW

SCOR tests both legacy ASA and modern Firepower (NGFW) — understanding when and why organizations use each.

Feature Cisco ASA Cisco Firepower NGFW
Firewall Yes (stateful) Yes (stateful)
IPS/IDS With FirePOWER module Native
Application visibility Limited Full (NGFW)
URL filtering Limited Full
Management ASDM or CLI Firepower Management Center (FMC)
AVC (App Visibility Control) No Yes

NGFW capabilities tested:

  • Application layer inspection (identify Netflix vs HTTP traffic)

  • SSL inspection (decrypt, inspect, re-encrypt HTTPS traffic)

  • File policy (block malware by file type and AMP hash reputation)

  • URL category filtering

VPN on SCOR

VPN appears throughout SCOR — both in the Security Concepts domain and Network Security domain:

Site-to-Site VPN: IPsec tunnel between two endpoints. IKEv1 vs IKEv2 differences. Phase 1 (ISAKMP SA — authentication and key exchange) and Phase 2 (IPsec SA — actual data encryption).

Remote Access VPN: AnyConnect SSL VPN (most common in enterprise), DTLS for performance, split tunneling (route only corporate traffic through VPN, not all internet traffic).

FlexVPN: IKEv2-based VPN framework that supports site-to-site and remote access using a unified configuration model.


Cisco ISE Concentration (SISE 300-715)

ISE is the most enterprise-relevant concentration for security engineers who work in environments with 802.1X authentication, NAC, and identity-based access policies.

What ISE does: centralized policy engine for network access control. When a device connects to the network, ISE authenticates it (user identity + device compliance) and authorizes what it can access (VLAN assignment, ACL push, SGT tagging).

Key ISE concepts tested on SISE:

Authentication protocols:

  • 802.1X (EAP): supplicant (client) → authenticator (switch/WLC) → authentication server (ISE). Uses RADIUS.

  • MAB (MAC Authentication Bypass): for devices that don't support 802.1X (printers, IoT). ISE authenticates the MAC address.

  • Web Authentication: for guest users — redirect to captive portal, authenticate via web form.

Authorization policies: after authentication, ISE applies authorization based on the identity. Examples:

  • Employee device → assign to corporate VLAN, full access

  • Contractor device → assign to contractor VLAN, limited access

  • Non-compliant device (missing updates) → redirect to remediation portal

BYOD (Bring Your Own Device): ISE manages device onboarding for personal devices — certificate provisioning, device registration, policy application.

Security Group Tags (SGT): TrustSec architecture tags traffic based on source identity. Policies reference SGTs (permit SGT 10 to SGT 20) rather than IP addresses. Simplifies policy across dynamic environments where IP addresses change.


SSFIPS Concentration: Cisco Firepower

Candidates who work with Cisco Firepower NGFW find SSFIPS directly applicable to their daily work.

Firepower architecture:

  • Firepower Management Center (FMC): centralized management for multiple Firepower devices. Policy creation, reporting, threat intelligence correlation.

  • Firepower Threat Defense (FTD): the unified image running on hardware (Firepower 2100/4100/9300 series) or virtually. Combines ASA stateful firewall + Firepower IPS + NGFW capabilities.

SSFIPS exam content:

  • Access Control Policies: ordered rules with actions (allow, trust, block, interactive block)

  • Intrusion policies: Snort rule sets, preprocessors

  • File policies: AMP (Advanced Malware Protection) for network file scanning

  • SSL policies: traffic decryption configuration

  • NAT in FTD: network address translation on the Firepower platform


Preparation Strategy for CCNP Security

CCNA Security knowledge is the minimum baseline. Candidates without ACL, VPN, and basic firewall knowledge from the associate level will struggle with SCOR depth.

Resource selection:

  • Kevin Redmon's SCOR course (CBT Nuggets or INE): comprehensive video coverage

  • Cisco's official SCOR exam preparation guide: covers required content with configuration examples

  • Cisco DevNet Learning Labs: free labs for ISE and FMC concepts

  • Boson ExSim-Max: SCOR practice questions

Concentration lab access: ISE and Firepower NGFW are enterprise products that aren't feasible to run on personal hardware. Options:

  • Cisco DevNet sandbox (free, time-limited virtual ISE and FMC instances)

  • INE subscription (includes preconfigured lab environments)

  • Cisco VIRL/CML (subscription-based, runs virtual Cisco images)

Study time: SCOR typically requires 14-18 weeks for candidates with CCNA Security background. Concentration exams add 8-12 weeks. The ISE concentration (SISE) is knowledge-heavy; the Firepower concentration (SSFIPS) is more configuration-focused.


SCOR Domain Breakdown: What Each Percentage Means in Practice

Understanding the domain weights helps allocate study time. The table shows weights alongside representative topics — not just what the domain is called, but what question types actually appear.

Domain Weight Representative Question Topics
Security Concepts 25% Cryptography (AES, RSA, ECDH), PKI, TLS handshake, attack types (MITM, replay, SQL injection), common vulnerabilities
Network Security 20% ASA vs FTD comparison, NGFWs, IPS/IDS, site-to-site IPsec, AnyConnect VPN, TrustSec SGTs
Cloud Security 15% Cloud deployment models, shared responsibility model, cloud access security brokers (CASB), Cisco Umbrella
Content Security 10% Cisco ESA (email security), Cisco WSA (web security), spam filtering, URL filtering policies
Endpoint Protection and Detection 15% Cisco AMP for Endpoints (now Secure Endpoint), EDR capabilities, malware analysis sandboxing
Secure Network Access, Visibility, Enforcement 15% ISE architecture, 802.1X, Cisco StealthWatch (now Secure Network Analytics), NetFlow analysis

The Network Security Domain (20%): What NGFWs and IPS Actually Test

The network security domain emphasizes the architectural difference between traditional stateful firewalls and next-generation firewalls. SCOR candidates need to articulate this difference at a product level, not just conceptually.

Traditional firewall (ASA stateful):

  • Tracks connection state (TCP SYN, SYN-ACK, ACK)

  • Rules based on IP address, port, and protocol

  • No application awareness — HTTP on port 8080 is the same as HTTP on port 80

Next-generation firewall (FTD/Firepower):

  • All stateful firewall capabilities, plus:

  • Application identification regardless of port (Netflix over port 443 is identified as Netflix, not HTTPS)

  • User identity integration via ISE or Active Directory

  • Intrusion prevention with Snort rule engine

  • File inspection with AMP for malware detection

Cisco TrustSec and SGT architecture accounts for a meaningful portion of network security questions. TrustSec assigns Security Group Tags (SGT) to traffic based on the identity of the source. Policies are then written in terms of SGT-to-SGT relationships instead of IP-to-IP ACLs.

The advantage: in environments where IP addresses change (VMs, wireless clients, VPN users), SGT policies remain stable. A contractor SGT can be denied access to a finance server SGT regardless of which IP address the contractor received from DHCP.

Cisco StealthWatch (Secure Network Analytics) appears consistently in SCOR questions. StealthWatch collects NetFlow data from routers, switches, and firewalls to build behavioral baselines. When traffic patterns deviate — a workstation suddenly transferring 10GB externally at 2am — StealthWatch generates a security event. Key concepts tested:

  • Flow Sensor: captures flow data from network devices

  • Flow Collector: aggregates flow data centrally

  • Management Console: analysis and alerting interface

  • Integration with ISE for identity enrichment of flow data


Concentration Exam Comparison: SVPN vs SISE vs SSFIPS

Choosing the right concentration is a career decision as much as a certification decision. The three most popular concentrations map to different job roles.

Concentration Code Primary Audience Hands-on Depth
SVPN 300-730 Network engineers managing VPN infrastructure High — IPsec, DMVPN, FlexVPN configuration
SISE 300-715 Security engineers deploying NAC/identity High — ISE policy configuration, AD integration
SSFIPS 300-710 Security engineers managing Firepower High — FMC policy creation, IPS tuning
SNCF 300-720 Email security administrators Moderate — ESA/cloud email configuration
SWSA 300-725 Web security administrators Moderate — WSA policy, Cisco Umbrella
SASE 300-740 Cloud security architects Conceptual + configuration mix

SVPN (300-730) goes deep into VPN protocols that SCOR covers only at an overview level:

  • DMVPN (Dynamic Multipoint VPN): hub-and-spoke topology where spokes can communicate directly. Phase 1 (through hub), Phase 2 (direct spoke-to-spoke)

  • FlexVPN: IKEv2-based framework unifying site-to-site and remote access into one configuration model

  • GET VPN (Group Encrypted Transport): group key management for MPLS networks where IP addresses shouldn't change

  • AnyConnect features beyond basic SSL: DART (diagnostic tool), HOSTSCAN (posture assessment), DART bundle submission

SISE (300-715) is the most knowledge-intensive concentration because ISE policies integrate multiple systems:

  • Active Directory integration for user identity lookups

  • PKI integration for certificate-based authentication

  • MDM/EMM integration for device compliance posture

  • TrustSec SGT assignment and propagation

  • Guest lifecycle management (portals, sponsor workflow)

  • Profiling policies for device identification (IP phone vs laptop vs IoT sensor)

"SISE is the hardest concentration to study without access to an ISE instance. The configuration is non-obvious — the policy model of authentication rules feeding authorization profiles feeding authorization policies takes real hands-on time to internalize. DevNet sandboxes help, but budgeting for a 30-day INE subscription with ISE lab access is money well spent." — Jason Gooley, CCIE Security, author of Practical Cisco Identity Services Engine

SSFIPS (300-710) is the most configuration-focused:

  • FMC access control policy structure (default action, security intelligence, SSL policy, identity policy, access control rules — in that order of evaluation)

  • Snort 3.0 rule structure and custom rule creation

  • FTD deployment modes: routed, transparent, inline, passive

  • High availability: FTD HA with FMC management, Active/Standby failover


Cisco Security Products Tested Across SCOR and Concentrations

Candidates benefit from knowing which specific Cisco products appear and what each product does at a system level.

Products appearing on SCOR (core exam):

  • Cisco Firepower Threat Defense (FTD): unified firewall/IPS image for Firepower hardware and ASA 5500-X hardware

  • Firepower Management Center (FMC): centralized management appliance for FTD. On-premises or virtual.

  • Cisco Identity Services Engine (ISE): NAC and policy engine — handles 802.1X, MAB, BYOD, SGT assignment

  • Cisco Umbrella: DNS-layer security and CASB for cloud access

  • Cisco Secure Endpoint (formerly AMP for Endpoints): EDR/EPP for malware detection on hosts

  • Cisco Secure Network Analytics (formerly StealthWatch): NetFlow-based behavioral analytics

  • Cisco SecureX: unified security operations platform integrating Cisco security products with shared telemetry

Products primarily tested on concentrations:

  • Cisco Email Security Appliance (ESA): SNCF concentration — anti-spam, anti-malware, DLP for email

  • Cisco Web Security Appliance (WSA): SWSA concentration — web proxy, URL filtering, malware scanning

  • Cisco AnyConnect Secure Mobility Client: appears across SCOR and SVPN — VPN client software

  • Cisco Duo: MFA platform, appears in SCOR and SISE contexts for multi-factor authentication


Preparation Resources Specific to CCNP Security

For SCOR (350-701):

  • Omar Santos' CCNP Security SCOR 350-701 Official Cert Guide (Cisco Press, 2021) — covers all six domains with configuration examples

  • CBT Nuggets SCOR course (Kevin Redmon): 30+ hours of video covering concepts and configuration

  • Cisco DevNet Sandbox: free ISE, FMC, and Umbrella sandboxes at developer.cisco.com/site/sandbox

For SISE (300-715):

  • Jason Gooley's Practical Cisco Identity Services Engine — product-level reference beyond exam scope but builds real understanding

  • Cisco ISE Administration Guide (free on Cisco.com) — the authoritative reference for configuration details

  • INE SISE course — one of the few resources with structured ISE lab exercises

For SSFIPS (300-710):

  • Cisco FMC Configuration Guide (free on Cisco.com) — required reading for policy configuration details

  • David Hucaby's Firepower content on CBT Nuggets

  • DevNet FTD sandbox: allows FMC access for policy practice without hardware

Study time allocation:

  • SCOR: 14-18 weeks from CCNA Security background, 18-24 weeks from general CCNA

  • Any concentration: 8-12 weeks with relevant job experience, 12-16 weeks without


See also: CCNP Enterprise: how to prepare for the core and concentration exams, Cisco CyberOps Associate: entry-level security certification for SOC roles]

References

Frequently Asked Questions

Which CCNP Security concentration is most valuable for enterprise security engineers?

SISE (Cisco ISE) and SSFIPS (Cisco Firepower) are most applicable in enterprise environments. ISE is present in almost every enterprise doing 802.1X network access control. Firepower NGFW is Cisco's primary enterprise firewall. Both concentrations directly validate skills used in real enterprise security operations.

What does SCOR 350-701 cover that CCNA Security doesn't?

SCOR goes significantly deeper on cryptography (TLS handshake, PKI), Cisco-specific security products (Umbrella, ISE, Firepower, AMP), cloud security concepts, and endpoint protection. It also covers security architecture and design principles that CCNA Security doesn't address.

Do I need real Cisco ISE equipment to study for SISE?

No. Cisco DevNet provides free sandbox access to virtual ISE instances. INE and other training providers include pre-configured ISE lab environments in their subscriptions. The Cisco DevNet sandbox is free but time-limited — book specific lab sessions when you need them.

What is the difference between ASA and Firepower NGFW on SCOR?

ASA provides stateful firewall functionality. Firepower NGFW adds application visibility and control, intrusion prevention, SSL inspection, URL filtering, and file policy with malware detection. SCOR tests when each is appropriate and the architectural differences between them.

How long does CCNP Security preparation take?

SCOR requires 14-18 weeks for candidates with CCNA Security background. Each concentration adds 8-12 weeks. SSFIPS (Firepower) tends to take longer due to the configuration depth required. SISE requires significant time with actual ISE sandbox labs to develop the product-specific knowledge tested.