Font size:


This is a bundled training package. It contains training for each of the bundled items below:

Course Price
Cisco IINS 2.0: Introducing Networking Security Fundamentals $74.95
Cisco IINS 2.0: Security Policies and Strategies $74.95
Cisco IINS 2.0: Cisco Network Foundation Protection $74.95
Cisco IINS 2.0: Securing the Management Plane and AAA Configuration $74.95
Cisco IINS 2.0: Securing the Data Plane on Cisco Switches $74.95

Bundle Price: $199.00
Total Savings: $175.75

Cisco IINS 2.0: Introducing Networking Security Fundamentals

The open nature of the Internet makes it increasingly important for growing businesses to pay attention to the security of their networks. As companies move more of their business functions to the public network, they need to take precautions to ensure that their data is not compromised or does not end up in front of the wrong people. It has become increasingly difficult to establish and maintain a secure network computing environment, and the challenge is made more difficult because of increased availability requirements and growing regulatory requirements. Risk management is a building block of effective security architectures, which protects organizational assets against constantly evolving threats. This course provides an explanation of the breadth of the challenge to establish and maintain a secure network environment. It includes a description of the fundamental concepts in Network Security, identifies common vulnerabilities and threats in borderless networks, and describes basic principles for securing networks against common threats.

Learning Objectives
  • Identify the most important criterion when classifying data
  • Categorize examples of security controls
  • Identify the most recent threat vector trends in information security
  • Match types of attackers to descriptions
  • Sequence the typical steps for compromising targets and applications
  • Categorize threats to borderless networks
  • Recognize defense-in-depth principles

Cisco IINS 2.0: Security Policies and Strategies

It is important to know that the security policy that is developed in your organization influences all of the steps that are taken to secure network resources. The development of a comprehensive security policy is covered in this course. In order to create an effective security policy, it is also necessary to perform a risk analysis in order to maximize the effectiveness of the policy. Also, it is essential to frame security policies within the context of a life-cycle approach. This course describes the different phases of the process, their dependencies, and the importance of a sound security policy. In the past, threats from internal and external sources moved slowly, and it was easy to defend against them. Now Internet worms can spread across the world in a matter of minutes. Market trends such as mobility, consumerization, or the use of personal consumer electronic devices in the workplace, as well as the overall changes in the workplace experience, augment these threats and influence the need for a different approach to security. Modern security architectures must provide the required level of protection while maintaining the functionality of the applications and allowing access at any time, from any place, using any device. This course outlines the architecture, components, and underlying technologies, as well as identifying Cisco products and solutions within the architecture.

Learning Objectives
  • Match compliance regulations with descriptions
  • Identify elements of an effective computer security awareness and training program
  • Match actions in the secure network life cycle process with the phases where they occur
  • Match assessment activities with descriptions
  • Match actions during the incident response process with the phases of the process where they occur
  • Match the key components of a business continuity plan to their descriptions
  • Identify characteristics of the Cisco Borderless Networks Architecture
  • Describe the Cisco SecureX architecture
  • Match Cisco security products with descriptions

Cisco IINS 2.0: Cisco Network Foundation Protection

An important element in the overall security posture of an organization is the security of the network infrastructure. The network infrastructure refers to the routers, switches, and other such equipment that keep a network running. The infrastructure is often the target of denial of service (DoS) and other attacks that can directly or indirectly disrupt the network operation. In order to ensure the availability of the network, it is critical to implement the security tools and best practices that help protect each network element, and the infrastructure as a whole. This course explains how Cisco Network Foundation Protection (NFP) provides an umbrella strategy for infrastructure protection using Cisco IOS security features. Cisco Configuration Professional is an intuitive GUI tool that enables you to easily and reliably deploy and manage the services on Cisco IOS routers. Cisco Configuration Professional simplifies router and security configuration through smart wizards, which help users quickly and easily deploy, configure, and monitor Cisco routers without requiring knowledge of the Cisco IOS Software CLI. This course introduces you to the design of Cisco Configuration Professional and to the features that you can configure from it.

Learning Objectives
  • Identify common threats against the network infrastructure
  • Match types of network traffic with descriptions
  • Match control plane security controls with descriptions
  • Identify the most important measures for securing interactive and management access to an infrastructure device
  • Identify ways in which ACLs protect the data plane
  • Sequence the steps to perform initial configuration for devices
  • Identify the security functions that can be managed using Cisco Configuration Professional
  • Define the unique components of Cisco Configuration Professional used for security policy deployment
  • Sequence steps to apply a template to multiple devices in Cisco Configuration Professional
  • Identify the functions of the Security Audit
  • Not Applicable

Cisco IINS 2.0: Securing the Management Plane and AAA Configuration

Authentication, authorization, and accounting (AAA) solutions are widely supported in Cisco IOS Software as an additional security service available for securing access to network devices and networks. One of the options you have when configuring your network to work with AAA is to use a local username and password database to provide security greater than a simple password. It is likely that smaller organizations will configure AAA to operate locally. This course presents an introduction to implementing AAA. It describes how to securely implement the management and reporting features of Cisco IOS devices, including the following technologies: syslog, Network Time Protocol (NTP), Secure Shell (SSH), Simple Network Management Protocol version 3 (SNMPv3), and AAA. Additionally, some design aspects of a management infrastructure are examined. Cisco Secure Access Control Server (ACS) for Windows provides a centralized identity networking solution and simplified user management experience across all Cisco devices and security management applications. This course finishes up by discussing what Cisco Secure ACS is and what you can use it for, the requirements for installing Cisco Secure ACS for Windows, the Cisco Secure ACS installation procedure, and its configuration for router AAA services.

Learning Objectives
  • Identify principles for in-band management of the management architecture
  • Sequence the commands to configure views limit the privileges of users at the CLI by configuring views
  • Recognize true statements about the use of method lists in CCP
  • Identify commands for configuring AAA for local authentication using CCP
  • Match syslog severity levels with examples
  • Match SNMP security levels with the security mechanism used at this level
  • Not Applicable
  • Describe Cisco Secure ACS features used in a management protection strategy
  • Compare the TACACS+ and RADIUS AAA protocols
  • Match AAA accounting parameters with their definitions
  • Sequence steps to configure Cisco Secure ACS for device administration
  • Identify the CLI commands used to verify the correct configuration of the router

Cisco IINS 2.0: Securing the Data Plane on Cisco Switches

Like routers, both Layer 2 and Layer 3 switches have their own set of network security requirements. Access to switches is a convenient entry point for attackers who are intent on illegally gaining access to a corporate network. With access to a switch, an attacker can set up rogue access points and protocol analyzers, and launch all types of attacks from within the network. Attackers can even spoof the MAC and IP addresses of critical servers and do significant damage. This course introduces basic switching concepts, explains security threats that exploit vulnerabilities in the switching infrastructure, and examines strategies to mitigate those threats.

Learning Objectives
  • Describe what VLANs are and how they work
  • Describe how to configure trunks
  • Identify guidelines to follow when creating VLANs
  • Describe how STP provides a loop-free network topology
  • Match the security threats that exploit vulnerabilities in the switching infrastructure to their description
  • Sequence the steps involved in a double-tagging VLAN hopping attack
  • Identify strategies for protecting the switch data plane
  • Identify spanning-tree features on Cisco IOS routers that prevent STP operations from having an impact on the security posture
  • Sequence steps to configure port security on an access port using CLI
  • Match switch port port-security parameters to their descriptions
Register Now
IINS 2.0: Implementing Cisco IOS Network Security Part 1 e-learning bundle
  • Course ID:
  • Duration:
    8 hours
  • Price: