Details
The Implementing Cisco Network Security (IINS) v3.0 e-learning course focuses on security principles and technologies using Cisco security products to provide examples. It allows you to understand common security concepts and deploy basic security techniques
utilising a variety of popular security appliances within a “real-life” network infrastructure. You will gain valuable hands on experience through extensive live lab exercises. The live labs utilise sophisticated topologies which include IOS routers, IOS switches,
Cisco Adaptive Security Appliances and Windows and Linux hosts.
It also includes 10 challenge labs. The challenge labs offer the opportunity to the learner to demonstrate that they can apply the concepts learned in the discovery labs. The challenge labs provide scenario requirements and automated grading functions. You will earn badges upon successful completion of challenge labs and challenge exercises.
It also includes 10 challenge labs. The challenge labs offer the opportunity to the learner to demonstrate that they can apply the concepts learned in the discovery labs. The challenge labs provide scenario requirements and automated grading functions. You will earn badges upon successful completion of challenge labs and challenge exercises.
Outline
- Common security principles
- Common security threats
- Cryptography concepts
- Describe network topologies
- Secure management
- AAA concepts
- 802.1X authentication
- BYOD
- VPN concepts
- Remote access VPN
- Site-to-site VPN
- Security on Cisco routers
- Securing routing protocols
- Securing the control plane
- Common Layer 2 attacks
- Mitigation procedures
- VLAN security
- Describe operational strengths and weaknesses of the different firewall technologies
- Compare stateful vs. stateless firewalls
- Implement NAT on Cisco ASA 9.x
- Implement zone-based firewall
- Firewall features on the Cisco Adaptive Security Appliance (ASA) 9.x
- Describe IPS deployment considerations
- Describe IPS technologies
- Describe mitigation technology for email-based threats
- Describe mitigation technology for web-based threats
- Describe mitigation technology for endpoint threats
Reviews
Be the first to write a review about this course.
Write a Review
Our Credentials
We are a 100% proudly Australian owned and operated company. We strive to provide the best training experience and to keep up our high standards we have formed partnerships with the leading industry vendors.
We are a Microsoft Imagine Academy, a Juniper Network Alliance Academy, a CompTIA Academy and Checkpoint Academy.
Experience training like you have never before at Logitrain.
We are a 100% proudly Australian owned and operated company. We strive to provide the best training experience and to keep up our high standards we have formed partnerships with the leading industry vendors.
We are a Microsoft Imagine Academy, a Juniper Network Alliance Academy, a CompTIA Academy and Checkpoint Academy.
Experience training like you have never before at Logitrain.