Implementing Cisco IOS Network Security 3.0 (IINS)

5 Day | Instructor Led

In this course, you will learn about the design, implementation, and monitoring of a comprehensive security policy using Cisco IOS security features and technologies as examples. You will also learn about security controls of Cisco IOS devices as well as a functional introduction to the Cisco Adaptive Security Appliance (ASA). This course enables you to perform basic tasks to secure a network using Cisco IOS security features, which are available through web-based GUIs on the Cisco ASA, and the command-line interface (CLI) on Cisco routers and switches.

Inquire About
Implementing Cisco IOS Network Security 3.0 (IINS)

Ideal Candidates for Implementing Cisco IOS Network Security 3.0 (IINS) Class

Network designers
Network, systems, and security engineers
Network and security managers

Implementing Cisco IOS Network Security 3.0 (IINS) Prerequisites

Working knowledge of the Windows operating system
Working knowledge of Cisco IOS networking and concepts

What You'll Get in Implementing Cisco IOS Network Security 3.0 (IINS)

What You'll Learn in Implementing Cisco IOS Network Security 3.0 (IINS)

Common network security concepts
Secure routing and switching infrastructure
Deploy basic authentication, authorization, and accounting services
Deploy basic firewalling services
Deploy basic site-to-site and remote access VPN services
Advanced security services such as intrusion protection, content security and identity management
Develop a comprehensive network security policy to counter threats against information security
Configure routers with Cisco IOS software security features, including management and reporting functions
Bootstrap the Cisco ASA Firewall for use in a production network
Configure the Cisco ASA Firewall for remote access to a Secure Sockets Layer (SSL) VPN
Configure a Cisco IOS zone-based firewall (ZBF) to perform basic security operations on a network
Configure site-to-site VPNs using Cisco IOS features
Configure security features on IOS switches to mitigate various Layer 2 and Layer 3 attacks
How a network can be compromised using freely available tools
Implement line passwords, and enable passwords and secrets
Examine authentication, authorization, and accounting (AAA) concepts and features using the local database as well as Cisco Secure ACS 5.2
Configure packet filtering on the perimeter router

Implementing Cisco IOS Network Security 3.0 (IINS) Certification

CCNA Security

Implementing Cisco IOS Network Security 3.0 (IINS) Outline

1. Security Concepts

  • Threatscape
  • Threat defense technologies
  • Security policy and basic security architectures
  • Cryptographic technologies

2. Secure Network Devices

  • Implementing AAA
  • Management protocols and systems
  • Securing the control plane

3. Layer 2 Security

  • Securing Layer 2 infrastructures
  • Securing Layer 2 protocols

4. Firewall

  • Firewall technologies
  • Introducing the Cisco ASA v9.2
  • Cisco ASA access control and service policies
  • Cisco IOS zone based firewall

5. VPN

  • IPsec technologies
  • Site-to-site VPN
  • Client-based remote access VPN
  • Clientless remote access VPN

6. Advanced Topics

  • Intrusion detection and protection
  • Endpoint protection
  • Content security
  • Advanced network security architectures

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

In this course, you will learn how to install, operate, configure, and verify a basic IPv4 and IPv6 network, including configuring a LAN switch, configuring an IP router, managing network devices, and identifying basic security threats. The goal of the course is to provide you with the knowledge and skills necessary to install, configure, and operate a small- to medium-sized network.



In this course, you will learn how to install, configure, operate, and troubleshoot a small enterprise network. Key additions to this latest revision include; understanding of Quality of Service (QoS) elements and their applicability, how virtualized and cloud services will interact and impact enterprise networks, along with an overview of network programmability, and the related controller types and tools that are available to support software defined network architectures.



In this course, you will gain the knowledge and skills needed to plan, implement, and monitor a scalable routed network. You will focus on routing protocols for both IPv4 and IPv6: EIGRP and OSPF for an enterprise and BGP for enterprise Internet connectivity. You will also learn how to redistribute routes, implement path control, and secure Cisco routers.



© 2017 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W