Cisco IINS 1.0: LAN, SAN, Voice, and Endpoint Security

This course is included in our On-demand training solution.


It is important to have a good understanding of the additional aspects of network security, such as LAN, storage area network (SAN), voice, and endpoints. An understanding of how to place emphasis on Layer 2 and host security to provide a much more comprehensive coverage of the important issues involved in securing an enterprise is also crucial. This course explains how to configure LAN devices to control access, resist attacks, shield other network devices and systems, and protect the integrity and confidentiality of network traffic. This course also provides an overview of the basic principles of SANs and SAN security. The implications of implementing security measures in IP networks that transport voice are also covered. This course is one of a series from the IINS 1.0 SkillSoft learning paths which cover the objectives for Cisco exam 640-553 IINS 1.0.

Target Audience

Network designers, administrators, engineers, and managers; systems engineers; individuals seeking the Implementing Cisco IOS Network Security (IINS) v1.0 640-553 certification


Knowledge and skills equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1); a working knowledge of the Windows operating system and Cisco IOS networking and concepts

Expected Duration

120 min.

Course Objectives

Endpoint Security Fundamentals

  • recognize how endpoint security works
  • recognize how buffer overflows present a threat
  • IronPort and Cisco NAC Security Products

  • recognize the features of IronPort security products
  • recognize how the Cisco NAC products enhance and complement endpoint security
  • Cisco Security Agent

  • recognize how Cisco Security Agent provides endpoint security
  • SAN Security

  • recognize the basic principles of SANs
  • recognize security strategies you can use to compartmentalize data for security purposes
  • VoIP Fundamentals and Threats

  • recognize fundamental VoIP concepts
  • recognize security threats to VoIP networks
  • IP Telephony Risks

  • recognize the security risks that voice-enabled networks face
  • recognize how to prevent hacking on VoIP networks
  • Defending Against Endpoint Attacks