Cisco IINS 2.0: Introducing Networking Security Fundamentals

This course is included in our On-demand training solution.


The open nature of the Internet makes it increasingly important for growing businesses to pay attention to the security of their networks. As companies move more of their business functions to the public network, they need to take precautions to ensure that their data is not compromised or does not end up in front of the wrong people.
It has become increasingly difficult to establish and maintain a secure network computing environment, and the challenge is made more difficult because of increased availability requirements and growing regulatory requirements. Risk management is a building block of effective security architectures, which protects organizational assets against constantly evolving threats. This course provides an explanation of the breadth of the challenge to establish and maintain a secure network environment. It includes a description of the fundamental concepts in Network Security, identifies common vulnerabilities and threats in borderless networks, and describes basic principles for securing networks against common threats.

Target Audience

Network designers, administrators, engineers, and managers; systems engineers; individuals seeking the Implementing Cisco IOS Network Security (IINS) v2.0 640-554 certification, which is associated with the CCNA Security certification exam. Knowledge and skills equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1) are required, and a working knowledge of the Windows operating system and Cisco IOS networking and concepts is recommended.


Expected Duration

60 min.

Course Objectives

Building Blocks of Information Security

  • identify the most important criterion when classifying data
  • categorize examples of security controls
  • Need for Network Security

  • identify the most recent threat vector trends in information security
  • An Overview of Threats in Borderless Networks

  • match types of attackers to descriptions
  • sequence the typical steps for compromising targets and applications
  • Threats in Borderless Networks

  • categorize threats to borderless networks
  • Principles of Secure Network Design

  • recognize defense-in-depth principles