Cisco IINS 3.0: Cryptographic Technologies, PKI and Digital Certificates

This course is directed towards networking professionals who need to understand common security concepts and deploy basic security techniques using a variety of popular security solutions including IOS routers, IOS switches, Cisco Adaptive Security Appliances and Windows and Linux hosts. This course is also designed for security practitioners who want to pass the IINS 3.0 exam.


Expected Duration
80 minutes

Learn why not having a security policy is a recipe for failure and how you cannot construct a building or security initiative without a proven architecture. This course describes the components of a comprehensive network security policy that can be used to counter threats against IT systems, within the context of a security policy life cycle and introduces the Cisco modular network architecture best practices, designs and configurations.


Cryptographic Technologies

  • start the course
  • describe cryptology
  • describe cryptographic hashes
  • describe cryptographic authentication using hash technology
  • compare hashing algorithms
  • describe the process of encryption
  • describe cryptanalysis
  • describe symmetric encryption algorithms
  • compare symmetric encryption algorithms
  • describe asymmetric encryption algorithms
  • describe confidentiality with asymmetric encryption
  • describe authentication with asymmetric encryption
  • describe digital signatures
  • describe digital signature process
  • Public Key Infrastructure

  • describe trusted third party
  • describe PKI terminology and components
  • describe public key cryptography standards
  • describe X.509v3 certificate fields
  • describe certificate enrollment
  • describe authentication using certificates
  • describe certificate revocation and revocation checks




    Multi-license discounts available for Annual and Monthly subscriptions.