Cisco IINS 3.0: Securing Layer 2 Infrastructure

This course is directed toward networking professionals who need to understand common security concepts and deploy basic security techniques using a variety of popular security solutions including IOS routers, IOS switches, Cisco Adaptive Security Appliances and Windows and Linux hosts. This course is also designed for security practitioners who want to pass the IINS 3.0 exam.


Expected Duration
75 minutes

In a global society, there has got to be scalable and secure way to conduct financial transactions, contracts, and agreements over untrusted networks. Here is an answer. A huge challenge with both asymmetric encryption and digital certificates is the secure distribution of public keys. This is where public key infrastructure comes into play.


VLANs, Trunks, and Access-related Attacks

  • start the course
  • describe a VLAN hopping attack
  • describe double-tagging VLAN hopping attack
  • describe trunk configuration and attack mitigation
  • describe ACLs on switches
  • describe PACLs
  • describe VACLs
  • verify a VACL configuration
  • MAC Address-related Attacks

  • describe MAC spoofing
  • describe ARP cache poisoning
  • describe port security
  • describe how to configure port security
  • configure port security
  • describe how to verify port security configuration
  • verify port security configuration
  • describe MAC address tables
  • describe port security
  • describe ARP and ARP poisoning




    Multi-license discounts available for Annual and Monthly subscriptions.