Cisco IINS 3.0: Securing Layer 2 Protocols and Firewall Technologies

This course is directed towards networking professionals who need to understand common security concepts and deploy basic security techniques using a variety of popular security solutions including IOS routers, IOS switches, Cisco Adaptive Security Appliances, and Windows and Linux hosts. This course is also designed for security practitioners who want to pass the IINS 3.0 exam.


Expected Duration
107 minutes

How can you control what an entity can do unless they are identified? Once identified, then what actions can be performed? In addition, when did they start, finish, and what was the duration? Answer these vital questions with AAA services. AAA is short for authentication, authorization, and accounting. Authentication is determining identity. Authorization is defining what actions that individual or groups of identities can perform. Accounting is about tracking what individual identities have done. This course compares local and centralized AAA, examines authentication services, compares ACS to ISE, and more.


Securing Layer 2 Protocols

  • start the course
  • describe STP
  • compare PortFast, BPDU guard, and root guard
  • describe STP attack mitigation
  • describe DHCP
  • describe DHCP starvation
  • describe DHCP Snooping
  • describe ARP
  • describe DAI in action
  • describe a unidirectional man-in-the-middle attack
  • describe DHCP snooping
  • describe DAI
  • describe how to enable PortFast, BPDU guard, and root guard

Firewall Technologies

  • compare firewalls and security zones
  • describe firewall characteristics
  • describe packet filters
  • describe stateful firewalls
  • describe stateful firewalls and FTP
  • describe proxy servers
  • describe pairing a proxy server with a stateful firewall
  • describe next-generation firewalls





Multi-license discounts available for Annual and Monthly subscriptions.