Cisco IINS 1.0: Mitigating Layer 2 Attacks
This course is included in our On-demand training solution.
Like routers, both Layer 2 and Layer 3 switches have their own set of network security requirements. Access to switches is a convenient entry point for attackers who are intent on illegally gaining access to a corporate network. With access to a switch, an attacker can set up rogue access points and protocol analyzers, and launch all types of attacks from within the network. Attackers can even spoof the MAC and IP addresses of critical servers to do a great deal of damage. This course examines various Layer 2 attacks and strategies to mitigate them. This course is one of a series from the IINS 1.0 SkillSoft learning paths which cover the objectives for Cisco exam 640-553 IINS 1.0.
Network designers, administrators, engineers, and managers; systems engineers; individuals seeking the Implementing Cisco IOS Network Security (IINS) v1.0 640-553 certification
Knowledge and skills equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1); working knowledge of the Windows Operating System; working knowledge of Cisco IOS networking and concepts.
Layer 2 Vulnerabilities and VLAN Attacks
Types of Layer 2 Attacks
Using Port Security
Switch Security Features and Best Practices
Using Cisco Catalyst Switch Security Features