Cisco IINS 1.0: Network Security Principles I

This course is included in our On-demand training solution.

Overview

The open nature of the Internet makes it increasingly important for growing businesses to pay attention to the security of their networks. As companies move more of their business functions to the public network, they need to take precautions to ensure that their data remains uncompromised. With the challenges of increased availability requirements and growing regulatory requirements, establishing and maintaining a secure network computing environment is becoming increasingly difficult.
This course provides an explanation of the core principles that are part of the secure network environment. It explains how sophisticated attack tools and open networks generate an increased need for network security and dynamic security policies, the primary objectives of security and primary types of security controls, as well as some of the factors that are involved in responding to a security breach. Examining who hackers are, what motivates them, and how they do what they do, as well as variety of attacks against confidentiality, integrity, and availability and some of the best practices to defeat them are also covered. This course is one of a series from the IINS 1.0 SkillSoft learning paths which cover the objectives for Cisco exam 640-553 IINS 1.0.

Target Audience

Network designers, administrators, engineers, and managers; systems engineers; individuals seeking the Implementing Cisco IOS Network Security (IINS) v1.0 640-553 certification

Prerequisites

Knowledge and skills equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1); a working knowledge of the Windows operating system and Cisco IOS networking and concepts

Expected Duration

150 min.

Course Objectives

Combating Threats to Security

  • recognize why there’s an increased need for network security and dynamic security policies
  • recognize the three primary objectives of security
  • Data Classification and Security Controls

  • recognize how data is classified
  • recognize the primary types of security controls
  • Security breaches, laws, and ethics

  • recognize the factors involved in responding to a security breach
  • recognize key codes of ethics that are binding to INFOSEC professionals
  • Adversaries, Motivations, and Classes of Attack

  • recognize the motivations of different types of hackers
  • recognize typical attacks that hackers use
  • Defense in Depth

  • recognize the principles of defense in depth
  • IP Spoofing Attacks

  • recognize how attackers use IP spoofing to launch various types of attacks
  • Confidentiality Attacks

  • recognize how attackers can compromise confidentiality
  • Integrity attacks

  • recognize the methods that attackers can use to compromise integrity
  • Availability Attacks

  • recognize how attackers can compromise availability
  • Responding to a Security Breach

    COURSE COST



     

    NEED HELP OR NOT SURE?