Course Details

Previous Page


Cisco IINS 2.0: Introducing Networking Security Fundamentals


Overview/Description
Target Audience
Expected Duration
Lesson Objectives
Course Number



Overview/Description
The open nature of the Internet makes it increasingly important for growing businesses to pay attention to the security of their networks. As companies move more of their business functions to the public network, they need to take precautions to ensure that their data is not compromised or does not end up in front of the wrong people. It has become increasingly difficult to establish and maintain a secure network computing environment, and the challenge is made more difficult because of increased availability requirements and growing regulatory requirements. Risk management is a building block of effective security architectures, which protects organizational assets against constantly evolving threats. This course provides an explanation of the breadth of the challenge to establish and maintain a secure network environment. It includes a description of the fundamental concepts in Network Security, identifies common vulnerabilities and threats in borderless networks, and describes basic principles for securing networks against common threats.

Target Audience
Network designers, administrators, engineers, and managers; systems engineers; individuals seeking the Implementing Cisco IOS Network Security (IINS) v2.0 640-554 certification, which is associated with the CCNA Security certification exam. Knowledge and skills equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1) are required, and a working knowledge of the Windows operating system and Cisco IOS networking and concepts is recommended.

Expected Duration (hours)
1.0

Lesson Objectives

Cisco IINS 2.0: Introducing Networking Security Fundamentals

  • identify the most important criterion when classifying data
  • categorize examples of security controls
  • identify the most recent threat vector trends in information security
  • match types of attackers to descriptions
  • sequence the typical steps for compromising targets and applications
  • categorize threats to borderless networks
  • recognize defense-in-depth principles
  • Course Number:
    cc_cins_a01_it_enus