Course Details

Previous Page


Cisco IINS 3.0: IPsec Technologies


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Most Layer 2 vulnerabilities can be addressed with some good base configuration practices combined with an accurate DHCP binding of legitimate MAC addresses to IP addresses. More power techniques will be discovered in this course. This course will show the learner how to protect MAC address mappings, ARP functions, and more with port security and Private VLANs (PVLANs)

Target Audience
This course is directed toward networking professionals who need to understand common security concepts and deploy basic security techniques using a variety of popular security solutions including IOS routers, IOS switches, Cisco Adaptive Security Appliances, and Windows and Linux hosts. This course is also designed for security practitioners who want to pass the IINS 3.0 exam.

Prerequisites
None

Expected Duration (hours)
0.8

Lesson Objectives

Cisco IINS 3.0: IPsec Technologies

  • start the course
  • describe cryptographic algorithms in IPsec
  • describe Internet Key Exchange
  • describe IKE phase 1
  • describe first exchange in IKE phase 1
  • describe second exchange in IKE phase 1
  • describe third exchange in IKE phase 1
  • describe IPsec protocols
  • describe ESP
  • compare tunnel mode and transport mode
  • describe IKE phase 2
  • describe IPsec configuration
  • describe suite B cryptographic standard
  • describe IKE version 2
  • Course Number:
    cc_seci_a09_it_enus