Course Details

Previous Page


Cisco IINS 3.0: Securing Layer 2 Infrastructure


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number


Overview/Description
In a global society, there has got to be scalable and secure way to conduct financial transactions, contracts, and agreements over untrusted networks. Here is an answer. A huge challenge with both asymmetric encryption and digital certificates is the secure distribution of public keys. This is where public key infrastructure comes into play.

Target Audience
This course is directed toward networking professionals who need to understand common security concepts and deploy basic security techniques using a variety of popular security solutions including IOS routers, IOS switches, Cisco Adaptive Security Appliances and Windows and Linux hosts. This course is also designed for security practitioners who want to pass the IINS 3.0 exam.

Prerequisites
None

Expected Duration (hours)
1.2

Lesson Objectives

Cisco IINS 3.0: Securing Layer 2 Infrastructure

  • start the course
  • describe a VLAN hopping attack
  • describe double-tagging VLAN hopping attack
  • describe trunk configuration and attack mitigation
  • describe ACLs on switches
  • describe PACLs
  • describe VACLs
  • verify a VACL configuration
  • describe MAC spoofing
  • describe ARP cache poisoning
  • describe port security
  • describe how to configure port security
  • configure port security
  • describe how to verify port security configuration
  • verify port security configuration
  • describe MAC address tables
  • describe port security
  • describe ARP and ARP poisoning
  • Course Number:
    cc_seci_a04_it_enus