Course details

Cisco IINS 3.0: Threatscape, Security Policies, and Basic Architectures

Cisco IINS 3.0: Threatscape, Security Policies, and Basic Architectures

Target Audience
Expected Duration
Lesson Objectives
Course Number
Expertise Level

Put your finger on the pulse on the existing critical state of security threats and technology defense solutions. This course describes a variety of attack vectors and threat categories prevalent in the corporate landscape today. Also, an examination of threat countermeasure technologies including firewalls, IPS, VPNs, content security, and endpoint protection. This course is one of a series in the Skillsoft learning path that covers the objectives for the Cisco exam Implementing Cisco Network Security (IINS) exam (210-260 IINS). This exam counts toward the CCNA Security certification.

Target Audience
This course is directed towards networking professionals who need to understand common security concepts and deploy basic security techniques using a variety of popular security solutions including IOS routers, IOS switches, Cisco Adaptive Security Appliances and Windows and Linux hosts. This course is also designed for security practitioners who want to pass the IINS 3.0 exam.


Expected Duration (hours)

Lesson Objectives

Cisco IINS 3.0: Threatscape, Security Policies, and Basic Architectures

  • start the course
  • describe Threatscape
  • describe DDoS attacks
  • describe social engineering
  • describe phishing
  • describe pharming
  • describe password attacks
  • describe reconnaissance attacks
  • describe buffer overflow attacks
  • describe the characteristics of a man-in-the-middle attack
  • describe man-in-the-middle attacks
  • compare the types of malicious software
  • describe advanced persistent threats
  • describe network security objectives
  • describe assets, vulnerabilities, and threats
  • describe risk
  • describe classifying assets
  • describe classifying vulnerabilities
  • describe classifying countermeasures
  • describe why you need a security policy
  • describe who uses the security policy
  • describe the components of a comprehensive security policy
  • describe standards, guidelines, and procedures
  • describe responsibilities for the security policy
  • describe security awareness
  • Course Number:

    Expertise Level