Implementing Cisco Network Security v3.0 - IINS (Associate)

Implementing Cisco Network Security v3.0 - IINS (Associate) Course Description

Duration: 5.00 days (40 hours)

Cisco Career Guide

Implementing Cisco Network Security (IINS) v3.0 is a course focusing on security principles and technologies, using Cisco security products to provide hands-on examples. Using instructor-led discussions, extensive hands-on lab exercises, and supplemental materials, this course allows learners to understand common security concepts, and deploy basic security techniques utilizing a variety of popular security appliances within a “real-life” network infrastructure.

Exam format
Exam Number: 210-260 IINS
Associated Certifications: CCNA Security
Duration: 90 minutes (60-70 questions)
Register with: Pearson VUE


Note: E-learning module (Cisco Digital Learning Library) is also available for this course Click here for more details

Next Class Dates

Apr 2, 2018 – Apr 6, 2018
9:00 AM – 5:00 PM CT
519 8th Avenue, 2nd Floor, New York, NY 10018
New York, NY 10018
Jun 25, 2018 – Jun 29, 2018
9:00 AM – 5:00 PM CT
519 8th Avenue, 2nd Floor, New York, NY 10018
New York, NY 10018
Sep 17, 2018 – Sep 21, 2018
9:00 AM – 5:00 PM CT
519 8th Avenue, 2nd Floor, New York, NY 10018
New York, NY 10018
Dec 10, 2018 – Dec 14, 2018
9:00 AM – 5:00 PM CT
519 8th Avenue, 2nd Floor, New York, NY 10018
New York, NY 10018

View More Schedules »

Contact us to customize this class with your own dates, times and location. You can also call 1-888-563-8266 or chat live with a Learning Consultant.

Back to Top

Intended Audience for this Implementing Cisco Network Security v3.0 - IINS (Associate) Course

  • » The target audiences of this course are learners who aim to be network associates in the domain of network security and who have knowledge that is contained in the Interconnecting Cisco Networking Devices Part 1 (ICND1) course.

Back to Top

Course Prerequisites for Implementing Cisco Network Security v3.0 - IINS (Associate)

  • » Working knowledge of the Windows operating system
  • » Working knowledge of Cisco IOS networking and concepts
  • » ICND1 v2.0 - Interconnecting Cisco Networking Devices, Part 1

Back to Top

Implementing Cisco Network Security v3.0 - IINS (Associate) Course Objectives

  • » Describe common network security concepts
  • » Secure routing and switching infrastructure
  • » Deploy basic authentication, authorization and accounting services
  • » Deploy basic firewalling services
  • » Deploy basic site-to-site and remote access VPN services
  • » Describe the use of more advanced security services such as intrusion protection, content security and identity management

Back to Top

Implementing Cisco Network Security v3.0 - IINS (Associate) Course Outline

      1. Security Concepts
        1. Threatscape
          1. Threatscape Overview
          2. DoS and DDoS
          3. Spoofing
          4. Reflection and Amplification Attacks
          5. Social Engineering
          6. Evolution of Phishing
          7. Password Attacks
          8. Reconnaissance Attacks
          9. Buffer Overflow Attacks
          10. Man-in-the-Middle Attacks
          11. Malware
          12. Vectors of Data Loss and Exfiltration
          13. Hacking Tools
          14. Other Considerations
        2. Threat Defense Technologies
          1. Firewalls
          2. Intrusion Prevention Systems
          3. Content Security
          4. VPNs
          5. Endpoint Security
          6. Logging
        3. Security Policy and Basic Security Architectures
          1. Information Security Overview
          2. Classifying Assets, Vulnerabilities, and Countermeasures
          3. Managing Risk
          4. Regulatory Compliance
          5. Principles of Secure Network Design
          6. Security Policy
          7. Security Zones
          8. The Functional Planes of the Network
        4. Cryptographic Technologies
          1. Cryptography Overview
          2. Hash Algorithms
          3. Encryption Overview
          4. Cryptanalysis
          5. Symmetric Encryption Algorithms
          6. Asymmetric Encryption Algorithms
          7. Use Case: SSH
          8. Digital Signatures
          9. PKI Overview
          10. PKI Operations
          11. Use Case: SSL/TLS
          12. Key Management
          13. Discovery 1: Exploring Cryptographic Technologies
      2. Secure Network Devices
        1. Implementing AAA
          1. Introduction to AAA
          2. AAA Databases
          3. AAA Protocols
          4. AAA Servers
          5. SSH Configuration and Operation on IOS
          6. IOS Authorization with Privilege Levels
          7. Implementing Local AAA Authentication and Authorization
          8. Authorization with Role-Based CLI
          9. TACACS+ on IOS
          10. Discovery 2: Configure and Verify AAA
        2. Management Protocols and Systems
          1. IOS File System
          2. Copying Files to and from Network Devices
          3. Validating IOS Images Using MD5
          4. Digitally Signed Images
          5. IOS Resilient Configuration
          6. NTP
          7. Syslog
          8. Memory and CPU Threshold Notifications
          9. Netflow
          10. Configuration Management Protocol Options
          11. HTTPS Configuration and Operation
          12. SNMPv3 Configuration and Operation
          13. Locking Down Management Access with ACLs
          14. Other Password Considerations
          15. Discovery 3: Configuration Management Protocols
        3. Securing the Control Plane
          1. The Control Plane
          2. Control Plane Policing
          3. Control Plane Protection
          4. Authenticating Routing Protocols
          5. OSPF Route Authentication
          6. EIGRP Route Authentication
          7. Discovery 4: Securing Routing Protocols
      3. Layer 2 Security
        1. Securing Layer 2 Infrastructure
          1. Introduction to Layer 2 Security
          2. Ethernet Switching Overview
          3. VLAN Overview
          4. VLAN Configuration
          5. 802.1Q Trunking
          6. Trunk Attacks
          7. Trunk Configuration and Attack Mitigation
          8. CDP
          9. ACL Primer
          10. ACLs on Switches
          11. MAC Address Abuse
          12. Port Security
          13. Private VLANs
          14. Private VLAN Edge
          15. Private VLAN Proxy Attack and Mitigation
          16. Discovery 5: VLAN Security and ACLs on Switches
          17. Discovery 6: Port Security and Private VLAN Edge
        2. Securing Layer 2 Protocols
          1. STP Overview
          2. STP Attacks
          3. STP Attack Mitigation
          4. DHCP Overview
          5. DHCP Attacks
          6. DHCP Snooping
          7. ARP Overview
          8. ARP Cache Poisoning Attack
          9. Dynamic ARP Inspection
          10. Discovery 7: Securing DHCP, ARP, and STP
      4. Firewall
        1. Firewall Technologies
          1. Firewall Overview
          2. Packet Filters
          3. Stateful Firewalls
          4. Proxy Servers
          5. Next Generation Firewalls
          6. Logging
          7. Discovery 8: Explore Firewall Technologies
        2. Introducing the Cisco ASA v9.2
          1. Introducing the Cisco ASA Family of Security Appliances
          2. Cisco ASA Firewall Features
          3. Modes of Deployment
          4. Security Contexts
          5. High-Availability and Failover
          6. Configuring Management Access on the Cisco ASA
          7. Configuring Cisco ASA Interfaces
          8. NAT Fundamentals
          9. Configure NAT on Cisco ASA
          10. Configure Static NAT on Cisco ASA
          11. Configure Dynamic NAT on Cisco ASA
          12. Configure PAT on Cisco ASA
          13. Configure Policy NAT on Cisco ASA
          14. Verify NAT Operations
          15. Discovery 9: Cisco ASA Interfaces and NAT
        3. Cisco ASA Access Control and Service Policies
          1. Overview of Interface Access Rules
          2. Configure Interface Access Rules
          3. Configure Object Groups
          4. Introducing Cisco ASA Modular Policy Framework
          5. Configuring Cisco MPF Service Policy Rules
          6. Discovery 10: Access Control Using the Cisco ASA
        4. Cisco IOS Zone Based Firewall
          1. Zone-Based Policy Firewall Overview
          2. Zones and Zone Pairs
          3. Introduction to Cisco Common Classification Policy Language
          4. Default Policies, Traffic Flows, and Zone Interaction
          5. Cisco Common Classification Policy Language (C3PL) Configuration Overview
          6. Configuring Zone-Based Policy Firewall Class-Maps
          7. Configuring Zone-Based Policy Firewall Policy-Maps
          8. Discovery 11: Exploring Cisco IOS Zone-Based Firewall
      5. VPN
        1. IPsec Technologies
          1. IPsec VPNs
          2. IPsec Security Services
          3. IPsec Framework
          4. Internet Key Exchange
          5. IKE Phase 1
          6. ISAKMP Configuration
          7. IPsec Protocols
          8. IKE Phase 2
          9. IPsec Configuration
          10. Suite B Cryptographic Standard
          11. IKE Version 2
          12. IPsec with IPv6
          13. Discovery 12: Explore IPsec Technologies
        2. Site-to-Site VPN
          1. Site-to-Site Tunnel Negotiation Process
          2. Configuring Site-to-Site IPsec VPN
          3. Step 1: Ensure That ACLs Are Compatible with IPsec
          4. Step 2: Create ISAKMP IKE Phase 1 Policies
          5. Step 3: Configure Transform Sets
          6. Step 4: Create Crypto ACLs Using Extended ACLs
          7. Step 5: Configure IPsec Crypto Maps
          8. Verifying the IPsec Configuration
          9. Configuring Site-to-Site VPN on Cisco ASA
          10. Monitoring Site-to-Site VPN Configuration in ASDM
          11. Discovery 13: IOS-Based Site-to-Site VPN
          12. Discovery 14: ASA-Based Site-to-Site VPN
        3. Client Based Remote Access VPN
          1. Secure Sockets Layer and Transport Layer Security
          2. Basic Cisco AnyConnect SSL VPN
          3. Cisco AnyConnect SSL VPN Solution Components
          4. SSL VPN Server Authentication
          5. SSL VPN Client Authentication
          6. SSL VPN Client IP Address Assignment
          7. Basic AnyConnect SSL VPN Configuration Tasks
          8. Discovery 15: Remote Access VPN: ASA and AnyConnect
        4. Clientless Remote Access VPN
          1. Cisco Clientless SSL VPN
          2. Cisco Clientless SSL VPN Use Cases
          3. Cisco Clientless SSL VPN Resource Access Methods
          4. Basic Clientless SSL VPN Solution
          5. Server Authentication in Basic Clientless SSL VPN
          6. Client-Side Authentication in Basic Clientless SSL VPN
          7. Clientless SSL VPN URL Entry and Bookmarks
          8. Basic Access Control for Clientless SSL VPN
          9. Basic Clientless SSL VPN Configuration Tasks
          10. Discovery 16: Clientless Remote Access VPN
      6. Advanced Topics
        1. Intrusion Detection and Protection
          1. Introduction to IPS
          2. IPS Terminology
          3. Evasion Techniques and Countermeasures
          4. Protecting the Network with FireSIGHT
          5. FireSIGHT Protection Before an Attack
          6. FireSIGHT Protection During an Attack
          7. FireSIGHT Protection After an Attack
          8. FireSIGHT Deployment Options
          9. Inline and Passive Mode Deployment Options
        2. Endpoint Protection
          1. Endpoint Security Overview
          2. Personal Firewalls
          3. Antivirus and Antispyware
          4. Centralized Endpoint Policy Enforcement
          5. Cisco AMP for Endpoints
        3. Content Security
          1. Cisco ESA Deployment
          2. Cisco ESA Overview
          3. Cisco ESA Features and Benefits
          4. Cisco ESA GUI Management
          5. Cisco ESA Mail Processing
          6. Cisco WSA Deployment
          7. Cisco WSA Overview
          8. Cisco WSA Features and Benefits
          9. Cisco WSA GUI Management
          10. Cisco CWS Deployment
          11. Cisco CWS Overview
          12. Cisco CWS Features and Benefits
        4. Advanced Network Security Architectures
          1. Modular Network Architectures
          2. Security Issues in Modern Networks
          3. Identity Management
          4. BYOD Challenge
          5. Cisco TrustSec
      7. Lab
        1. Challenge: Configure AAA and Secure Remote Administration
          1. Configure AAA and Secure Remote Administration
        2. Challenge: Configure Secure Network Management Protocols
          1. Configure Secure Network Management Protocols
        3. Challenge: Configure Secure EIGRP Routing
          1. Configure EIGRP route authentication
        4. Challenge: Configure Secure Layer 2 Infrastructure
          1. Configure Secure Layer 2 Infrastructure
        5. Challenge: Configure DHCP Snooping and STP Protection
          1. Configure DHCP Snooping and STP Protection
        6. Challenge: Configure Interfaces and NAT on the Cisco ASA
          1. Configure Interfaces and NAT on Cisco ASA
        7. Challenge: Configure Network Access Control with the Cisco ASA
          1. Configure Network Access Control with the Cisco ASA
        8. Challenge: Configure Site-to-Site VPN on IOS
          1. Configure Site-to-Site VPN on IOS
        9. Challenge: Configure AnyConnect Remote Access VPN on ASA
          1. Configure AnyConnect Remote Access VPN on ASA
        10. Challenge: Configure Clientless SSL VPN on the ASA
          1. Configure Clientless SSL VPN on the ASA

Back to Top

This training prepares students for the following exam(s):

  • » 210-260 IINS : Implementing Cisco Network Security (IINS) 3.0

Back to Top

Do you have the right background for Implementing Cisco Network Security v3.0 - IINS (Associate)?

Skills Assessment

We ensure your success by asking all students to take a FREE Skill Assessment test. These short, instructor-written tests are an objective measure of your current skills that help us determine whether or not you will be able to meet your goals by attending this course at your current skill level. If we determine that you need additional preparation or training in order to gain the most value from this course, we will recommend cost-effective solutions that you can use to get ready for the course.

Our required skill-assessments ensure that:

  1. All students in the class are at a comparable skill level, so the class can run smoothly without beginners slowing down the class for everyone else.
  2. NetCom students enjoy one of the industry's highest success rates, and pass rates when a certification exam is involved.
  3. We stay committed to providing you real value. Again, your success is paramount; we will register you only if you have the skills to succeed.
This assessment is for your benefit and best taken without any preparation or reference materials, so your skills can be objectively measured.

Take your FREE Skill Assessment test »

Back to Top

Award winning, world-class Instructors

David M.
- Networking expert with several Cisco certifications, including CCENT, CCNA, CCDA, CCSI, and CCVP. - Has taught over 90 courses at NetCom Learning. - Average rating of 8.75 out of 9 on student evaluation reports.

Bio:

David has been in the Networking field for the past eleven years and holds several Cisco certifications. He has been an instructor since 2005 and has taught over 90 courses at NetCom Learning.

David is an extremely enthusiastic trainer with a raw passion towards teaching and delivering Cisco information and takes great pride in his career as an instructor, which has lead him to develop and deliver the class in his own unique way; very professional and knowledgeable, yet pleasant and enjoyable. His classes have a high passing rate for students taking certification exams, and averages 8.75 out of 9 on evaluation reports.
Michael G.
- Over 22 years of professional experience in the IT field, including more than a decade as a Certified Trainer.
- An expert in Cisco's Routing, Switching, Security, Voice and Wireless areas, as well as select Microsoft, Novell, CompTIA, Sun and CWNP courses.
- High-skilled and acclaimed instructor. Has trained over 900 students at Netcom Learning.

Bio:

Michael has over 22 years of professional experience in the IT field, including more than a decade as a Certified Trainer. An expert in Cisco's Routing, Switching, Security, Voice and Wireless areas, Michael also teaches select Microsoft, Novell, CompTIA, Sun and CWNP courses.

Michael's dedication and passion for teaching is unmatched. He has trained over 900 students at Netcom Learning since 2006 and his evaluation scores average 8.7 out of 9.
William D.
- Bachelors and Masters in Mathematics from University of Pennsylvania, in addition to several IT certifications.
- Over 20 years of experience in the IT industry; background ranges from engineering, administration and escalation support in networks.

Bio:

William is a highly-skilled IT professional with Bachelors and Masters Degree in Mathematics from University of Pennsylvania. He has been working in the IT industry for over 20 years, with experience in engineering, administration and escalation support in networks ranging from small to large scale complex enterprise environments.

As a Cisco and CompTIA Subject Matter Expert, he holds several certifications, including Cisco CCNA, CCNP, and CCIE. William is one of NetCom's top trainers, consistently scoring high marks in student evaluations.

See more...   See more instructors...

Back to Top

Recent Client Testimonials & Reviews

Keep the training content the same way.

- Mandeep S.
Course(s) Taken

» Interconnecting Cisco Networking Devices, Part 1 v 3.0 - ICND1 (Entry)

Great caring professor and he offered to stay late always, truly cares for students.

- Jose T.
Course(s) Taken

» Interconnecting Cisco Networking Devices, Part 1 v 3.0 - ICND1 (Entry)

  More testimonials »  

Back to Top