Cisco IINS 1.0: Network Security Principles I


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
The open nature of the Internet makes it increasingly important for growing businesses to pay attention to the security of their networks. As companies move more of their business functions to the public network, they need to take precautions to ensure that their data remains uncompromised. With the challenges of increased availability requirements and growing regulatory requirements, establishing and maintaining a secure network computing environment is becoming increasingly difficult. This course provides an explanation of the core principles that are part of the secure network environment. It explains how sophisticated attack tools and open networks generate an increased need for network security and dynamic security policies, the primary objectives of security and primary types of security controls, as well as some of the factors that are involved in responding to a security breach. Examining who hackers are, what motivates them, and how they do what they do, as well as variety of attacks against confidentiality, integrity, and availability and some of the best practices to defeat them are also covered. This course is one of a series from the IINS 1.0 SkillSoft learning paths which cover the objectives for Cisco exam 640-553 IINS 1.0.

Target Audience
Network designers, administrators, engineers, and managers; systems engineers; individuals seeking the Implementing Cisco IOS Network Security (IINS) v1.0 640-553 certification

Prerequisites
Knowledge and skills equivalent to those learned in Interconnecting Cisco Networking Devices Part 1 (ICND1); a working knowledge of the Windows operating system and Cisco IOS networking and concepts

Expected Duration (hours)
2.5

Lesson Objectives

Cisco IINS 1.0: Network Security Principles I

  • recognize why there's an increased need for network security and dynamic security policies
  • recognize the three primary objectives of security
  • recognize how data is classified
  • recognize the primary types of security controls
  • recognize the factors involved in responding to a security breach
  • recognize key codes of ethics that are binding to INFOSEC professionals
  • recognize the motivations of different types of hackers
  • recognize typical attacks that hackers use
  • recognize the principles of defense in depth
  • recognize how attackers use IP spoofing to launch various types of attacks
  • recognize how attackers can compromise confidentiality
  • recognize the methods that attackers can use to compromise integrity
  • recognize how attackers can compromise availability
  • specify the appropriate response to a security breach
  • Course Number:
    cc_iins_a01_it_enus