Privée

Ce cours est disponible en session privée ou personnalisée. Il peut être offert à l’un de nos centres de formation ou directement à vos bureaux. Appelez l’un de nos conseillers ou faites une demande de soumission en ligne.

Appelez maintenant au 1 877 624.2344

  • Durée: 5 jours
  • Prix régulier: Sur demande

CISCO - Implementing Cisco IOS Network Security (IINS) v3.0

Reference : © CISCO IINS v3.0

Duration : 5 days

Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course presented by Cisco Learning Partners to end users and channel partner customers. The course focuses on security principles and technologies, using Cisco security products to provide hands-on examples. Using instructor-led discussions, extensive hands-on lab exercises, and supplemental materials, this course allows learners to understand common security concepts, and deploy basic security techniques utilizing a variety of popular security appliances within a “real-life” network infrastructure.

Learning Credits 35
LanguagesThese scheduled public sessions are offered in English or in French (FR). The educational material is in English.
CertificationThis course prepares to the 210-260 IINS exam which is part of the CCNA Security certification.

Audience

  • Channel Partners
  • Customers
  • Employees

Prerequisites

Objectives

Upon completing this course, the learner will be able to meet these overall objectives:

  • Describe common network security concepts
  • Secure routing and switching infrastructure
  • Deploy basic authentication, authorization and accounting services
  • Deploy basic firewalling services
  • Deploy basic site-to-site and remote access VPN services
  • Describe the use of more advanced security services such as intrusion protection, content security and identity management

Contents

Module 1 - Security Concepts
  • Threatscape
  • Threat defense technologies
  • Security policy and basic security architectures
  • Cryptographic technologies
Module 2 - Secure Network Devices
  • Implementing AAA
  • Management protocols and systemsSecuring the control plane
Module 3 - Layer 2 Security
  • Securing Layer 2 infrastructures
  • Securing Layer 2 protocols
Module 4 - Firewall
  • Firewall technologies
  • Introducing the Cisco ASA v9.2
  • Cisco ASA access control and service policies
  • Cisco IOS zone based firewall
Module 5 - VPN
  • IPsec technologies
  • Site-to-site VPN
  • Client-based remote access VPN
  • Clientless remote access VPN
Module 6 - Advanced Topics
  • Intrusion detection and protection
  • Endpoint protection
  • Content security
  • Advanced network security architectures
Labs :
  • Discovery 1: Exploring Cryptographic Technologies
  • Discovery 2: Configure and Verify AAA
  • Discovery 3: Configuration Management Protocols
  • Discovery 4: Securing Routing Protocols
  • Discovery 5: VLAN Security and ACLs on Switches
  • Discovery 6: Port Security and Private VLAN Edge
  • Discovery 7: Securing DHCP, ARP, and STP
  • Discovery 8: Explore Firewall Technologies
  • Discovery 9: Cisco ASA Interfaces and NAT
  • Discovery 10: Access Control Using the Cisco ASA
  • Discovery 11: Exploring Cisco IOS Zone-Based Firewall
  • Discovery 12: Explore IPsec Technologies
  • Discovery 13: IOS-Based Site-to-Site VPN
  • Discovery 14: ASA-Based Site-to-Site VPN
  • Discovery 15: Remote Access VPN: ASA and AnyConnect
  • Discovery 16: Clientless Remote Access VPN
  • Challenge 1: Configure AAA and Secure Remote Administration
  • Challenge 2: Configure Secure Network Management Protocols
  • Challenge 3: Configure Secure EIGRP Routing
  • Challenge 4: Configure Secure Layer 2 Infrastructure
  • Challenge 5: Configure DHCP Snooping and STP Protection
  • Challenge 6: Configure Interfaces and NAT on the Cisco ASA
  • Challenge 7: Configure Network Access Control with the Cisco ASA
  • Challenge 8: Configure Site-to-Site VPN on IOS
  • Challenge 9: Configure AnyConnect Remote Access VPN on ASA
  • Challenge 10: Configure Clientless SSL VPN on the ASA

Savoir s’entourer des meilleurs

Steve Waterhouse
Instructeur certifié avec les technologies du sans-fil (CWNP), les technologies de réseautique (Cisco et CompTIA) et conférencier en sécurité des technologies de l’information.
Simon Bourassa
Formateur et conseiller en TI
Simon est passionné par le développement logiciel et le développement de produits, mais avant tout par l’ensemble des gens cachés derrière ces codes, qui travaillent main dans la main pour développer des solutions innovantes.
Pierre-Edouard Brondel
Pierre-Edouard Brondel
Formateur et conseiller en bureautique
Expert en pédagogie dans le domaine des technologies et de la bureautique cumulant plus de 25 ans d’expérience, Pierre-Édouard est d’abord et avant tout un passionné de capital humain.
Valère Drainville
Valère Drainville
Formateur et conseiller en efficacité professionnelle
Expert en collaboration et en efficacité professionnelle, Valère Drainville saura vous accompagner dans l’adoption et la gestion de vos outils de travail collaboratifs.