Trust-systems

Implementing Cisco IOS Network Security [IINS]

[vc_row][vc_column][fancy_heading h1=”0″ style=”line” title=”Implementing Cisco IOS Network Security `{`IINS`}`”][/fancy_heading][/vc_column][/vc_row][vc_row][vc_column][vc_tta_tour style=”modern” shape=”round” color=”sky” spacing=”30″ controls_size=”md” active_section=”1″][vc_tta_section title=”Goals ” tab_id=”1604052756184-7a51c305-5b65″][vc_column_text]

  • install, administer, maintain and monitor Cisco security technologies and equipment (AAA, ASA, NAT, VPN, …)
  • develop security policies and limit risks within the information system
  • prepare for CISCO CCNA Security certification

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Public ” tab_id=”1604052756201-0b7893a0-9d3f”][vc_column_text]Administrators, network engineers and technicians, network architects who need to know how to define and integrate the security policy in an existing network.[/vc_column_text][/vc_tta_section][vc_tta_section title=”Prerequisites ” tab_id=”1604052758790-a0d2ea87-abf9″][vc_column_text]It is recommended that you take the Network Fundamentals course before taking this course and have some knowledge of the Microsoft Windows operating system.[/vc_column_text][/vc_tta_section][vc_tta_section title=”Duration ” tab_id=”1604052759661-09951430-db4d”][vc_column_text]5 Days.[/vc_column_text][/vc_tta_section][vc_tta_section title=”Pedagogical Methods ” tab_id=”1604052760987-d896d86f-406d”][vc_column_text]This Cisco training is punctuated by an alternation of presentations and practical laboratories

This CISCO IINS Security training prepares for the CCNA Security 210-260 exam

For “Distance” training, they are carried out with a Teams or Zoom type videoconferencing tool depending on the case, allowing the trainer to adapt his teaching. Find on our website all the details on distance sessions or classes virtual.[/vc_column_text][/vc_tta_section][vc_tta_section title=”Programs ” tab_id=”1604052761706-64a81fe1-b2c7″][vc_column_text]Security concepts

Different Types of Attacks Threat Defense Technologies Security Strategy and Basic Security Architectures Cryptography Technologies

Secure network devices

Implement AAA Management protocols and systems Secure the control plan

Layer 2 security

Secure Layer 2 Infrastructure Secure Layer 2 Protocols

Firewall

Firewall Technologies Introduction to Cisco ASA v9.2 Introduction to Cisco ASA v9.2 Cisco ASA Access Control and Service Policies Firewall on Cisco IOS

VPN

Site-to-Site IPSecVPN Technologies Client-Based Remote VPN Access Client-Based Remote VPN Access Clientless VPN Remote Access

Advanced topics

Intrusion Detection and Protection
Workstation Protection Content Analysis Security Advanced Network Security Architectures[/vc_column_text][/vc_tta_section][vc_tta_section title=”Register for training” tab_id=”1604052762685-0f4b5a7b-471a”][vc_column_text][contact-form-7 id=”266″ title=”Inscription”][/vc_column_text][/vc_tta_section][/vc_tta_tour][/vc_column][/vc_row]

Retour en haut