Understanding Cisco Industrial IoT Networking Foundation (INFND)
- Define what IIoT is and identify IIoT architectures.
- Identify IIoT market verticals, and their motivations and requirements.
- Explore Cisco IIoT networking devices, how they are different from other devices, and use common administrative tools for managing them.
- Explore industrial communications protocols for control and automation, and how they have been adapted to run on top of a TCP/IP network infrastructure.
- Describe wireless protocols used in IIoT environments, including architectures and devices used.
- Understand the TCP/IP protocol stack and how it is used with other protocols in IIoT environments.
- Discuss network protocols for clock synchronization between network devices, and describe available tools for IIoT network administration.
- Discuss wireless technologies used in a core LAN, and their relevance to IIoT implementations.
- Explore field WAN technologies and how they are used in IIoT environments.
- Explore legacy protocols and explain the methods available to transport non-routable protocols over modern networks.
- Explain fundamental concepts of Quality of Service (QoS) related to IIoT network environments.
- Discuss Multiprotocol Label Switching (MPLS) operation, components, terminology, and features, and explore its use in IIoT environments.
- Explore Layer 2 and Layer 3 VPN technologies and describe the way they can be used on IIoT deployments.
- Describe Dense Wave Division Multiplexing (DWDM) technology and its use in IIoT environments.
- Explore Layer 1 and Layer 2 high availability technologies and redundancy mechanisms.
- Describe Layer 3 high availability and the need for Layer 3 redundancy in IIoT deployments.
Who should attend
- Operational Technology (OT) Engineers
- IT engineers
- Generalists, including managers, project leads, and solutions and business architects
The knowledge and skills you are expected to have before attending this course is:
- Implementing and Administering Cisco Solutions (CCNA)
Lesson 1: Vulnerabilities of Cisco Unified Communications Networks and Security Fundamentals
- Topic 1A: Assessing Vulnerabilities of Cisco Unified Communications Networks
- Topic 1B: Describing Security Implementation Strategies
- Topic 1C: Describing Cryptographic Services and Functions
- Topic 1D: Describing Key Management and PKI
- Topic 1E: Describing IPsec and Cisco AnyConnect SSL VPN
Lesson 2: Network Infrastructure Security
- Topic 2A: Implementing Network Separation and Packet Filtering
- Topic 2B: Implementing Switch Security Features
- Topic 2C: Implementing Cisco AnyConnect SSL VPNs in Cisco Unified Communications Networks
Lesson 3: Cisco Unified Communications Manager and Endpoint Security Features
- Topic 3A: Hardening Cisco Unified Communications Endpoints
- Topic 3B: Implementing Toll-Fraud Prevention
- Topic 3C: Implementing Native Cisco Unified Communications Manager Security Features
- Topic 3D: Implementing Cisco Unified Communications Manager Security Features Based on Security Tokens
Lesson 4: Secure Cisco Unified Communications Integration and Features
- Topic 4A: Implementing SRTP to Gateways and Signaling Protection by IPsec
- Topic 4B: Implementing Secure Signaling and SRTP in SRST and Cisco Unified Communications Manager Express
- Topic 4C: Implementing Trusted Relay Points
- Topic 4D: Implementing Proxies for Secure Signaling and SRTP
Hands On Labs
Lab 1-1: Identifying Security Weaknesses in a Cisco Unified Communications Network
Lab 2-1: Implementing Firewalls
Lab 2-2: Implementing 802.1X
Lab 2-3: Implementing Cisco AnyConnect SSL VPNs
Lab 3-1: Implementing Cisco UC Manager Security Features Based on Security Tokens
Lab 4-1: Implementing SRTP to Gateways and Signaling Protection by IPsec
Lab 4-2: Implementing Secure SRST and Secure Cisco UC Manager Express
Lab 4-3: Implementing Trusted Relay Points
Lab 4-4: Implementing Proxies for Signaling and RTP