Infrastructure Attacktecs™ & Defentecs™: Hacking Cisco Networks

Stephen Dugan july 21-22 july 23-24


Ends February 1


Ends June 1


Ends July 20


July 21-24


Attacktecs™ - Attack Techniques used to exploit network infrastructure, servers, databases and other services with the intent of stealing or destroying intellectual property and/or to deny users and clients legitimate access.

Defentecs™ – Defense Techniques and implementation methods used to defend against the latest Attacktecs.

This class will cover a wide variety of the publicly-available exploit tools and how they can be used specifically against a Cisco infrastructure. A majority of the class time will be spent in practical labs. Therefore, a certain level of Cisco expertise will be expected. The training will also cover the possible defenses against these attacks.

Students will be using 2600 series routers, and 2950T switches for their labs. The lab core will consist of 3750s, 2800s, and servers of various flavors. Students will be required to bring their own laptops to attach to the labs (with appropriate caution). Students must have a working serial port and terminal emulator. This class will focus on internal infrastructure vulnerabilities and will not be covering firewalls, VPN concentrators, or IPS tools.

Here is a list of some of the topics that will be covered:

What to bring

Your laptop with both a serial port and FastEthernet NIC. Operating systems on laptops can be either Windows or Linux.

You must provide your own laptop. No loaner laptops will be available.


Stephen Dugan is currently an independent contract instructor and network engineer. He has been teaching Cisco networking for the last several years focusing on Router and Switch configuration, Voice/Data integration, and Network Security. His students come mostly from Fortune 500 companies, government/military and service providers. He also teaches private internal classes to Cisco Employees. As a Network Engineer he has worked on the design and implementation of large enterprise, government, and service provider networks. He is also working on a unique security book covering the aspects of hacking VoIP networks.