The Implementing and Administering Cisco Solutions (CCNA) v1.0 course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation, and software-defined networking. This course helps you prepare to take the 200-301 Cisco® Certified Network Associate (CCNA®) exam. Audience Profile This course is designed for anyone seeking CCNA certification. The course also provides foundational knowledge for all support technicians involved in the basic installation, operation, and verification of Cisco networks. The job roles best suited to the material in this course are: Prerequisites Recommended Before taking this course, you should have: There are no formal prerequisites for CCNA certification, but you should make sure to have a good understanding of the exam topics.
1 – EXPLORING THE FUNCTIONS OF NETWORKING What is a computer network? Components of a network Characteristics of a network Physical vs. Logical Topologies Interpreting a network diagram Impact of user applications on the network 2 – INTRODUCING THE HOST-TO-HOST COMMUNICATIONS MODEL Host-to-host communications overview ISO OSI reference model TCP/IP protocol Suite Peer-to-peer communications Encapsulation and de-encapsulation TCP/IP stack vs OSI reference model 3 – OPERATING CISCO IOS SOFTWARE Cisco IOS software features and functions Cisco IOS software CLI functions Cisco IOS software models Discovery 1: Get started with Cisco CLI 4 – INTRODUCING LANS Local area networks LAN components Need for switches Characteristics and features of switches 5 – EXPLORING THE TCP/IP LINK LAYER Ehernet LAN connection media Ethernet frame structure LAN communication types MAC addresses Frame switching Discovery 2: Observe how a switch operate Duplex communication 6 – STARTING A SWITCH Switch installation Connecting to a console port Switch LED indicators Basic show commands and information Discovery 3: Perform basic switch configuration Implement the initial switch configuration 7 – INTRODUCING THE TCP/IP INTERNET LAYER, IPV4 ADDRESSING, AND SUBNETS Internet protocol Decimal and binary number systems Binary-to-decimal conversion Decimal-to-binary conversion IPv4 address representation IPv4 header fields IPv4 address classes Subnet masks Subnets Implementing subnetting: Bowwing bits Implementing subnetting: Determining the addressing scheme Benefits of VLSM and Implementing VLSM Private vs. Public IPv4 addresses Reserved IPv4 addresses Verifying IPv4 address of a host 8 – EXPLAINING THE TCP/IP TRANSPORT LAYER AND APPLICATION LAYER TCP/IP transport layer functions Reliable vs. Best-effort transport TCP characteristics UDP characteristics TCP/IP application layer Introducing HTTP Domain name system Explaining DHCP for IPv4 Discovery 4: Inspect TCP/IP applications 9 – EXPLORING THE FUNCTIONS OF ROUTING Role of a router Router components Router functions Routing table Path determination 10 – CONFIGURING A CISCO ROUTER Initial router setup Configuring router interfaces Configuring IPv4 addresses on router interfaces Checking interface configuration and status Discovery 5: Configure an interface on a Cisco router Exploring connected devices Using Cisco Discovery Protocol Configure and verify LLDP Disconvery 6: Configure and verify layer 2 discovery protocols Implement an initial router configuration 11 – EXPLORING THE PACKET DELIVERY PROCESS Layer 2 addressing Layer 3 addressing Default gateways Address resolution protocol Discover 7: Configure default gateway Host-to-host packet delivery Discovery 8: Explore packet forwarding 12 – TROUBLESHOOTING A SIMPLE NETWORK Troubleshooting methods Troubleshooting tools Troubleshooting common switch media issues Troubleshooting common switch port issues Discovery 9: Troubleshoot switch media and port issues Discovery 10: Troubleshoot port duplex issues Troubleshooting common problems associated with IPv4 addressing 13 – INTRODUCING BASIC IPV6 IPv4 address exhaustion workarounds IPv6 features IPv6 addresses and address types Comparison of IPv4 and IPv6 header Internet control message protocol version 6 Neighbor discovery IPv6 address allocation Discovery 11: Configure basic IPv6 conncetivity Verification of end-to-end IPv6 connectivity 14 – CONFIGURING STATIC ROUTING Routing Operation Static and dynamic routing comparison When to use static routing IPv4 static route configuration Default routes Verifying static and default route configuration Discovery 12: Configure and verify IPv4 static routes Configuring IPv6 static routes Discovery 13: Configure IPv6 static routes Implement IPv4 static routing Implement IPv6 static routing 15 – IMPLEMENTING VLANS AND TRUNKS VLAN Introduction Creating a VLAN Assigning a port to a VLAN Trunking with 802.1Q Configuring an 802.1Q trunk Discovery 14: Configure VLAN and trunk VLAN design considerations Troubleshoot VLANs and trunk 16 – ROUTING BETWEEN VLANS Purpose of Inter-VLAN routing Options for the Inter-VLAN routing Discovery 15: Configure a router on a stick Implement multiple VLANs and basic routing between the VLANs 17 – INTRODUCING OSPF Dynamic routing protocols Path selection Link-State routing protocol overview Link-State routing protocol data structures Introducing OSPF Establishing OSPF neighbor adjacencies OSPF neighbor states SPF algorithm Building a Link-State database Discovery 16: Configure and verify single-area OSPF Routing for IPv6 18 – BUILDING REDUNDANT SWITCHED TOPOLOGIES (SELF-STUDY) Physical redundancy in a LAN Issues in redundant topologies Spanning tree operation Types of spanning tree protocols PortFast and BPDU guard Rapid spanning tree protocol 19 – IMPROVING REDUNDANT SWITCHED TOPOLOGIES WITH ETHERCHANNEL EtherChannel overview EtherChannel configuration options Configuring and verifying EtherChannel Discovery 17: Configure and verify EtherChannel Improve redundant switched topologies with EtherChannel 20 – EXPLORING LAYER 3 REDUNDANCY (SELF-STUDY) Need for default gateway redundancy Understanding FHRP Understanding HSRP 21 – INTRODUCING WAN TECHNOLOGIES (SELF-STUDY) Introduction to WAN technologies WAN devices and demarcation point WAN topology options WAN connectivity options Virtual private networks Enterprise-manged VPNs Provider-managed VPNs 22 – EXPLAINING BASICS OF ACL ACL overview ACL operation ACL wildcard masking Wildcard mask abbreviations Types of basic ACLs Configuring standard IPv4 ACLs Configuring extended IPv4 ACLs Verifying and modifying IPv4 ACLs Applying IPv4 ACLs to filter network traffic Discovery 18: Configure and verify IPv4 ACLs Implement numbered and named IPv4 ACLs 23 – ENABLING INTERNET CONNECTIVITY Discovery 19: Configure a provider-assigned IPv4 address Introducing network address translation NAT terminology and translation mechanisms Benefits and drawbacks of NAT Static NAT and port forwarding Dynamic NAT Port address translation Configuring and verifying inside IPv4 NAT Discovery 20: Configure static NAT Discovery 21: Configure dynamic NAT and PAT Implement PAT 24 – INTRODUCING QOS (SELF-STUDY) Converged networks Quality of service defined QoS policy QoS mechanisms QoS models Deploying end-to-end QoS 25 – EXPLAINING WIRELESS FUNDAMENTALS (SELF-STUDY) Wireless technologies WLAN architechtures WiFi channels AP and WLC management Discovery 22: Log into the WLC Discovery 23: Monitor the WLC Discovery 24: Configure a dynamic (VLAN) interface Discovery 25: Configure a DHCP scope Discovery 26: Configure a WLAN Discovery 27: Define a RADIUS server Discovery 28: Explore management options 26 – INTRODUCING ARCHITECTURES AND VIRTUALIZATION (SELF-STUDY) Introduction to network design Enterprise three-tier hierarchical network design Spine-leaf network design Cisco enterprise architecture model Cloud computing overview Network device architecture Virtualization fundamentals 27 – EXPLAINING THE EVOLUTION OF INTELLIGENT NETWORKS Overview of network programmability in enterprise networks Software-defined networking Common programmability protocols and methods Configuration management tools Introducing Cisco DNA center Discovery 29: Explore the Cisco DNA center Introducing Cisco SD-Access Introducing Cisco SD-WAN 28 – INTRODUCING SYSTEM MONITORING Introducing Syslog Syslog message format SNMP overview Enabling network time protocol Discovery 30: Configure and verify NTP Configure system message logging 29 – MANAGING CISCO DEVICES Cisco IOS intergrated file system adn devices Stages of the router power-on boot sequence Loading and managing system images files Loading Cisco IOS configuration files Validating Cisco IOS images using MD5 Managing Cisco IOS images and device configuration files Discovery 31: Create the Cisco IOS impage backup Discovery 32: Upgrade Cisco IOS image 30 – EXAMINING THE SECURITY THREAT LANDSCAPE (SELF-STUDY) Security threat landscape overview Malware Hacking tools Denial of service and distributed denial of service Spoofing Reflection and amplification attacks Social engineering Evolution of Phishing Password attacks Reconnaissance attacks Buffer overflow attacks Man-in-the-middle attacks Vectors of data loss and exfiltration Other considerations 31 – IMPLEMENTING THREAT DEFENSE TECHNOLOGIES (SELF-STUDY) Information security overview Firewalls Intrusion prevention systems Protection against data loss and phishing attacks Defending against DoS and DDoS attacks Introduction to cryptographic technologies IPsec security services Seccure sockets Layer and transport layer securiy Wireless security protocols Discover 33: Configure WLAN using WPA2 PSK using the GUI 32 – SECURING ADMINISTRATIVE ACCESS Network device security overview Securing access to privileged EXEC mode Securing console access Securing remote access Discover 34: Secure console and remote access Configuring the login banner Limiting remote access with ACLs Discovery 35: Enable and limit remote access connectivity External authentication options Secure device administrative access 33 – IMPLEMENTING DEVICE HARDENING Securing unused ports Infrastructure ACL Disabling unused services Port security Discovery 36: Configure and verify port security Mitigating VLAN attacks DHCP snooping Dynamic ARP inspection Mitigation STP attacks Implement device hardening The self-study material can be done at your own pace after the instructor-led portion of the course. Course Description
Learning Objectives
Course Outline
Thank you for reading this post, don't forget to subscribe!