ICC Teleservices Ltd
Your Trusted ICT Partner

Cisco Certified Network Associate (CCNA) Training from ICC Teleservices

Duration 92(Hrs)

Buy Now

COURSE OUTLINE

1 - EXPLORING THE FUNCTIONS OF NETWORKING
  • What is a computer network?
  • Components of a network
  • Characteristics of a network
  • Physical vs. Logical Topologies
  • Interpreting a network diagram
  • Impact of user applications on the network
2 - INTRODUCING THE HOST-TO-HOST COMMUNICATIONS MODEL
  • Host-to-host communications overview
  • ISO OSI reference model
  • TCP/IP protocol Suite
  • Peer-to-peer communications
  • Encapsulation and de-encapsulation
  • TCP/IP stack vs OSI reference model
3 - OPERATING CISCO IOS SOFTWARE
  • Cisco IOS software features and functions
  • Cisco IOS software CLI functions
  • Cisco IOS software models
  • Discovery 1: Get started with Cisco CLI
4 - INTRODUCING LANS
  • Local area networks
  • LAN components
  • Need for switches
  • Characteristics and features of switches
5 - EXPLORING THE TCP/IP LINK LAYER
  • Ehernet LAN connection media
  • Ethernet frame structure
  • LAN communication types
  • MAC addresses
  • Frame switching
  • Discovery 2: Observe how a switch operate
  • Duplex communication
6 - STARTING A SWITCH
  • Switch installation
  • Connecting to a console port
  • Switch LED indicators
  • Basic show commands and information
  • Discovery 3: Perform basic switch configuration
  • Implement the initial switch configuration
7 - INTRODUCING THE TCP/IP INTERNET LAYER, IPV4 ADDRESSING, AND SUBNETS
  • Internet protocol
  • Decimal and binary number systems
  • Binary-to-decimal conversion
  • Decimal-to-binary conversion
  • IPv4 address representation
  • IPv4 header fields
  • IPv4 address classes
  • Subnet masks
  • Subnets
  • Implementing subnetting: Bowwing bits
  • Implementing subnetting: Determining the addressing scheme
  • Benefits of VLSM and Implementing VLSM
  • Private vs. Public IPv4 addresses
  • Reserved IPv4 addresses
  • Verifying IPv4 address of a host
8 - EXPLAINING THE TCP/IP TRANSPORT LAYER AND APPLICATION LAYER
  • TCP/IP transport layer functions
  • Reliable vs. Best-effort transport
  • TCP characteristics
  • UDP characteristics
  • TCP/IP application layer
  • Introducing HTTP
  • Domain name system
  • Explaining DHCP for IPv4
  • Discovery 4: Inspect TCP/IP applications
9 - EXPLORING THE FUNCTIONS OF ROUTING
  • Role of a router
  • Router components
  • Router functions
  • Routing table
  • Path determination
10 - CONFIGURING A CISCO ROUTER
  • Initial router setup
  • Configuring router interfaces
  • Configuring IPv4 addresses on router interfaces
  • Checking interface configuration and status
  • Discovery 5: Configure an interface on a Cisco router
  • Exploring connected devices
  • Using Cisco Discovery Protocol
  • Configure and verify LLDP
  • Disconvery 6: Configure and verify layer 2 discovery protocols
  • Implement an initial router configuration
11 - EXPLORING THE PACKET DELIVERY PROCESS
  • Layer 2 addressing
  • Layer 3 addressing
  • Default gateways
  • Address resolution protocol
  • Discover 7: Configure default gateway
  • Host-to-host packet delivery
  • Discovery 8: Explore packet forwarding
12 - TROUBLESHOOTING A SIMPLE NETWORK
  • Troubleshooting methods
  • Troubleshooting tools
  • Troubleshooting common switch media issues
  • Troubleshooting common switch port issues
  • Discovery 9: Troubleshoot switch media and port issues
  • Discovery 10: Troubleshoot port duplex issues
  • Troubleshooting common problems associated with IPv4 addressing
13 - INTRODUCING BASIC IPV6
  • IPv4 address exhaustion workarounds
  • IPv6 features
  • IPv6 addresses and address types
  • Comparison of IPv4 and IPv6 header
  • Internet control message protocol version 6
  • Neighbor discovery
  • IPv6 address allocation
  • Discovery 11: Configure basic IPv6 conncetivity
  • Verification of end-to-end IPv6 connectivity
14 - CONFIGURING STATIC ROUTING
  • Routing Operation
  • Static and dynamic routing comparison
  • When to use static routing
  • IPv4 static route configuration
  • Default routes
  • Verifying static and default route configuration
  • Discovery 12: Configure and verify IPv4 static routes
  • Configuring IPv6 static routes
  • Discovery 13: Configure IPv6 static routes
  • Implement IPv4 static routing
  • Implement IPv6 static routing
15 - IMPLEMENTING VLANS AND TRUNKS
  • VLAN Introduction
  • Creating a VLAN
  • Assigning a port to a VLAN
  • Trunking with 802.1Q
  • Configuring an 802.1Q trunk
  • Discovery 14: Configure VLAN and trunk
  • VLAN design considerations
  • Troubleshoot VLANs and trunk
16 - ROUTING BETWEEN VLANS
  • Purpose of Inter-VLAN routing
  • Options for the Inter-VLAN routing
  • Discovery 15: Configure a router on a stick
  • Implement multiple VLANs and basic routing between the VLANs
17 - INTRODUCING OSPF
  • Dynamic routing protocols
  • Path selection
  • Link-State routing protocol overview
  • Link-State routing protocol data structures
  • Introducing OSPF
  • Establishing OSPF neighbor adjacencies
  • OSPF neighbor states
  • SPF algorithm
  • Building a Link-State database
  • Discovery 16: Configure and verify single-area OSPF
  • Routing for IPv6
18 - BUILDING REDUNDANT SWITCHED TOPOLOGIES (SELF-STUDY)
  • Physical redundancy in a LAN
  • Issues in redundant topologies
  • Spanning tree operation
  • Types of spanning tree protocols
  • PortFast and BPDU guard
  • Rapid spanning tree protocol
19 - IMPROVING REDUNDANT SWITCHED TOPOLOGIES WITH ETHERCHANNEL
  • EtherChannel overview
  • EtherChannel configuration options
  • Configuring and verifying EtherChannel
  • Discovery 17: Configure and verify EtherChannel
  • Improve redundant switched topologies with EtherChannel
20 - EXPLORING LAYER 3 REDUNDANCY (SELF-STUDY)
  • Need for default gateway redundancy
  • Understanding FHRP
  • Understanding HSRP
21 - INTRODUCING WAN TECHNOLOGIES (SELF-STUDY)
  • Introduction to WAN technologies
  • WAN devices and demarcation point
  • WAN topology options
  • WAN connectivity options
  • Virtual private networks
  • Enterprise-manged VPNs
  • Provider-managed VPNs
22 - EXPLAINING BASICS OF ACL
  • ACL overview
  • ACL operation
  • ACL wildcard masking
  • Wildcard mask abbreviations
  • Types of basic ACLs
  • Configuring standard IPv4 ACLs
  • Configuring extended IPv4 ACLs
  • Verifying and modifying IPv4 ACLs
  • Applying IPv4 ACLs to filter network traffic
  • Discovery 18: Configure and verify IPv4 ACLs
  • Implement numbered and named IPv4 ACLs
23 - ENABLING INTERNET CONNECTIVITY
  • Discovery 19: Configure a provider-assigned IPv4 address
  • Introducing network address translation
  • NAT terminology and translation mechanisms
  • Benefits and drawbacks of NAT
  • Static NAT and port forwarding
  • Dynamic NAT
  • Port address translation
  • Configuring and verifying inside IPv4 NAT
  • Discovery 20: Configure static NAT
  • Discovery 21: Configure dynamic NAT and PAT
  • Implement PAT
24 - INTRODUCING QOS (SELF-STUDY)
  • Converged networks
  • Quality of service defined
  • QoS policy
  • QoS mechanisms
  • QoS models
  • Deploying end-to-end QoS
25 - EXPLAINING WIRELESS FUNDAMENTALS (SELF-STUDY)
  • Wireless technologies
  • WLAN architechtures
  • WiFi channels
  • AP and WLC management
  • Discovery 22: Log into the WLC
  • Discovery 23: Monitor the WLC
  • Discovery 24: Configure a dynamic (VLAN) interface
  • Discovery 25: Configure a DHCP scope
  • Discovery 26: Configure a WLAN
  • Discovery 27: Define a RADIUS server
  • Discovery 28: Explore management options
26 - INTRODUCING ARCHITECTURES AND VIRTUALIZATION (SELF-STUDY)
  • Introduction to network design
  • Enterprise three-tier hierarchical network design
  • Spine-leaf network design
  • Cisco enterprise architecture model
  • Cloud computing overview
  • Network device architecture
  • Virtualization fundamentals
27 - EXPLAINING THE EVOLUTION OF INTELLIGENT NETWORKS
  • Overview of network programmability in enterprise networks
  • Software-defined networking
  • Common programmability protocols and methods
  • Configuration management tools
  • Introducing Cisco DNA center
  • Discovery 29: Explore the Cisco DNA center
  • Introducing Cisco SD-Access
  • Introducing Cisco SD-WAN
28 - INTRODUCING SYSTEM MONITORING
  • Introducing Syslog
  • Syslog message format
  • SNMP overview
  • Enabling network time protocol
  • Discovery 30: Configure and verify NTP
  • Configure system message logging
29 - MANAGING CISCO DEVICES
  • Cisco IOS intergrated file system adn devices
  • Stages of the router power-on boot sequence
  • Loading and managing system images files
  • Loading Cisco IOS configuration files
  • Validating Cisco IOS images using MD5
  • Managing Cisco IOS images and device configuration files
  • Discovery 31: Create the Cisco IOS impage backup
  • Discovery 32: Upgrade Cisco IOS image
30 - EXAMINING THE SECURITY THREAT LANDSCAPE (SELF-STUDY)
  • Security threat landscape overview
  • Malware
  • Hacking tools
  • Denial of service and distributed denial of service
  • Spoofing
  • Reflection and amplification attacks
  • Social engineering
  • Evolution of Phishing
  • Password attacks
  • Reconnaissance attacks
  • Buffer overflow attacks
  • Man-in-the-middle attacks
  • Vectors of data loss and exfiltration
  • Other considerations
31 - IMPLEMENTING THREAT DEFENSE TECHNOLOGIES (SELF-STUDY)
  • Information security overview
  • Firewalls
  • Intrusion prevention systems
  • Protection against data loss and phishing attacks
  • Defending against DoS and DDoS attacks
  • Introduction to cryptographic technologies
  • IPsec security services
  • Seccure sockets Layer and transport layer securiy
  • Wireless security protocols
  • Discover 33: Configure WLAN using WPA2 PSK using the GUI
32 - SECURING ADMINISTRATIVE ACCESS
  • Network device security overview
  • Securing access to privileged EXEC mode
  • Securing console access
  • Securing remote access
  • Discover 34: Secure console and remote access
  • Configuring the login banner
  • Limiting remote access with ACLs
  • Discovery 35: Enable and limit remote access connectivity
  • External authentication options
  • Secure device administrative access
33 - IMPLEMENTING DEVICE HARDENING
  • Securing unused ports
  • Infrastructure ACL
  • Disabling unused services
  • Port security
  • Discovery 36: Configure and verify port security
  • Mitigating VLAN attacks
  • DHCP snooping
  • Dynamic ARP inspection
  • Mitigation STP attacks
  • Implement device hardening
  • The self-study material can be done at your own pace after the instructor-led portion of the course.

OUR PARTNER