Cisco Certified Network Associate (CCNA) Course
Cisco Certified Network Associate (CCNA) Course
-
Networking Fundamentals 0/13
-
Lecture 1.1Explain the role and function of network components
-
Lecture 1.2Describe characteristics of network topology architectures
-
Lecture 1.3Compare physical interface and cabling types
-
Lecture 1.4Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)
-
Lecture 1.5Compare TCP to UDP
-
Lecture 1.6Configure and verify IPv4 addressing and subnetting
-
Lecture 1.7Describe the need for private IPv4 addressing
-
Lecture 1.8Configure and verify IPv6 addressing and prefix
-
Lecture 1.9Compare IPv6 address types
-
Lecture 1.10Verify IP parameters for Client OS (Windows, Mac OS, Linux)
-
Lecture 1.11Describe wireless principles
-
Lecture 1.12Explain virtualization fundamentals (virtual machines)
-
Lecture 1.13Describe switching concepts
-
-
Network Access 0/9
-
Lecture 2.1Configure and verify VLANs (normal range) spanning multiple switches
-
Lecture 2.2Configure and verify interswitch connectivity
-
Lecture 2.3Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)
-
Lecture 2.4Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)
-
Lecture 2.5Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol and identify basic operations
-
Lecture 2.6Compare Cisco Wireless Architectures and AP modes
-
Lecture 2.7Describe physical infrastructure connections of WLAN components (AP, WLC, access/trunk ports, and LAG
-
Lecture 2.8Describe AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, console, and TACACS+/RADIUS)
-
Lecture 2.9Configure the components of a wireless LAN access for client connectivity using GUI onlysuch as WLAN creation, security settings, QoS profiles, and advanced WLAN settings
-
-
IP Connectivity 0/5
-
Lecture 3.1Interpret the components of routing table
-
Lecture 3.2Determine how a router makes a forwarding decision by default
-
Lecture 3.3Configure and verify IPv4 and IPv6 static routing
-
Lecture 3.4Configure and verify single area OSPFv2
-
Lecture 3.5Describe the purpose of first hop redundancy protocol
-
-
IP Services 0/9
-
Lecture 4.1Configure and verify inside source NAT using static and pools
-
Lecture 4.2Configure and verify NTP operating in a client and server mode
-
Lecture 4.3Explain the role of DHCP and DNS within the network
-
Lecture 4.4Explain the function of SNMP in network operations
-
Lecture 4.5Describe the use of syslog features including facilities and levels
-
Lecture 4.6Configure and verify DHCP client and relay
-
Lecture 4.7Explain the forwarding per-hop behavior (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping
-
Lecture 4.8Configure network devices for remote access using SSH
-
Lecture 4.9Describe the capabilities and function of TFTP/FTP in the network
-
-
Security Fundamentals 0/10
-
Lecture 5.1Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)
-
Lecture 5.2Describe security program elements (user awareness, training, and physical access control)
-
Lecture 5.3Configure device access control using local passwords
-
Lecture 5.4Describe security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics)
-
Lecture 5.5Describe remote access and site-to-site VPNs
-
Lecture 5.6Configure and verify access control lists
-
Lecture 5.7Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security)
-
Lecture 5.8Differentiate authentication, authorization, and accounting concepts
-
Lecture 5.9Describe wireless security protocols (WPA, WPA2, and WPA3)
-
Lecture 5.10Configure WLAN using WPA2 PSK using the GUI
-
-
Automation and Programmability 0/7
-
Lecture 6.1Explain how automation impacts network management
-
Lecture 6.2Compare traditional networks with controller-based networking
-
Lecture 6.3Describe controller-based and software defined architectures (overlay, underlay, and fabric)
-
Lecture 6.4Compare traditional campus device management with Cisco DNA Center enabled device management
-
Lecture 6.5Describe characteristics of REST-based APIs (CRUD, HTTP verbs, and data encoding
-
Lecture 6.6Recognize the capabilities of configuration management mechanisms Puppet, Chef, and Ansible
-
Lecture 6.7Interpret JSON encoded data
-
This content is protected, please login and enroll course to view this content!
Describe characteristics of network topology architectures
Next