CCNA Course Content

    1.Describe how a network works

    • Describe the purpose and functions of various network devices
    • Select the components required to meet a network specification
    • Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network
    • Describe common networked applications including web applications
    • Describe the purpose and basic operation of the protocols in the OSI and TCP models
    • Describe the impact of applications (Voice Over IP and Video Over IP) on a network
    • Interpret network diagrams
    • Determine the path between two hosts across a network
    • Describe the components required for network and Internet communications
    • Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach
    • Differentiate between LAN/WAN operation and features

    2.Configure, verify and troubleshoot a switch with VLANs and inter switch communications

    • Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts
    • Explain the technology and media access control method for Ethernet networks
    • Explain network segmentation and basic traffic management concepts
    • Explain basic switching concepts and the operation of Cisco switches
    • Perform and verify initial switch configuration tasks including remote access management
    • Verify network status and switch operation using basic utilities (including: ping, traceroute, telnet, SSH, arp, ipconfig), SHOW & DEBUG commands
    • Describe enhanced switching technologies (including: VTP, RSTP, VLAN, PVSTP, 802.1q)
    • Describe how VLANs create logically separate networks and the need for routing between them
    • Configure, verify, and troubleshoot VLANs, trunking, InterVLAN, VTP, RSTP
    • Implement basic switch security (including: port security, trunk access, management vlan other than vlan1, etc.)

    3.Implement an IP addressing scheme and IP Services to meet network requirements in a medium-size Enterprise branch office network

    • Describe the operation and benefits of using private and public IP addressing
    • Explain the operation and benefits of using DHCP and DNS
    • Calculate and apply an addressing scheme including VLSM IP addressing design to a network
    • Determine the appropriate classless addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment
    • Describe the technological requirements for running IPv6 in conjunction with IPv4 (including: protocols, dual stack, tunneling, etc).
    • Identify and correct common problems associated with IP addressing and host configurations

    4.Configure, verify, and troubleshoot basic router operation and routing on Cisco devices

    • Describe basic routing concepts (including: packet forwarding, router lookup process)
    • Describe the operation of Cisco routers (including: router boot up process, POST, router components)
    • Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts
    • Configure, verify, and troubleshoot RIPv2, OSPF, EIGRP
    • Access and utilize the router to set basic parameters.(including: CLI/SDM)
    • Connect, configure, and verify operation status of a device interface
    • Verify device configuration and network connectivity using ping, traceroute, telnet, SSH or other utilities
    • Perform and verify routing configuration tasks for a static or default route given specific routing requirements
    • Manage IOS configuration files. (including: save, edit, upgrade, restore)
    • Compare and contrast methods of routing and routing protocols
    • Troubleshoot routing issues
    • Verify router hardware and software operation using SHOW & DEBUG commands.
    • Implement basic router security

    5.Identify security threats to a network and describe general methods to mitigate those threats

    • Describe today’s increasing network security threats and explain the need to implement a comprehensive security policy to mitigate the threats
    • Explain general methods to mitigate common security threats to network devices, hosts, and applications
    • Describe the functions of common security appliances and applications
    • Describe security recommended practices including initial steps to secure network devices

    6.Implement, verify, and troubleshoot NAT and ACLs in a medium-size Enterprise branch office network

    • Describe the purpose and types of ACLs
    • Configure and apply ACLs based on network filtering requirements.(including: CLI/SDM)
    • Configure and apply an ACLs to limit telnet and SSH access to the router using (including: SDM/CLI)
    • Verify and monitor ACLs in a network environment
    • Troubleshoot ACL issues
    • Explain the basic operation of NAT
    • Configure NAT for given network requirements using (including: CLI/SDM)
    • Troubleshoot NAT issues

    7.Implement and verify WAN links

    • Describe different methods for connecting to a WAN
    • Configure and verify a basic WAN serial connection
    • Configure and verify Frame Relay on Cisco routers
    • Troubleshoot WAN implementation issues
    • Describe VPN technology (including: importance, benefits, role, impact, components)
    • Configure and verify a PPP connection between Cisco routers

    Write a Review

    Your email address will not be published. Required fields are marked *

    Course Reviews


    • 5 stars0
    • 4 stars0
    • 3 stars0
    • 2 stars0
    • 1 stars0

    No Reviews found for this course.

    • 1 month
    Contact Us

    +1 475-212-0075

    Drop us a query

    Error: Contact form not found.

    Job Support

    Error: Contact form not found.

    Course Features

    Live Instructor-led Classes

    This isn't canned learning. Its dynamic, its interactive, its effective

    Expert Educators

    Only the best or they're out. We are constantly evaluating our trainers

    24&7 Support

    We never sleep. Need something answered at 3 am? No Problem

    Flexible Schedule

    You don't learn as per our calendar. We work according to yours.

    Customized Training's

    The most part self-managed and adaptable to suit a person's particular adapting technology needs

    Priority Based Training's

    Real-time Scenario based Assignments and Case Studies