• Post category:StudyBullet-13
  • Reading time:16 mins read


A complete course which covers all the exam topics of CCNA 200-301. It includes 18 Hours of Theory and 9 Hours of Lab.

What you will learn

This course covers all exam topics of the CCNA 200-301 Exam and will enable you to pass the exam. It includes all learning notes and hands-on Lab Manuals.

Become confident in Network & Security Fundamentals, Routing, Switching, wireless Technology, IP services, Network Automation & programmability

To setup, configure and troubleshoot real networks in packet tracer and GNS3 tool. Also, learn how real-world network works

Learn different career options in the networking field, what kind of jobs you can take, and why you must pursue your career in this field?

This course will make you from ZERO to HERO in the networking field

It will give you WINGS to FLY HIGH and take your career to the next level

Description

Learn CCNA from a Triple CCIE (R&S, Security, SP) certified instructor in just 28+ Hours. The instructor has 15 years of extensive experience in the network industry. It is an engaging course which include animations on several important topics, infographic slides and extensive lab practice.

The course is divided into six different chapters as follows:

1.    Network Fundamentals

2.    Network Access

3.    IP Connectivity

4.    IP Services

5.    Security Fundamentals

6.    Automation and Programmability


Get Instant Notification of New Courses on our Telegram channel.


In “Network fundamentals” chapter, we have covered History of Networking Standards,TCP/IP, OSI, Transport Layer, TCP & UDP, Multiplexing, Virtualization, Cloud Computing, Cabling types, IPv4 & IPv6 addressing, IPv4 subnetting, Default Gateway.

In “Network Access” chapter, we have covered Switching technology, Wireless technology, and Cisco WLAN deployments.

In “IP Connectivity” chapter, we have covered IP routing process, static and dynamic routing, and FHRP protocols.

In “IP Services” chapter, we have covered DNS, NAT, DHCP, SNMP, FTP, TFTP, and QOS.

“Security fundaments” chapter is composed of security terminologies, different types of attacks & vulnerabilities, AAA, TACACS+, RADIUS, Security program, Internet VPN, ACLs, standard and extended ACL.

“Automation & programmability” chapter is comprised of Types of planes, controllers, SDN, NBI, SBI, APIC, ACI, Cisco SDA, Rest API, Software CRUD actions, HTTP verbs, URI, DATA Serialization, JSON, traditional configuration model versus centralized configuration model, ANSIBLE, PUPPET, and CHEF.

So, are you ready to Jumpstart your career in networking?

English
language

Content

Introduction

Instructor’s profile, why it is the best course, Exam topics, & Course Duration
What is your REASON to study CCNA?
What is CCNA, who is CISCO, why to follow cisco learning program
What Jobs you can take as a Network Engineer?

Chapter 1: Network Fundamentals

History of Networking Standards
What is TCP/IP?
Comparing OSI and TCP/IP Models
TCP/IP Transport Layer
Compare TCP to UDP
Multiplexing using port numbers
TCP connection establishment and termination
Server Virtualization
Cloud Computing Services
Ethernet cable & Fiber optic cable
Understanding Binary, Decimal, and Hexadecimal numbers
What is an IP Address?
Understanding Network Addressing and its different classes
Private IP addresses (RFC 1918), Layer 2 & 3 Broadcast, Subnet Mask, and CIDR
Understanding IPv4 Subnetting Rules with help of Class C Network Address Example
IPv4 Subnetting using Class B addresses
IPv4 Subnetting using Class A addresses
Understanding Unicast, Broadcast, Multicast and IPv4 address types
What is an IPv6 Address?
IPv6 address expression, IPv6 address types, and IPv6 global routing prefix
IPv6 Global Routing Prefix & IPv6 Subnetting
How IPv6 Addressing works? Manual, Stateless & Stateful Auto-Configuration
What is Anycast Address? And how does it work?
IP Parameters for a Client OS: IP, Subnet Mask, Default Gateway, DNS
Verify IP parameters for Client OS (Windows, Mac OS, Linux)

Chapter 2: Network Access

Introduction
Understanding Collision Domain and Broadcast Domain
Understanding Different Types of Network Devices
What is a HUB device? How does it work?
What is a Switch? Understanding Layer 2 Switching & unknown unicast flooding
What is a Bridge Device? How does it work?
Half Duplex and Full Duplex Ethernet
What is a VLAN? How does it work?
Understanding Switch Port Types: Access, Voice Access, Trunk
What is a TRUNK port? How does it work?
Understanding Native VLAN, Untagged frames, ISL, 802.1Q, VTP
Understanding INTER-VLAN routing and its different scenarios
Cisco Packet Tracer: Introduction and Setup
LAB1: Configure and verify initial switch configuration including remote access
LAB2: Verify network status and switch operation using basic utilities
LAB3: Configure speed, duplex, and description
LAB4: Configure, verify, and troubleshoot VLANs (Normal/Extended)
LAB5: Configure, verify, and troubleshoot Inter-Switch connectivity
LAB5A: Configure Inter-VLAN routing – Scenario 1
LAB5B: Configure Inter-VLAN routing – Scenario 2
LAB5C: Configure Inter-VLAN routing – Scenario 3
Spanning Tree Protocol (STP)
Spanning Tree Terminologies
Spanning Tree Port Roles
Spanning Tree Port Stages
Understanding Convergence
Spanning Tree Link cost
Spanning Tree protocol Operation
Spanning Tree Protocol Animation
Types of Spanning Tree Protocols
LAB6: Spanning tree & toolkit configuration
LAB7: Configure and verify layer 2 protocols (CDP,LLDP)
Understanding EtherChannel
LAB8: Configure, verify, and troubleshoot L2/L3 EtherChannel
Understanding Power Over Ethernet (POE), Terminology and operation
Campus LAN topologies and design terminologies
Understanding Wireless Technology
Understanding Wireless Access point (AP)
Understanding Other Wireless Topologies
Understanding Radio Frequency (RF), Wireless Band, and channels
Access Point and Wireless Standards
Securing a Wireless Connection
Understanding Wireless Authentication methods
Understanding EAP and its authentication methods
Understanding TKIP (Temporal Key Integrity Protocol)
Understanding CCMP & GCMP
Understanding WPA, WPA2, and WPA3
Understanding Different Types of Access Points
Understanding Light Weight AP(Access-point) and WLC (Wireless LAN Controller)
Understanding Cloud Based AP Architecture and Securing WLAN
Scaling AP (Access point) and WLC (Wireless LAN Controller)
Understanding Cisco WLAN Deployments options
Understanding Cisco Light-Weight AP(Access-Point) modes

3. IP Connectivity

Router – What is it and how it works?
Longest Match Rule
IP Routing Process
Cisco Router Internal Process
Routing Table
Routing Protocol Basics
Types of Routing
Static Routing
Default Route
GNS3: Introduction and setup guide
GNS3: Setting up Lab Topology
LAB 1: Network Topology Setup with Initial configuration
LAB 2: Static and Default Routing
Dynamic Routing
OSPF Introduction, Areas, OSPF Routers
OSPF Terminologies
OSPF Network Types
OSPF Operation
OSPF Metric
OSPF: Single Area vs Multi Area
OSPF Adjacency requirements
OSPF: How to Memorize it?
LAB 3: Enabling OSPF
LAB 4: Configure single area OSPF version 2
FHRP (First Hop Redundancy Protocols)
HSRP (Hot Standby Router Protocol)
LAB 5: IPv6 Topology setup with Initial configuration
LAB 6: IPv6 static routing

4. IP Services

DNS: What is it and how it works?
NAT (Network Address Translation) – Introduction, types, terminology
NAT: How does it work?
LAB 1: STATIC NAT
LAB 2: Dynamic NAT
LAB 3: NAT Overload (PAT)
LAB 4: NTP
DHCP: What is it and how it works?
LAB 5: DHCP
LAB 6: DHCP Relay
SNMP: What is it and how it works?
Securing SNMP
Understanding FTP Protocol, FTP Server, Client, and connection process
FTP connection types and modes
Understanding TFTP
QOS: Overview and why we need it?
QOS: How it manages network traffic
Understanding different types of network traffic and their QoS requirements
QOS tools
QOS: Classification & Marking tool, Queuing tools
QOS Marking: IPP, DSCP, COS, and marking fields
QOS Marking: Understanding EF, AF, and CS markings
QOS: Congestion Managment(Queuing), Round Robin Scheduling(Prioritization), LLQ
QOS: Shaping and policing
QOS: Trust Boundaries
QOS: Prioritization strategy for Data, Voice, and Video

5. Security Fundamentals

Understanding Security Terminologies
Address spoofing attacks
Denial of Service (DOS) attack
Reflection and Amplification attack
Review: TCP/IP and ARP
Man in the Middle attack
Reconnaissance attacks, Buffer overflow attacks, and Malware
Human Vulnerabilities
Password Vulnerabilities and Password alternatives
AAA, TACACS+, and RADIUS
Developing a security program
Internet VPN and its types
LAB 1: Switchport security
LAB 2: SSH
ACL(Access-lists)
Types of Access-list, Inbound and outbound ACL
ACL implementation guidelines
Standard Access-List
Wild Card Mask
LAB 3: Standard Access-list
LAB 4: Standard Access-list
LAB 5: Controlling VTY(Telnet/SSH) access
Extended Access-list
LAB 6: Extended ACL
Named Access-list
LAB 7: Named Standard Access-list
LAB 8: Named Extended Access-list

6. Network Automation & Programmability

Data Plane, Control Plane, and Managment Plane
Controllers, Software Defined Architecture, NBI, and SBI
Network programmability and SDN solutions
Cisco Application Centric Infrastructure (APIC)
ACI Operating Model with Intent Based Networking
Cisco APIC Enterprise Model
Comparing Traditional vs controller-based networks
Cisco SDA (Software Defined Access) and DNA (digital network architecture)
Cisco SDA – Underlay
Cisco SDA underlay roles and SDA overlay
Cisco SDA – IP Address usage
Revisiting Layer 2 switching, Layer 3 routing & forwarding process
Understanding SDA forwarding
Cisco DNA center & SDA Security
Traditional network management platform vs DNA center
REST API
Data & Variables
REST API & HTTP, Software CRUD actions and HTTP verbs
HTTP verbs and URI
DATA Serialization
Understanding JSON
Per device (Traditional) configuration model vs Centralized configuration model
Configuration provisioning, templates and variables, management tools & Files
ANSIBLE, PUPPET, and CHEF