CCNA: Cisco Certified Network Associate (CCNA 200-301) Training

BY
Infosec Train

Prepare for the CCNA exam and learn in a practically driven environment by joining CCNA: Cisco Certified Network Associate program by Infosec Train.

Mode

Online

Quick Facts

particular details
Medium of instructions English
Mode of learning Virtual Classroom
Mode of Delivery Video Based

Course overview

The CCNA: Cisco Certified Network Associate Training aims to update the technical skills and knowledge of professionals as per the continuously growing and evolving IT landscape. The programme thoroughly covers the CCNA exam topics and provides an opportunity to learn relevant skills in a hands-on training environment. 

Moreover, the CCNA: Cisco Certified Network Associate certification course will allow you to learn from highly skilled trainers and earn the industry-recognised certificate in your first attempt. The accreditation is a stepping stone for professionals willing to make a career in IT technology or computer networking. The CCNA programme is a well-curated course that covers a wide range of fundamentals required in IT careers. 

By acquiring the CCNA: Cisco Certified Network Associate certification, you will gain a deep insight into networking technologies and the necessary skills required to land the in-demand IT jobs in the current market. Hence, this is the perfect launchpad for landing in-demand IT jobs across industry verticals.

The highlights

  • Industry-recognised certificate
  • Blended learning delivery model
  • Get certified by highly trained experts
  • Certification at an affordable rate
  • 24/7 technical support
  • Earn a training certificate
  • Access to recorded lessons

Program offerings

  • Blended learning delivery model
  • 24/7 technical support
  • Access to recorded lessons
  • Highly-skilled and certified trainers
  • Certification at an affordable rate
  • Practical training
  • Industry-recognised certificate

Course and certificate fees

certificate availability

Yes

certificate providing authority

Infosec Train

Who it is for

The CCNA: Cisco Certified Network Associate online training will be suitable for:

  • Network Support Engineers
  • Network Security Operators
  • System Administrators
  • Network Security Specialist
  • Anyone who wants to build a career in Network Security

Eligibility criteria

It is best if you have a basic understanding of IP addressing and Network fundamentals before joining the CCNA: Cisco Certified Network Associate programme.

You must qualify in a certification exam with a passing score of 849 out of 1000 to earn the certificate.

What you will learn

Knowledge of computer networking

Infosec Train’s CCNA: Cisco Certified Network Associate syllabus will help you: 

  • Describe rest-based APIs
  • Comprehend various IP services.
  • Interpret JSON-encoded data
  • Learn to configure IPV4 and IPV6 addressing
  • Interpret the various topologies included in network architecture.
  • Configure IPV6 and IPV4 routing and single-area OSPFv2
  • Understand the role and importance of DNS, DHCP, and SNMP
  • Understand the functions and role of different network components like switches, routers, next-generation firewalls, controllers, IPS, etc.
  • Understand software-defined and Controller-based architecture.
  • Understand the fundamentals of virtualisation and switching concepts
  • Verify and configure discovery protocols, VLANs multiple switches, EtherChannel (LACP)
  • Understand AP models, CISCO wireless architecture, and WLAN components.
  • Learn about routing table components and how the router makes forwarding decisions.
  • Learn how to verify and configure inside source NAT with the help of static and pool
  • Understand the various network security fundamentals that include security password policies, wireless security protocols, access control, and configuration of WLAN with WPA2 PSK
  • Differentiate between controller-based networking and traditional networking

The syllabus

Introduction to Networking

Chapter 1: Introduction to TCP/IP Networking
  • TCP/IP Networking Model
  • History Leading to TCP/IP
  • Overview of the TCP/IP Networking Model
  • TCP/IP Application Layer
  • HTTP Overview
  • HTTP Protocol Mechanisms
  • TCP/IP Transport Layer
  • TCP Error Recovery Basics
  • Same-Layer and Adjacent-Layer Interactions
  • TCP/IP Network Layer
  • Internet Protocol and the Postal Service
  •  Internet Protocol Addressing Basics
  • IP Routing Basics
  • TCP/IP Data-Link and Physical Layers
  • Data Encapsulation Terminology
  • Names of TCP/IP Messages
  • OSI Networking Model and Terminology
  • Comparing OSI and TCP/IP Layer Names and Numbers
  • OSI Data Encapsulation Terminology
Chapter 2: Fundamentals of Ethernet LANs
  • An Overview of LANs
  • SOHO LANs
  • Enterprise LANs
  • The Variety of Ethernet Physical Layer Standards
  • Consistent Behavior over All Links Using the Ethernet Data-Link Layer
  • Building Physical Ethernet LANs with UTP
  • Transmitting Data Using Twisted Pairs
  • Breaking Down a UTP Ethernet Link
  • UTP Cabling Pinouts for 10BASE-T and 100BASE-T
  • Straight-Through Cable Pinout
  • Choosing the Right Cable Pinouts
  • UTP Cabling Pinouts for 1000BASE-T
  • Building Physical Ethernet LANs with Fiber
  • Fiber Cabling Transmission Concepts
  • Using Fiber with Ethernet
  • Sending Data in Ethernet Networks
  • Ethernet Data-Link Protocols
  • Ethernet Addressing
  • Identifying Network Layer Protocols with the Ethernet Type Field
  • Error Detection with FCS
  • Sending Ethernet Frames with Switches and Hubs
  • Sending in Modern Ethernet LANs Using Full Duplex
  • Using Half Duplex with LAN Hubs
Chapter 3: Fundamentals of WANs and IP Routing
  • Wide-Area Networks
  • Leased-Line WANs
  • Physical Details of Leased Lines
  • HDLC Data-Link Details of Leased Lines
  • How Routers Use a WAN Data Link
  • Ethernet as a WAN Technology
  • Ethernet WANs That Create a Layer 2 Service
  • How Routers Route IP Packets Using Ethernet Emulation
  • IP Routing
  • Network Layer Routing (Forwarding) Logic
  • Host Forwarding Logic: Send the Packet to the Default Router
  • R1 and R2’s Logic: Routing Data Across the Network
  • R3’s Logic: Delivering Data to the End Destination
  • How Network Layer Routing Uses LANs and WAN
  • How IP Addressing Helps IP Routing
  • Rules for Groups of IP Addresses (Networks and Subnets)
  • The IP Header
  • How IP Routing Protocols Help IP Routing
  • Other Network Layer Features
  • Using Names and the Domain Name System
  • The Address Resolution Protocol
  • ICMP Echo and the ping Command

Implementing Ethernet LANs

Chapter 4: Using the Command-Line Interface
  • Accessing the Cisco Catalyst Switch CLI
  • Cisco Catalyst Switches
  • Accessing the Cisco IOS CLI
  • Cabling the Console Connection
  • Accessing the CLI with Telnet and SSH
  • User and Enable (Privileged) Modes
  • Password Security for CLI Access from the Console
  • CLI Help Features
  • The debug and show Commands
  • Configuring Cisco IOS Software
  • Configuration Submodels and Contexts
  • Storing Switch Configuration Files
  • Copying and Erasing Configuration Files
Chapter 5: Analysing Ethernet LAN Switching
  • LAN Switching Concepts
  • Overview of Switching Logic
  • Forwarding Known Unicast Frames
  • Learning MAC Addresses
  • Flooding Unknown Unicast and Broadcast Frames
  • Avoiding Loops Using Spanning Tree Protocol
  • LAN Switching Summary
  • Verifying and Analyzing Ethernet Switching
  • Demonstrating MAC Learning
  • Switch Interfaces
  • Finding Entries in the MAC Address Table
  • Managing the MAC Address Table (Aging, Clearing)
  • MAC Address Tables with Multiple Switches
Chapter 6: Configuring Basic Switch Management
  • Securing the Switch CLI
  • Securing User Mode and Privileged Mode with Simple Passwords
  • Securing User Mode Access with Local Usernames and Passwords
  • Securing User Mode Access with External Authentication Servers
  • Securing Remote Access with Secure Shell
  • Enabling IPv4 for Remote Access
  • Host and Switch IP Settings
  • Configuring IPv4 on a Switch
  • Configuring a Switch to Learn Its IP Address with DHCP
  • Verifying IPv4 on a Switch
  • Miscellaneous Settings Useful in the Lab
  • History Buffer Commands
  • The logging synchronous, exec-timeout, and no ip domain-lookup Commands
Chapter 7: Configuring and Verifying Switch Interfaces
  • Configuring Switch Interfaces
  • Configuring Speed, Duplex, and Description
  • Configuring Multiple Interfaces with the interface range Command
  • Administratively Controlling Interface State with shutdown
  • Removing Configuration with the no Command
  • Auto-negotiation
  • Auto-negotiation Under Working Conditions
  • Auto-negotiation Results When Only One Node Uses Autonegotiation
  • Auto-negotiation and LAN Hubs
  • Analyzing Switch Interface Status and Statistics
  • Interface Status Codes and Reasons for Nonworking States
  • Interface Speed and Duplex Issues
  • Common Layer 1 Problem on Working Interfaces

Implementing VLANs and STP

Chapter 8: Implementing Ethernet Virtual LANs
  • Virtual LAN Concepts
  • Creating Multiswitch VLANs Using Trunking
  • VLAN Tagging Concepts
  • The 802.1Q and ISL VLAN Trunking Protocols
  • Forwarding Data Between VLANs
  • The Need for Routing Between VLANs
  • Routing Packets Between VLANs with a Router
  • VLAN and VLAN Trunking Configuration and Verification
  • Creating VLANs and Assigning Access VLANs to an Interface
  • VLAN Configuration Example 1: Full VLAN Configuration
  • VLAN Configuration Example 2: Shorter VLAN Configuration
  • VLAN Trunking Protocol
  • VLAN Trunking Configuration
  • Implementing Interfaces Connected to Phones
  • Data and Voice VLAN Concepts
  • Data and Voice VLAN Configuration and Verification
  • Summary: IP Telephony Ports on Switches
  • Troubleshooting VLANs and VLAN Trunks
  • Access VLANs Undefined or Disabled
  • Mismatched Trunking Operational State
  • The Supported VLAN List on Trunks
  • Mismatched Native VLAN on a Trunk
Chapter 9: Spanning Tree Protocol Concepts
  • STP and RSTP Basics
  • The Need for Spanning Tree
  • What Spanning Tree Does
  • How Spanning Tree Works
  • The STP Bridge ID and Hello BPDU
  • Electing the Root Switch
  • Choosing Each Switch’s Root Port
  • Choosing the Designated Port on Each LAN Segment
  • Configuring to Influence the STP Topology
  • Details Specific to STP (and Not RSTP)
  • STP Activity When the Network Remains Stable
  • STP Timers That Manage STP Convergence
  • Changing Interface States with STP
  • Rapid STP Concepts
  • Comparing STP and RSTP
  • RSTP and the Alternate (Root) Port Role
  • RSTP States and Processes
  • RSTP and the Backup (Designated) Port Role
  • RSTP Port Types
  • Optional STP Features
  • EtherChannel
  • PortFast
  • BPDU Guard
Chapter 10: RSTP and EtherChannel Configuration
  • Understanding RSTP Through Configuration
  • The Need for Multiple Spanning Trees
  • STP Modes and Standards
  • The Bridge ID and System ID Extension
  • How Switches Use the Priority and System ID Extension
  • RSTP Methods to Support Multiple Spanning Trees
  • Other RSTP Configuration Options
  • Configuring Layer 2 EtherChannel
  • Configuring a Manual Layer 2 EtherChannel
  • Configuring Dynamic EtherChannels
  • Physical Interface Configuration and EtherChannels
  • EtherChannel Load Distribution
  • Configuration Options for EtherChannel Load Distribution
  • The Effects of the EtherChannel Load Distribution Algorithm

IPv4 Addressing

Chapter 11: Perspectives on IPv4 Subnetting
  • Introduction to Subnetting
  • Subnetting Defined Through a Simple Example
  • Operational View Versus Design View of Subnetting
  • Analyze Subnetting and Addressing Needs
  • Rules About Which Hosts Are in Which Subnet
  • Determining the Number of Subnets
  • Determining the Number of Hosts per Subnet
  • One Size Subnet Fits All—Or Not
  • Defining the Size of a Subnet
  • One Size Subnet Fits All
  • Multiple Subnet Sizes (Variable-Length Subnet Masks)
  • One Mask for All Subnets, or More Than One
  • Make Design Choices
  • Choose a Classful Network
  • Public IP Networks
  • Growth Exhausts the Public IP Address Space
  • Private IP Networks
  • Choosing an IP Network During the Design Phase
  • Choose the Mask
  • Classful IP Networks Before Subnetting
  • Borrowing Host Bits to Create Subnet Bits
  • Choosing Enough Subnet and Host Bits
  • Example Design: 172.16.0.0, 200 Subnets, 200 Hosts
  • Masks and Mask Formats
  • Build a List of All Subnets
  • Plan the Implementation
  • Assigning Subnets to Different Locations
  • Choose Static and Dynamic Ranges per Subnet
Chapter 12: Analysing Classful IPv4 Networks
  • Classful Network Concepts
  • IPv4 Network Classes and Related Facts
  • The Number and Size of Class A, B, and C Networks
  • Address Formats
  • Default Masks
  • Number of Hosts per Network
  • Deriving the Network ID and Related Numbers
  • Unusual Network IDs and Network Broadcast Addresses
  • Practice with Classful Networks
  • Practice Deriving Key Facts Based on an IP Address
  • Practice Remembering the Details of Address Classes
Chapter 13: Analyzing Subnet Masks
  • Subnet Mask Conversion
  • Three Mask Formats
  • Converting Between Binary and Prefix Masks
  • Converting Between Binary and DDN Masks
  • Converting Between Prefix and DDN Masks
  • Practice Converting Subnet Masks
  • Identifying Subnet Design Choices Using Masks
  • Masks Divide the Subnet’s Addresses into Two Parts
  • Masks and Class Divide Addresses into Three Parts
  • Classless and Classful Addressing
  • Calculations Based on the IPv4 Address Format
  • Practice Analyzing Subnet Masks
Chapter 14: Analyzing Existing Subnets
  • Defining a Subnet
  • An Example with Network 172.16.0.0 and Four Subnets
  • Subnet ID Concepts
  • Subnet Broadcast Address
  • Range of Usable Addresses
  • Analyzing Existing Subnets: Binary
  • Finding the Subnet ID: Binary
  • Finding the Subnet Broadcast Address: Binary
  • Binary Practice Problems
  • Shortcut for the Binary Process
  • Brief Note About Boolean Math
  • Finding the Range of Addresses
  • Analyzing Existing Subnets: Decimal
  • Analysis with Easy Masks
  • Predictability in the Interesting Octet
  • Finding the Subnet ID: Difficult Masks
  • Resident Subnet Example 1
  • Resident Subnet Example 2
  • Resident Subnet Practice Problems
  • Finding the Subnet Broadcast Address: Difficult Masks
  • Subnet Broadcast Example 1
  • Subnet Broadcast Example 2
  • Subnet Broadcast Address Practice Problems
  • Practice Analyzing Existing Subnets
  • A Choice: Memorize or Calculate

IPv4 Routing

Chapter 15: Operating Cisco Routers
  • Installing Cisco Routers
  • Installing Enterprise Routers
  • Cisco Integrated Services Routers
  • Physical Installation
  • Installing SOHO Routers
  • Enabling IPv4 Support on Cisco Router Interfaces
  • Accessing the Router CLI
  • Router Interfaces
  • Interface Status Codes
  • Router Interface IP Addresses
  • Bandwidth and Clock Rate on Serial Interfaces
  • Router Auxiliary Port
Chapter 16: Configuring IPv4 Addresses and Static Routes
  • IP Routing
  • IPv4 Routing Process Reference
  • An Example of IP Routing
  • Host Forwards the IP Packet to the Default Router (Gateway)
  • Routing Step 1: Decide Whether to Process the Incoming Frame
  • Routing Step 2: De-encapsulation of the IP Packet
  • Routing Step 3: Choosing Where to Forward the Packet
  • Routing Step 4: Encapsulating the Packet in a New Frame
  • Routing Step 5: Transmitting the Frame
  • Configuring IP Addresses and Connected Routes
  • Connected Routes and the ip address Command
  • The ARP Table on a Cisco Router
  • Configuring Static Routes
  • Static Network Routes
  • Static Host Routes
  • Floating Static Routes
  • Static Default Routes
  • Troubleshooting Static Routes
  • Troubleshooting Incorrect Static Routes That Appear in the IP Routing Table
  • The Static Route Does Not Appear in the IP Routing Table
  • The Correct Static Route Appears but Works Poorly
  • IP Forwarding with the Longest Prefix Match
  • Using show ip route to Find the Best Route
  • Using show ip route address to Find the Best Route
  • Interpreting the IP Routing Table
Chapter 17: IP Routing in the LAN
  • VLAN Routing with Router 802.1Q Trunks
  • Configuring ROAS
  • Verifying ROAS
  • Troubleshooting ROAS
  • VLAN Routing with Layer 3 Switch SVIs
  • Configuring Routing Using Switch SVIs
  • Verifying Routing with SVIs
  • Troubleshooting Routing with SVIs
  • VLAN Routing with Layer 3 Switch Routed Ports
  • Implementing Routed Interfaces on Switches
  • Implementing Layer 3 EtherChannels
  • Troubleshooting Layer 3 EtherChannels
Chapter 18: Troubleshooting IPv4 Routing
  • Problem Isolation Using the Ping Command
  • Ping Command Basics
  • Strategies and Results When Testing with the Ping Command
  • Testing Longer Routes from Near the Source of the Problem
  • Using Extended Ping to Test the Reverse Route
  • Testing LAN Neighbors with Standard Ping
  • Testing LAN Neighbors with Extended Ping
  • Testing WAN Neighbors with Standard Ping
  • Using Ping with Names and with IP Addresses
  • Problem Isolation Using the Traceroute Command
  • Traceroute Basics
  • How the Traceroute Command Works
  • Standard and Extended Traceroute
  • Telnet and SSH
  • Common Reasons to Use the IOS Telnet and SSH Client
  • IOS Telnet and SSH Examples

OSPF

Chapter 19: Understanding OSPF Concepts
  • Comparing Dynamic Routing Protocol Features
  • Routing Protocol Functions
  • Interior and Exterior Routing Protocols
  • Comparing IGPs
  • IGP Routing Protocol Algorithms
  • Metrics
  • Other IGP Comparisons
  • Administrative Distance
  • OSPF Concepts and Operation
  • OSPF Overview
  • Topology Information and LSAs
  • Applying Dijkstra SPF Math to Find the Best Routes
  • Becoming OSPF Neighbors
  • The Basics of OSPF Neighbors
  • Meeting Neighbors and Learning Their Router ID
  • Exchanging the LSDB Between Neighbors
  • Fully Exchanging LSAs with Neighbors
  • Maintaining Neighbors and the LSDB
  • Using Designated Routers on Ethernet Links
  • Calculating the Best Routes with SPF
  • OSPF Areas and LSAs
  • OSPF Areas
  • How Areas Reduce SPF Calculation Time
  • (OSPFv2) Link-State Advertisements
  • Router LSAs Build Most of the Intra-Area Topology
  • Network LSAs Complete the Intra-Area Topology
Chapter 20: Implementing OSPF
  • Implementing Single-Area OSPFv2
  • OSPF Single-Area Configuration
  • Wildcard Matching with the network Command
  • Verifying OSPF Operation
  • Verifying OSPF Configuration
  • Configuring the OSPF Router ID
  • Implementing Multiarea OSPF
  • Using OSPFv2 Interface Subcommands
  • OSPF Interface Configuration Example
  • Verifying OSPF Interface Configuration
  • Additional OSPFv2 Features
  • OSPF Passive Interfaces
  • OSPF Default Routes
  • OSPF Metrics (Cost)
  • Setting the Cost Directly
  • Setting the Cost Based on Interface and Reference Bandwidth
  • OSPF Load Balancing
Chapter 21: OSPF Network Types and Neighbors
  • OSPF Network Types
  • The OSPF Broadcast Network Type
  • Verifying Operations with Network Type Broadcast
  • Configuring to Influence the DR/BDR Election
  • The OSPF Point-to-Point Network Type
  • OSPF Neighbor Relationships
  • OSPF Neighbor Requirements
  • Issues That Prevent Neighbor Adjacencies
  • Finding Area Mismatches
  • Finding Duplicate OSPF Router IDs
  • Finding OSPF Hello and Dead Timer Mismatches
  • Shutting Down the OSPF Process
  • Issues That Allow Adjacencies but Prevent IP Routes
  • Mismatched MTU Settings
  • Mismatched OSPF Network Types

IP Version 6

Chapter 22: Fundamentals of IP Version 6
  • Introduction to IPv6
  • The Historical Reasons for IPv6
  • The IPv6 Protocols
  • IPv6 Routing
  • IPv6 Routing Protocols
  • IPv6 Addressing Formats and Conventions
  • Representing Full (Unabbreviated) IPv6 Addresses
  • Abbreviating and Expanding IPv6 Addresses
  • Abbreviating IPv6 Addresses
  • Expanding Abbreviated IPv6 Addresses
  • Representing the Prefix Length of an Address
  • Calculating the IPv6 Prefix (Subnet ID)
  • Finding the IPv6 Prefix
  • Working with More Difficult IPv6 Prefix Lengths
Chapter 23: IPv6 Addressing and Subnetting
  • Global Unicast Addressing Concepts
  • Public and Private IPv6 Addresses
  • The IPv6 Global Routing Prefix
  • Address Ranges for Global Unicast Addresses
  • IPv6 Subnetting Using Global Unicast Addresses
  • Deciding Where IPv6 Subnets Are Needed
  • The Mechanics of Subnetting IPv6 Global Unicast Addresses
  • Listing the IPv6 Subnet Identifier
  • List All IPv6 Subnets
  • Assign Subnets to the Internetwork Topology
  • Assigning Addresses to Hosts in a Subnet
  • Unique Local Unicast Addresses
  • Subnetting with Unique Local IPv6 Addresses
  • The Need for Globally Unique Local Addresses
Chapter 24: Implementing IPv6 Addressing Routers
  • Implementing Unicast IPv6 Addresses on Routers
  • Static Unicast Address Configuration
  • Configuring the Full 128-Bit Address
  • Enabling IPv6 Routing
  • Verifying the IPv6 Address Configuration
  • Generating a Unique Interface ID Using Modified EUI-64
  • Dynamic Unicast Address Configuration
  • Special Addresses Used by Routers
  • Link-Local Addresses
  • Link-Local Address Concepts
  • Creating Link-Local Addresses on Routers
  • Routing IPv6 with Only Link-Local Addresses on an Interface
  • IPv6 Multicast Addresses
  • Reserved Multicast Addresses
  • Multicast Address Scopes
  • Solicited-Node Multicast Addresses
  • Miscellaneous IPv6 Addresses
  • Anycast Addresses
  • IPv6 Addressing Configuration Summary
Chapter 25: Implementing IPv6 Routing
  • Connected and Local IPv6 Routes
  • Rules for Connected and Local Routes
  • Example of Connected IPv6 Routes
  • Examples of Local IPv6 Routes
  • Static IPv6 Routes
  • Static Routes Using the Outgoing Interface
  • Static Routes Using Next-Hop IPv6 Address
  • Example Static Route with a Global Unicast Next-Hop Address
  • Example Static Route with a Link-Local Next-Hop Address
  • Static Routes over Ethernet Links
  • Static Default Routes
  • Static IPv6 Host Routes
  • Floating Static IPv6 Routes
  • Troubleshooting Static IPv6 Routes
  • Troubleshooting Incorrect Static Routes That Appear in the IPv6 Routing Table
  • The Static Route Does Not Appear in the IPv6 Routing Table
  • The Neighbor Discovery Protocol
  • Discovering Neighbor Link Addresses with NDP NS and NA
  • Discovering Routers with NDP RS and RA
  • Using SLAAC with NDP RS and RA
  • Discovering Duplicate Addresses Using NDP NS and NA
  • NDP Summary

Wireless LANs

Chapter 26: Fundamentals of Wireless Networks
  • Comparing Wired and Wireless Networks
  • Wireless LAN Topologies
  • Basic Service Set
  • Distribution System
  • Extended Service Set
  • Independent Basic Service Set
  • Other Wireless Topologies
  • Repeater
  • Workgroup Bridge
  • Outdoor Bridge
  • Mesh Network
  • RF Overview
  • Wireless Bands and Channels
  • APs and Wireless Standards
Chapter 27: Analysing Cisco Wireless Architectures
  • Autonomous AP Architecture
  • Cloud-based AP Architecture
  • Split-MAC Architectures
  • Comparing Wireless LAN Controller Deployments
  • Cisco AP Modes
Chapter 28: Securing Wireless Networks
  • Anatomy of a Secure Connection
  • Authentication
  • Message Privacy
  • Message Integrity
  • Wireless Client Authentication Methods
  • Open Authentication
  • WEP
  • 802.1x/EAP
  • LEAP
  • EAP-FAST
  • PEAP
  • EAP-TLS
  • Wireless Privacy and Integrity Methods
  • TKIP
  • CCMP
  • GCMP
  • WPA, WPA2, and WPA3
Chapter 29: Building a Wireless LAN
  • Connecting a Cisco AP
  • Accessing a Cisco WLC
  • Connecting a Cisco WLC
  • Using WLC Ports
  • Using WLC Interfaces
  • Configuring a WLAN
  • Step 1. Configure a RADIUS Server
  • Step 2. Create a Dynamic Interface
  • Step 3. Create a New WLAN
  • Configuring WLAN Security
  • Configuring WLAN QoS
  • Configuring Advanced WLAN Settings
  • Finalizing WLAN Configuration

IP Access Control Lists

Chapter 30: Introduction to TCP/IP Transport and Applications
  • TCP/IP Layer 4 Protocols: TCP and UDP
  • Transmission Control Protocol
  • Multiplexing Using TCP Port Numbers
  • Popular TCP/IP Applications
  • Connection Establishment and Termination
  • Error Recovery and Reliability
  • Flow Control Using Windowing
  • User Datagram Protocol
  • TCP/IP Applications
  • Uniform Resource Identifiers
  • Finding the Web Server Using DNS
  • Transferring Files with HTTP
  • How the Receiving Host Identifies the Correct Receiving Application
Chapter 31: Basic IPv4 Access Control Lists
  • IPv4 Access Control List Basics
  • ACL Location and Direction
  • Matching Packets
  • Taking Action When a Match Occurs
  • Types of IP ACLs
  • Standard Numbered IPv4 ACLs
  • List Logic with IP ACLs
  • Matching Logic and Command Syntax
  • Matching the Exact IP Address
  • Matching a Subset of the Address with Wildcards
  • Binary Wildcard Masks
  • Finding the Right Wildcard Mask to Match a Subnet
  • Matching Any/All Addresses
  • Implementing Standard IP ACLs
  • Standard Numbered ACL Example 1
  • Standard Numbered ACL Example 2
  • Troubleshooting and Verification Tip
  • Practice Applying Standard IP ACLs
  • Practice Building access-list Commands
  • Reverse Engineering from ACL to Address Range
Chapter 32: Advanced IPv4 Access Control Lists
  • Extended Numbered IP Access Control Lists
  • Matching the Protocol, Source IP, and Destination IP
  • Matching TCP and UDP Port Numbers
  • Extended IP ACL Configuration
  • Extended IP Access Lists: Example 1
  • Extended IP Access Lists: Example 2
  • Practice Building access-list Commands
  • Named ACLs and ACL Editing
  • Named IP Access Lists
  • Editing ACLs Using Sequence Numbers
  • Numbered ACL Configuration Versus Named ACL Configuration
  • ACL Implementation Considerations
  • Additional Reading on ACLs

Security Services

Chapter 33: Security Architectures
  • Security Terminology
  • Common Security Threats
  • Attacks That Spoof Addresses
  • Denial-of-Service Attacks
  • Reflection and Amplification Attacks
  • Man-in-the-Middle Attacks
  • Address Spoofing Attack Summary
  • Reconnaissance Attacks
  • Buffer Overflow Attacks
  • Malware
  • Human Vulnerabilities
  • Password Vulnerabilities
  • Password Alternatives
  • Controlling and Monitoring User Access
  • Developing a Security Program to Educate Users
Chapter 34: Securing Network Devices
  • Securing IOS Passwords
  • Encrypting Older IOS Passwords with service password-encryption
  • Encoding the Enable Passwords with Hashes
  • Interactions Between Enable Password and Enable Secret
  • Making the Enable Secret Truly Secret with a Hash
  • Improved Hashes for Cisco’s Enable Secret
  • Encoding the Passwords for Local Usernames
  • Controlling Password Attacks with ACLs
  • Firewalls and Intrusion Prevention Systems
  • Traditional Firewalls
  • Security Zones
  • Intrusion Prevention Systems (IPS)
  • Cisco Next-Generation Firewalls
  • Cisco Next-Generation IPS
Chapter 35: Implementing Switch Port Security
  • Port Security Concepts and Configuration
  • Configuring Port Security
  • Verifying Port Security
  • Port Security MAC Addresses
  • Port Security Violation Modes
  • Port Security Shutdown Mode
  • Port Security Protect and Restrict Modes
Chapter 36: Implementing DHCP
  • Dynamic Host Configuration Protocol
  • DHCP Concepts
  • Supporting DHCP for Remote Subnets with DHCP Relay
  • Information Stored at the DHCP Server
  • Configuring DHCP Features on Routers and Switches
  • Configuring DHCP Relay
  • Configuring a Switch as DHCP Client
  • Configuring a Router as DHCP Client
  • Identifying Host IPv4 Settings
  • Host Settings for IPv4
  • Host IP Settings on Windows
  • Host IP Settings on macOS
  • Host IP Settings on Linux
Chapter 37: DHCP Snooping and ARP Inspection
  • DHCP Snooping Concepts
  • A Sample Attack: A Spurious DHCP Server
  • DHCP Snooping Logic
  • Filtering DISCOVER Messages Based on MAC Address
  • Filtering Messages that Release IP Addresses
  • DHCP Snooping Configuration
  • Configuring DHCP Snooping on a Layer 2 Switch
  • Limiting DHCP Message Rates
  • DHCP Snooping Configuration Summary
  • Dynamic ARP Inspection
  • DAI Concepts
  • Review of Normal IP ARP
  • Gratuitous ARP as an Attack Vector
  • Dynamic ARP Inspection Logic
  • Dynamic ARP Inspection Configuration
  • Configuring ARP Inspection on a Layer 2 Switch
  • Limiting DAI Message Rates
  • Configuring Optional DAI Message Checks
  • IP ARP Inspection Configuration Summary

IP Services

Chapter 38: Device Management Protocols
  • System Message Logging (Syslog)
  • Sending Messages in Real Time to Current Users
  • Storing Log Messages for Later Review
  • Log Message Format
  • Log Message Severity Levels
  • Configuring and Verifying System Logging
  • The debug Command and Log Messages
  • Network Time Protocol (NTP)
  • Setting the Time and Timezone
  • Basic NTP Configuration
  • NTP Reference Clock and Stratum
  • Redundant NTP Configuration
  • NTP Using a Loopback Interface for Better Availability
  • Analyzing Topology Using CDP and LLDP
  • Examining Information Learned by CDP
  • Configuring and Verifying CDP
  • Examining Information Learned by LLDP
  • Configuring and Verifying LLDP
Chapter 39: Network Address Translation
  • Perspectives on IPv4 Address Scalability
  • CIDR
  • Private Addressing
  • Network Address Translation Concepts
  • Static NAT
  • Dynamic NAT
  • Overloading NAT with Port Address Translation
  • NAT Configuration and Troubleshooting
  • Static NAT Configuration
  • Dynamic NAT Configuration
  • Dynamic NAT Verification
  • NAT Overload (PAT) Configuration
  • NAT Troubleshooting
Chapter 40: Quality of Service (QoS)
  • Introduction to QoS
  • QoS: Managing Bandwidth, Delay, Jitter, and Loss
  • Types of Traffic
  • Data Applications
  • Voice and Video Applications
  • QoS, as mentioned in The Book
  • QoS on Switches and Routers
  • Classification and Marking
  • Classification Basics
  • Matching (Classification) Basics
  • Classification of Routers with ACLs and NBAR
  • Marking IP DSCP and Ethernet CoS
  • Marking the IP Header
  • Marking the Ethernet 802.1Q Header
  • Other Marking Fields
  • Defining Trust Boundaries
  • DiffServ Suggested Marking Values
  • Expedited Forwarding (EF)
  • Assured Forwarding (AF)
  • Class Selector (CS)
  • Guidelines for DSCP Marking Values
  • Queuing
  • Round-Robin Scheduling (Prioritization)
  • Low Latency Queuing
  • A Prioritization Strategy for Data, Voice, and Video
  • Shaping and Policing
  • Policing
  • Where to Use Policing
  • Shaping
  • Setting a Good Shaping Time Interval for Voice and Video
  • Congestion Avoidance
  • TCP Windowing Basics
  • Congestion Avoidance Tools
Chapter 41: Miscellaneous IP Services
  • First Hop Redundancy Protocol
  • The Need for Redundancy in Networks
  • The Need for a First Hop Redundancy Protocol
  • The Three Solutions for First-Hop Redundancy
  • HSRP Concepts
  • HSRP Failover
  • HSRP Load Balancing
  • Simple Network Management Protocol
  • SNMP Variable Reading and Writing: SNMP Get and Set
  • SNMP Notifications: Traps and Informs
  • The Management Information Base
  • Securing SNMP FTP and TFTP
  • Managing Cisco IOS Images with
  • FTP/TFTP
  • The IOS File System
  • Upgrading IOS Images
  • Copying a New iOS Image to a Local iOS File System Using TFTP
  • Verifying IOS Code Integrity with MD5
  • Copying Images with FTP
  • The FTP and TFTP Protocols
  • FTP Protocol Basics
  • FTP Active and Passive Modes
  • FTP over TLS (FTP Secure)
  • TFTP Protocol Basics

Network Architecture

Chapter 42: LAN Architecture
  • Analyzing Campus LAN Topologies
  • Two-Tier Campus Design (Collapsed Core)
  • The Two-Tier Campus Design
  • Topology Terminology Seen Within a Two-Tier Design
  • Three-Tier Campus Design (Core)
  • Topology Design Terminology
  • Small Office/Home Office
  • Power over Ethernet (PoE)
  • PoE Basics
  • PoE Operation
  • PoE and LAN Design
Chapter 43: WAN Architecture
  • Metro Ethernet
  • Metro Ethernet Physical Design and Topology
  • Ethernet WAN Services and Topologies
  • Ethernet Line Service (Point-to-Point)
  • Ethernet LAN Service (Full Mesh)
  • Ethernet Tree Service (Hub and Spoke)
  • Layer 3 Design Using Metro Ethernet
  • Layer 3 Design with E-Line Service
  • Layer 3 Design with E-LAN Service
  • Multiprotocol Label Switching (MPLS)
  • MPLS VPN Physical Design and Topology
  • MPLS and Quality of Service
  • Layer 3 with MPLS VPN
  • Internet VPNs
  • Internet Access
  • Digital Subscriber Line
  • Cable Internet
  • Wireless WAN (3G, 4G, LTE, 5G)
  • Fiber (Ethernet) Internet Access
  • Internet VPN Fundamentals
  • Site-to-Site VPNs with IPsec
  • Remote Access VPNs with TLS
  • VPN Comparisons
Chapter 44: Cloud Architecture
  • Server Virtualization
  • Cisco Server Hardware
  • Server Virtualization Basics
  • Networking with Virtual Switches on a
  • Virtualized Host
  • The Physical Data Center Network
  • Workflow with a Virtualized Data Center
  • Cloud Computing Services
  • Private Cloud (On-Premise)
  • Public Cloud
  • Cloud and the “Software as a Service” Model
  • Infrastructure as a Service
  • Software as a Service
  • (Development) Platform as a Service
  • WAN Traffic Paths to Reach Cloud Services
  • Enterprise WAN Connections to Public Cloud
  • Accessing Public Cloud Services Using the Internet
  • Pros and Cons of Connecting to Public Cloud with Internet
  • Private WAN and Internet VPN Access to Public Cloud
  • Pros and Cons of Connecting to the Cloud with Private WANs
  • Intercloud Exchanges
  • Summarizing the Pros and Cons of Public Cloud WAN Options
  • A Scenario: Branch Offices and the Public Cloud
  • Migrating Traffic Flows When Migrating to Email SaaS
  • Branch Of ices with Internet and Private WAN

Network Automation

Chapter 45: Introduction to Controller-Based Networking
  • SDN and Controller-Based Networks
  • The Data, Control, and Management Planes
  • The Data Plane
  • The Control Plane
  • The Management Plane
  • Cisco Switch Data Plane Internals
  • Controllers and Software-Defined Architecture
  • Controllers and Centralized Control
  • The Southbound Interface
  • The Northbound Interface
  • Software Defined Architecture Summary
  • Examples of Network Programmability and SDN
  • OpenDaylight and OpenFlow
  • The OpenDaylight Controller
  • The Cisco Open SDN Controller (OSC)
  • Cisco Application Centric Infrastructure (ACI)
  • ACI Physical Design: Spine and Leaf
  • ACI Operating Model with Intent-Based Networking
  • Cisco APIC Enterprise Domain
  • APIC-EM Basics
  • APIC-EM Replacement
  • Summary of the SDN Examples
  • Comparing Traditional Versus Controller-Based Networks
  • How Automation Impacts Network Management
  • Comparing Traditional Networks with Controller-Based Networks
Chapter 46: Cisco Software-Defined Access (SDA)
  • SDA Fabric, Underlay, and Overlay
  • The SDA Underlay
  • Using Existing Gear for the SDA Underlay
  • Using New Gear for the SDA Underlay
  • The SDA Overlay
  • VXLAN Tunnels in the Overlay (Data Plane)
  • LISP for Overlay Discovery and Location (Control Plane)
  • DNA Center and SDA Operation
  • Cisco DNA Center
  • Cisco DNA Center and Scalable Groups
  • Issues with Traditional IP-Based Security
  • SDA Security Based on User Groups
  • DNA Center as a Network Management Platform
  • DNA Center Similarities to Traditional Management
  • DNA Center Differences with Traditional Management
Chapter 47: Understanding REST and JSON
  • REST-Based APIs
  • REST-Based (RESTful) APIs
  • Client/Server Architecture
  • Stateless Operation
  • Cacheable (or not)
  • Background: Data and Variables
  • Simple Variables
  • List and Dictionary Variables
  • REST APIs and HTTP
  • Software CRUD Actions and HTTP Verbs
  • Using URIs with HTTP to Specify the Resource
  • Example of REST API Call to DNA Center
  • Data Serialization and JSON
  • The Need for a Data Model with APIs
  • Data Serialization Languages
  • JSON
  • XML
  • YAML
  • Summary of Data Serialization
  • Interpreting JSON
  • Interpreting JSON Key: Value Pairs
  • Interpreting JSON Objects and Arrays
  • Minified and Beautified JSON
Chapter 48: Understanding Ansible, Puppet, and Chef
  • Device Configuration Challenges and Solutions
  • Configuration Drift
  • Centralized Configuration Files and Version Control
  • Configuration Monitoring and Enforcement
  • Configuration Provisioning
  • Configuration Templates and Variables
  • Files That Control Configuration Automation
  • Ansible, Puppet, and Chef Basics
  • Ansible
  • Puppet
  • Chef
  • Summary of Configuration Management Tool

Admission details

  • Click here: https://www.infosectrain.com/courses/cisco-ccna-200-301-cisco-certification-training/ - to access CCNA: Cisco Certified Network Associate (CCNA 200-301) Training web page, click the URL.
  • Read the course details, contents and select the Now/Get started/Contact us’ option to proceed.
  • Fill in your details and complete the pop-up form to apply. 

Filling the form

The CCNA: Cisco Certified Network Associate programme form will ask your full name, country, email address, phone number, and a comment regarding the training. Also, you can choose the fill the form for yourself or your company.

Evaluation process

The CCNA: Cisco Certified Network Associate exam will consist of 120 questions that you must attempt in a duration of 120 mins. The passing score for the test is 849/1000, and you can take the exam in either English or Japanese language.

How it helps

The CCNA: Cisco Certified Network Associate online programme provides a practical training environment and the skills required for various IT job roles in the market. You can boost your confidence and get a professional edge in your IT career by completing this course. You can also link the certification badge to various platforms on social media

FAQs

Can I apply for the position of Network Specialist after completing this course?

After completing the CCNA: Cisco Certified Network Associate certification, you can apply for positions like Network Administrator, Network Specialist, and Network Support Engineer.

Which companies hire Network administrators?

Companies like IBM, TCS, Infosys, and many other companies hire Network administrators.

Can I share the certification badge on any platform?

You can share your Cisco digital badge on multiple social media platforms.

Which languages are applicable for the certification exam?

English

What is the exam code for the certification exam?

The exam code for the CCNA: Cisco Certified Network Associate exam is CCNA 200-301.

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books