CCNA Cisco Network Training

Introduction to Networking
- Introduction to Networking
- Network types
- Communication types , Modes & Devices
- Network topology
- Network Reference Model (OSI &DoD Model)
LAN Switching Technologies
- Determine the technology and media access control method for Ethernet networks
- Identify basic switching concepts and the operation of Cisco switches.
- Verify network status and switch operation using basic utilities such as ping, telnet & ssh.
- Identify enhanced switching technologies
- Describe how VLANs create logically separate networks and the need for routing between Them.
- Configure and verify trunking on Cisco switches
- Configure and verify PVSTP operation
IP addressing (IPv4 / IPv6)
- Describe the operation and necessity of using private and public IP addresses for IPv4addressing
- Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment.
- Identify the appropriate IPv4 addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment.
- Describe the technological requirements for running IPv6 in conjunction with IPv4 such as dual stack
- Describe IPv6 addresses
IP Routing Technologies
- Describe basic routing concepts
- Configure and verify operation status of a device interface, both serial and ethernet
- Verify router configuration and network connectivity
- Configure and verify routing configuration for a static or default route given specific routing requirements
- Differentiate methods of routing and routing protocols
- Configure and verify OSPF (single area)
- Configure and verify EIGRP (single AS)
- Configure and verify interVLAN routing (Router on a stick)
IP Services
- Configure and verify DHCP (IOS Router)
- Identify the basic operation of NAT
- Configure and verify NAT for given network requirements
- Configure and verify NTP as a client
- Recognize High availability (FHRP)
- Configure and verify Syslog
- Describe SNMP v2 & v3
Network Device Security
- Configure and verify network device security features such as
- Configure and verify Switch Port Security features
- Describe the types, features, and applications of ACLs
- Configure and verify ACLs to filter network traffic
Troubleshooting
- Identify and correct common network problems
- Troubleshoot and correct common problems associated with IP addressing and host configurations.
- Troubleshoot and Resolve VLAN problems
- Troubleshoot and Resolve trunking problems on Cisco switches
- Troubleshoot and Resolve OSPF problems
- Troubleshoot and Resolve EIGRP problems
- Troubleshoot and Resolve interVLAN routing problems
- Troubleshoot and Resolve ACL issues
- Troubleshoot and Resolve WAN implementation issues
- Troubleshoot etherchannel problems
WAN Technologies
- Identify different WAN Technologies
- Metro Ethernet
- VSAT
- Cellular 3G / 4G
- MPLS
- ISDN
- VPN
- Configure and verify a basic WAN serial connection
- Configure and verify a PPP connection between Cisco routers
- Configure and verify Frame Relay on Cisco routers
- Implement and troubleshoot PPPoE
Cisco Certified Network Associate Security (CCNA Security) Syllabus
Common security principles
- Describe confidentiality, integrity, availability (CIA)
- Describe SIEM technology
- Identify common security terms
- Identify common network security zones
Common security threats
- Identify common network attacks
- Describe social engineering
- Identify malware
- Classify the vectors of data loss/exfiltration
Cryptography concepts
- Describe key exchange
- Describe hash algorithm
- Compare and contrast symmetric and asymmetric encryption
- Describe digital signatures, certificates, and PKI
Describe network topologies
- Campus area network (CAN)
- Cloud, wide area network (WAN)
- Data center
- Small office/home office (SOHO)
- Network security for a virtual environment
Describe network topologies
- Campus area network (CAN)
- Cloud, wide area network (WAN)
- Data center
- Small office/home office (SOHO)
- Network security for a virtual environment
Secure management
- Compare in-band and out-of band
- Configure secure network management
- Configure and verify secure access through SNMP v3 using an ACL
- Configure and verify security for NTP
- Use SCP for file transfer
Concepts
- Describe RADIUS and TACACS+ technologies
- Configure administrative access on a Cisco router using TACACS+
- Verify connectivity on a Cisco router to a TACACS+ server
- Explain the integration of Active Directory with AAA
- Describe authentication and authorization using ACS and ISE
BYOD
- Describe the BYOD architecture framework
- Describe the function of mobile device management (MDM)
Describe IPS deployment considerations
- Network-based IPS vs. host-based IPS
- Modes of deployment (inline, promiscuous – SPAN, tap)
- Placement (positioning of the IPS within the network)
- False positives, false negatives, true positives, true negatives
- Describe IPS technologies
- Rules/signatures
- Detection/signature engines
- Trigger actions/responses (drop, reset, block, alert, monitor/log, shun)
- Blacklist (static and dynamic)
- Describe mitigation technology for email-based threats
- SPAM filtering, anti-malware filtering, DLP, blacklisting, email encryption
- Describe mitigation technology for web-based threats
- Local and cloud-based web proxies
- Blacklisting, URL filtering, malware scanning, URL categorization, web application filtering, TLS/SSL decryption
- Describe mitigation technology for endpoint threats
- Anti-virus/anti-malware
- Personal firewall/HIPS
- Hardware/software encryption of local data