CISCO CCNA 200-301
The CISCO Certified Network Associate (CCNA) certification serves as a stepping stone for those professionals who are willing to make a career in networking or IT technology. The CCNA training program is a well thought out training program covering a broad range of fundamentals of IT careers. Training course enables candidates to gain a deep insight into the networking technologies and focuses on providing the necessary skill set required for the in-demand IT job roles.
The CCNA certification validates candidates’ knowledge and skills regarding network fundamentals, Wide Area Networks (WAN), Wireless networks, IP connectivity, IP services, Security fundamentals, and automation & programmability.
Duration
.
Audience
- Network Administrators
- Network Support Engineers
- System Administrators
- Network Security Specialist
- Network Security Operators
- Anyone willing to make a career in Network Security [/ul}
Prerequisite
There are no mandatory prerequisites for the CCNA examination, but it is recommended to have a basic understanding of the following:
- IP addressing
- Network fundamentals
Objectives
- Understand the role and functions of different network components such as routers, switches, next-generation firewalls, IPS, controllers, and many more.
- Interpret various network architecture topologies
- Learn how to configure IPV4 and IPV6 addressing
- Understand virtualization fundamentals and switching concepts
- Configure and verify VLANs multiple switches, discovery protocols, EtherChannel (LACP)
- Understand CISCO wireless architecture and AP models and WLAN components
- Learn about the components of the routing table and how the router makes forwarding decisions
- Configure IPV4 and IPV6 routing and single-area OSPFv2
- Comprehend multiple IP services
- Learn to configure and verify inside source NAT using static and pool
- Understand the role of DHCP, DNS, and SNMP
- Understand various network security fundamentals, including wireless security protocols, security password policies, access control, and configuration of WLAN using WPA2 PSK
- Differentiate traditional networking and controller-based networking
- Understand Controller-based and software-defined architecture
- Describe rest-based APIs
- Interpret JSON encoded data
Certifications
Detailled program
Network Fundamentals
- Role and function of network components
- characteristics of network topology architectures
- Compare physical interface and cabling types
- Identify interface and cable issues
- Compare TCP to UDP
- Configure and verify IPv4 addressing and subnetting
- Describe the need for private IPv4 addressing
- Configure and verify IPv6 addressing and prefix
- IPV6 address types
- Defining Wireless principles
- Virtualization fundamentals and switching concepts
Network Access
- Configure and verify VLANs
- Configure and verify Interswitch connectivity
- Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)
- Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)
- The requirement of basic operations of Rapid PVST+ Spanning Tree Protocol
- Comparison of Cisco Wireless Architectures and AP modes
- Explanation of physical infrastructure connections of WLAN components (AP, WLC, access/trunk ports, and LAG)
- Description of AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, console, and TACACS+/RADIUS)
- Configuration of the components of a wireless LAN access for client connectivity using GUI
IP connectivity
- Explanation of the components of the routing table
- How a router makes a forwarding decision by default
- Configuration and verification of IPv4 and IPv6 static routing
- Configuration and verification of single area OSPFv2
- Description of the purpose of first-hop redundancy protocol
IP Services
- Configuration and verification of inside source NAT using static and pools
- Configuration and verification of NTP operating in a client and server mode
- The role of DHCP and DNS within the network
- The function of SNMP in network operations
- Explanation of the use of Syslog features, including facilities and levels
- Configuration and verification DHCP client and relay
- Explanation of the forwarding per-hop behavior (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping
- Configuration of network devices for remote access using SSH
- Explanation of the capabilities and function of TFTP/FTP in the network
Security Fundamentals
- Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)
- Describe security program elements (user awareness, training, and physical access control)
- Configure device access control using local passwords
- Describe security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics)
- Describe remote access and site-to-site VPNs
- Configure and verify access control lists
- Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security)
- Differentiate authentication, authorization, and accounting concepts
- Describe wireless security protocols (WPA, WPA2, and WPA3)
- Configure WLAN using WPA2 PSK using the GUI
Automation and programmability
- Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)
- Describe security program elements (user awareness, training, and physical access control)
- Configure device access control using local passwords
- Describe security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics)
- Describe remote access and site-to-site VPNs
- Configure and verify access control lists
- Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security)
- Differentiate authentication, authorization, and accounting concepts
- Describe wireless security protocols (WPA, WPA2, and WPA3)
- Configure WLAN using WPA2 PSK using the GUI