This is an official Cisco Academy course and consists of 3 modules: Introduction to Networks, Routing Switching & Wireless Essentials, Enterprise Networking Security & Automation.
COURSE OUTLINE
1 - EXPLORING THE FUNCTIONS OF NETWORKING
• What is a computer network?
• Components of a network
• Characteristics of a network
• Physical vs. Logical Topologies
• Interpreting a network diagram
• Impact of user applications on the network
2 - INTRODUCING THE HOST-TO-HOST COMMUNICATIONS MODEL
• Host-to-host communications overview
• ISO OSI reference model
• TCP/IP protocol Suite
• Peer-to-peer communications
• Encapsulation and de-encapsulation
• TCP/IP stack vs OSI reference model
3 - OPERATING CISCO IOS SOFTWARE
• Cisco IOS software features and functions
• Cisco IOS software CLI functions
• Cisco IOS software models
4 - INTRODUCING LANS
• Local area networks
• LAN components
• Need for switches
• Characteristics and features of switches
5 - EXPLORING THE TCP/IP LINK LAYER
• Ehernet LAN connection media
• Ethernet frame structure
• LAN communication types
• MAC addresses
• Frame switching
• Discovery 2: Observe how a switch operate
• Duplex communication
6 - STARTING A SWITCH
• Switch installation
• Connecting to a console port
• Switch LED indicators
• Basic show commands and information
• Discovery 3: Perform basic switch configuration
• Implement the initial switch configuration
7 - INTRODUCING THE TCP/IP INTERNET LAYER, IPV4 ADDRESSING, AND SUBNETS
• Internet protocol
• Decimal and binary number systems
• Binary-to-decimal conversion
• Decimal-to-binary conversion
• IPv4 address representation
• IPv4 header fields
• IPv4 address classes
• Subnet masks
• Subnets
• Implementing subnetting: Bowwing bits
• Implementing subnetting: Determining the addressing scheme
• Benefits of VLSM and Implementing VLSM
• Private vs. Public IPv4 addresses
• Reserved IPv4 addresses
• Verifying IPv4 address of a host
8 - EXPLAINING THE TCP/IP TRANSPORT LAYER AND APPLICATION LAYER
• TCP/IP transport layer functions
• Reliable vs. Best-effort transport
• TCP characteristics
• UDP characteristics
• TCP/IP application layer
• Introducing HTTP
• Domain name system
• Explaining DHCP for IPv4
9 - EXPLORING THE FUNCTIONS OF ROUTING
• Role of a router
• Router components
• Router functions
• Routing table
• Path determination
10 - CONFIGURING A CISCO ROUTER
• Initial router setup
• Configuring router interfaces
• Configuring IPv4 addresses on router interfaces
• Checking interface configuration and status
• Discovery 5: Configure an interface on a Cisco router
• Exploring connected devices
• Using Cisco Discovery Protocol
• Configure and verify LLDP
• Implement an initial router configuration
11 - EXPLORING THE PACKET DELIVERY PROCESS
• Layer 2 addressing
• Layer 3 addressing
• Default gateways
• Address resolution protocol
• Host-to-host packet deliver
12 - TROUBLESHOOTING A SIMPLE NETWORK
• Troubleshooting methods
• Troubleshooting tools
• Troubleshooting common switch media issues
• Troubleshooting common switch port issues
• Troubleshooting common problems associated with IPv4 addressing
13 - INTRODUCING BASIC IPV6
• IPv4 address exhaustion workarounds
• IPv6 features
• IPv6 addresses and address types
• Comparison of IPv4 and IPv6 header
• Internet control message protocol version 6
• Neighbor discovery
• IPv6 address allocation
• Configure basic IPv6 conncetivity
• Verification of end-to-end IPv6 connectivity
14 - CONFIGURING STATIC ROUTING
• Routing Operation
• Static and dynamic routing comparison
• When to use static routing
• IPv4 static route configuration
• Default routes
• Verifying static and default route configuration
• Configure and verify IPv4 static routes
• Configuring IPv6 static routes
• Implement IPv4 static routing
• Implement IPv6 static routing
15 - IMPLEMENTING VLANS AND TRUNKS
• VLAN Introduction
• Creating a VLAN
• Assigning a port to a VLAN
• Trunking with 802.1Q
• Configuring an 802.1Q trunk
• VLAN design considerations
• Troubleshoot VLANs and trunk
16 - ROUTING BETWEEN VLANS
• Purpose of Inter-VLAN routing
• Options for the Inter-VLAN routing
• Configure a router on a stick
• Implement multiple VLANs and basic routing between the VLANs
17 - INTRODUCING OSPF
• Dynamic routing protocols
• Path selection
• Link-State routing protocol overview
• Link-State routing protocol data structures
• Introducing OSPF
• Establishing OSPF neighbor adjacencies
• OSPF neighbor states
• SPF algorithm
• Building a Link-State database
• Discovery 16: Configure and verify single-area OSPF
• Routing for IPv6
18 - BUILDING REDUNDANT SWITCHED TOPOLOGIES
• Physical redundancy in a LAN
• Issues in redundant topologies
• Spanning tree operation
• Types of spanning tree protocols
• PortFast and BPDU guard
• Rapid spanning tree protocol
19 - IMPROVING REDUNDANT SWITCHED TOPOLOGIES WITH ETHERCHANNEL
• EtherChannel overview
• EtherChannel configuration options
• Configuring and verifying EtherChannel
• Improve redundant switched topologies with EtherChannel
20 - EXPLORING LAYER 3 REDUNDANCY
• Need for default gateway redundancy
• Understanding FHRP
• Understanding HSRP
21 - INTRODUCING WAN TECHNOLOGIE
• Introduction to WAN technologies
• WAN devices and demarcation point
• WAN topology options
• WAN connectivity options
• Virtual private networks
• Enterprise-manged VPNs
• Provider-managed VPNs
22 - EXPLAINING BASICS OF ACL
• ACL overview
• ACL operation
• ACL wildcard masking
• Wildcard mask abbreviations
• Types of basic ACLs
• Configuring standard IPv4 ACLs
• Configuring extended IPv4 ACLs
• Verifying and modifying IPv4 ACLs
• Applying IPv4 ACLs to filter network traffic
• Implement numbered and named IPv4 ACLs
23 - ENABLING INTERNET CONNECTIVITY
• Introducing network address translation
• NAT terminology and translation mechanisms
• Benefits and drawbacks of NAT
• Static NAT and port forwarding
• Dynamic NAT
• Port address translation
• Configuring and verifying inside IPv4 NAT
• Implement PAT
24 - INTRODUCING QOS
• Converged networks
• Quality of service defined
• QoS policy
• QoS mechanisms
• QoS models
• Deploying end-to-end QoS
25 - EXPLAINING WIRELESS FUNDAMENTALS
• Wireless technologies
• WLAN architechtures
• WiFi channels
• AP and WLC management
• Log into the WLC
• Monitor the WLC
• Configure a dynamic (VLAN) interface
• Configure a DHCP scope
• Configure a WLAN
• Define a RADIUS server
• Explore management options
26 - INTRODUCING ARCHITECTURES AND VIRTUALIZATION
• Introduction to network design
• Enterprise three-tier hierarchical network design
• Spine-leaf network design
• Cisco enterprise architecture model
• Cloud computing overview
• Network device architecture
• Virtualization fundamentals
27 - EXPLAINING THE EVOLUTION OF INTELLIGENT NETWORKS
• Overview of network programmability in enterprise networks
• Software-defined networking
• Common programmability protocols and methods
• Configuration management tools
• Introducing Cisco DNA center
• Introducing Cisco SD-Access
• Introducing Cisco SD-WAN
28 - INTRODUCING SYSTEM MONITORING
• Introducing Syslog
• Syslog message format
• SNMP overview
• Enabling network time protocol
• Configure and verify NTP
• Configure system message logging
29 - MANAGING CISCO DEVICES
• Cisco IOS intergrated file system adn devices
• Stages of the router power-on boot sequence
• Loading and managing system images files
• Loading Cisco IOS configuration files
• Validating Cisco IOS images using MD5
• Managing Cisco IOS images and device configuration files
• Create the Cisco IOS impage backup
• Upgrade Cisco IOS image
30 - EXAMINING THE SECURITY THREAT LANDSCAPE
• Security threat landscape overview
• Malware
• Hacking tools
• Denial of service and distributed denial of service
• Spoofing
• Reflection and amplification attacks
• Social engineering
• Evolution of Phishing
• Password attacks
• Reconnaissance attacks
• Buffer overflow attacks
• Man-in-the-middle attacks
• Vectors of data loss and exfiltration
• Other considerations
31 - IMPLEMENTING THREAT DEFENSE TECHNOLOGIES
• Information security overview
• Firewalls
• Intrusion prevention systems
• Protection against data loss and phishing attacks
• Defending against DoS and DDoS attacks
• Introduction to cryptographic technologies
• IPsec security services
• Seccure sockets Layer and transport layer securiy
• Wireless security protocols
• Configure WLAN using WPA2 PSK using the GUI
32 - SECURING ADMINISTRATIVE ACCESS
• Network device security overview
• Securing access to privileged EXEC mode
• Securing console access
• Securing remote access
• Configuring the login banner
• Limiting remote access with ACLs
• Enable and limit remote access connectivity
• External authentication options
• Secure device administrative access
33 - IMPLEMENTING DEVICE HARDENING
• Securing unused ports
• Infrastructure ACL
• Disabling unused services
• Port security
• Configure and verify port security
• Mitigating VLAN attacks
• DHCP snooping
• Dynamic ARP inspection
• Mitigation STP attacks
• Implement device hardening