About this course
CCNA (200-301)
The Cisco Certified Network Associate (CCNA) course is a foundational certification focusing on networking basics, IP connectivity, IP services, security, and network automation. It covers essential topics like OSI and TCP/IP models, routing protocols, and network security. Ideal for beginners and IT professionals, the course combines theoretical lessons with hands-on labs using Cisco tools. The certification exam includes multiple-choice questions, simulations, and lasts about 120 minutes. CCNA validates fundamental networking skills and serves as a stepping stone for advanced Cisco certifications.
Prerequisites
The knowledge and skills you are expected to have before attending this training are:
- Basic computer literacy
- Basic PC operating system navigation skills
- Basic internet usage skills
- Basic IP address knowledge
Course Goals
- Learn the knowledge and skills to install, configure, and operate a small- to medium-sized network.
- Gain a foundation in the essentials of networking, security, and automation.
- Prepare for the 200-301 CCNA v1.1 exam.
Course Outlines
Network Fundamentals
Explain the role and function of network components:
- Routers
- L2 and L3 switches
- Next-generation firewalls and IPS
- Access points
- Endpoints
- Servers
Describe characteristics of network topology architectures:
- 2-tier
- 3-tier
- Spine-leaf
- WAN
- Small office/home office (SOHO)
- On-premises and cloud
Compare physical interface and cabling types:
- Single-mode fiber, multimode fiber, copper
- Connections (Ethernet shared media and point-to-point)
- Concepts of PoE
Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed).
Compare TCP to UDP.
Configure and verify IPv4 addressing and subnetting.
Describe the need for private IPv4 addressing.
Configure and verify IPv6 addressing and prefix.
Compare IPv6 address types:
- Global unicast
- Unique local
- Link local
- Anycast
- Multicast
- Modified EUI 64
Describe wireless principles:
- Non-overlapping Wi-Fi channels
- SSID
- RF
- Encryption
Explain virtualization fundamentals (virtual machines).
Describe switching concepts:
- MAC learning and aging
- Frame switching
- Frame flooding
- MAC address table
IP Connectivity
Interpret the components of a routing table:
- Routing protocol code
- Prefix
- Network mask
- Next hop
- Administrative distance
- Metric
- Gateway of last resort
Determine how a router makes a forwarding decision by default:
- Longest match
- Administrative distance
- Routing protocol metric
Configure and verify IPv4 and IPv6 static routing:
- Default route
- Network route
- Host route
- Floating static
Configure and verify single-area OSPFv2:
- Neighbor adjacencies
- Point-to-point
- Broadcast (DR/BDR selection)
- Router ID
Describe the purpose of the first hop redundancy protocol.
IP Services
- Configure and verify inside source NAT using static and pools.
- Configure and verify NTP operating in client and server mode.
- Explain the role of DHCP and DNS within the network.
- Explain the function of SNMP in network operations.
- Describe the use of syslog features including facilities and levels.
- Configure and verify DHCP client and relay.
- Explain the forwarding per-hop behavior (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping.
- Configure network devices for remote access using SSH.
- Describe the capabilities and function of TFTP/FTP in the network.
Security Fundamentals
- Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques).
- Describe security program elements (user awareness, training, and physical access control).
- Configure device access control using local passwords.
- Describe security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics).
- Describe remote access and site-to-site VPNs.
- Configure and verify access control lists.
- Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security).
- Differentiate authentication, authorization, and accounting concepts.
- Describe wireless security protocols (WPA, WPA2, and WPA3).
- Configure WLAN using WPA2 PSK using the GUI.
Automation
- Explain how automation impacts network management.
- Compare traditional networks with controller-based networking.
- Describe controller-based and software-defined architectures (overlay, underlay, and fabric):
- Separation of control plane and data plane
- North-bound and south-bound APIs