Your Instructor
Exam Prep Tips
CCNA is course for networking this CISCO Router is the main component to build a computer network. This hands-on course is our recommended curriculum for those who want to upgrade, to building a network, maintain and troubleshoot networks. This course covers the range CISCO Routers . This is a preliminary course recommended for candidates wish to enter Network and System administration field
Cisco Certified Network Associate Security (CCNA Security) validates the knowledge and skills necessary to secure Cisco networks at the associated level. A network professional shows the skills needed to develop a security infrastructure with a CCNA Security certification, recognizes threats and vulnerabilities to networks, and mitigates security threats. The CCNA Security curriculum emphasizes core security technologies, installation, troubleshooting and monitoring of network devices to maintain data and devices integrity, confidentiality and availability, and competency in the technologies used by Cisco in its security structure.
A CCNA Security certification will enable you to develop a security infrastructure using Cisco network devices, acquire network device installation and monitoring skills, and recognize and control security structure threats. This latest version of CCNA Security course IINS v3 aims to deliver core security concepts, VPN encryption, secure access management, firewall, intrusion prevention, endpoint security along with email and web security.
Participants will learn how to install, troubleshoot, and monitor secure networks through this CCNA Security certification training to maintain confidentiality, device availability, and data and integrity.
After completing the CCNA Security training you will acquire skills to help you have a better understanding of the security threats and learn how to take preventive steps to stop such threats.
Your Instructor
Exam Prep Tips
What is A Network?
The OSI Model
The Data Transmission Process
The TCP/IP Model
Why Use Networking Models?
TCP And UDP - Part 1
TCP And UDP - Part 2
Ports
Sockets
Port Numbers
The Need For And Operation of CSMA/CD
Ethernet Types And Standards
Pins And Transmissions
Crosstalk
Cable Types
Ethernet Addressing
Intro to WAN Cabling and a Cable Type Review
Repeaters, Hubs and Bridges
Building the MAC Table
"Flood, Filter or Forward?"
Frame Processing Methods
Virtual LANs
Cisco Three-Layer Switching Model
Introduction to STP
Basic Switch Security
Port Security Defaults, Options and Configurations
Telnet and SSH
User, Enable and Privilege Modes
Enable Password vs. Enable Secret
"privilege level 15"
Physical Side of Cisco Switches
Assigning an IP Address and Default Gateway To The Switch
Speed, Duplex, and "Interface Range"
Banners, "logging synch", and "exec-timeout"
Keystroke Shortcuts and Manipulating History
IP Addressing and Binary Conversions
IP Address Classes
Private IP Address Ranges
Intro to the Routing Process
Keeping Subnets On One "Side" of the Router
One Destination, Two Destination Addresses
DNS and DHCP Process
The ARP Process
Routers, Broadcasts, and Proxy ARP
Configuring DHCP on a Cisco Router With SDM
ROM, RAM, NVRAM, And Flash
The Boot Process
Setup Mode
Startup And Running Configuration Files
The COPY Command
IOS Upgrading
The Configuration Register
Wireless Network Types
Standards and Ranges
Spread Spectrum
Antenna Types
CA vs. CD
SSIDs and MAC Address Authentication
WEP, WPA, and WPA2
"The Secret" (Of Binary Success, That Is)
Decimal > Binary, Binary > Decimal
Subnetting Basics
Calculating Number of Valid Subnets
Prefix Notification
Calculating Number of Valid Hosts
Calculating Number of Valid IP Addresses in a Given Subnet
Calculating the Subnet Number of a Given IP Address
Meeting Stated Design Requirements
Static Routing Theory and Labs
RIP Routing Theory and Labs
"show ip protocols", "show ip route rip", "debug ip rip", And More!
Physical Side of WANs
Directly Connecting Cisco Routers Via Serial Interfaces
HDLC and
Intro to Frame Relay
RFC 1918 Addresses, NAT and PAT
Intro to ATM
Modems and DSL Variations
Where to Begin
Cisco Discovery Protocol (CDP)
L1 and L2 Troubleshooting
LAN Troubleshooting
WAN Troubleshooting
Telnet and SSH Review and Maintenance Commands
Administrative Distance
Extended Ping and Traceroute
The Real Key to Troubleshooting
Firewalls and Proxy Servers
The Attacker's Arsenal
Intro to PIX, ASA, IDS, and IPS
Viruses, Worms, and Trojan Horses
Preventing Virus Attacks
One Final Cisco "Secret"
Your Instructor
CCNA Exam Paths
STP
Root Bridges, Root Ports, and Designated Ports
STP Timers and Port States
Portfast
VLANs and Trunking
Access and Trunk Port Comparison
VTP
"Router on a Stick"
RSTP and PVST
Etherchannels
HDLC vs. PPP
PPP Features
PAP and CHAP
Frame Relay Introduction
Frame Relay LMI Theory
Frame Relay Configs, DLCIs, Frame Maps, and Inverse ARP
Frame Sub-Interfaces3
Split Horizon
Frame Relay LMI Show, Debug, and Lab
FECN, BECN, DE bits
PVC Status Meanings
Static Routing Theory and Configuration
Distance Vector Protocol Behavior - Split Horizon and Route Poisoning
RIP Theory and Version Differences
The Joy of "show ip protocols"
RIP Limitations
RIP Timers
Floating Static Routes
IPv6 Theory and Introduction
Zero Compression and Leading Zero Compression
IPv6 Reserved Addresses
The Autoconfiguration Process
OSPF v3 Basics
Transition Strategies
NAT Theory and Introduction
Static NAT Configuration
Dynamic NAT Configuration
PAT Configuration
Introduction to EIGRP
Successors and Feasible Successors
EIGRP vs. RIPv2
Basic Configuration
Wildcard Masks
Load Sharing (Equal and Unequal-cost)
EIGRP, RIPv2, and Autosummarization
Passive vs. Active Routes
IPv6 Theory and Introduction
Zero Compression and Leading Zero Compression
IPv6 Reserved Addresses
The Autoconfiguration Process
OSPF v3 Basics
Transition Strategies
NAT Theory and Introduction
Static NAT Configuration
Dynamic NAT Configuration
PAT Configuration
Definitions and Tunneling Protocols
Data Encryption Technologies
Key Encryption Schemes
IPSec, AH and ESP
A VPN in Your Web Browser
ACL Login and the Implicit Deny
Standard ACLs and Remarks
"Host" and "Any"
The Order of the Lines
Extended ACLs
Named ACLs
Telnet Access, Placing ACLs, and Blocking Pings
Dynamic and Time-Based ACLs
Port Number Review
Route Summarization with RIP and EIGRP