CCNA Routing and Switching Training Course Overview
As part of our CCNA course, you will learn networking fundamentals and sophisticated concepts through simulations and hands-on practice. The CCNA certification in Dubai program will prepare you for employment and success in positions involving the networking of devices and computers.
Whether you want to land your first job or pursue further specialization in research, CCNA preparation is a great starting point. The CCNA Certification certifies associate-level proficiency in the knowledge and abilities required to safeguard Cisco networks.
A certification program for beginning network engineers called CCNA R&S – Cisco Certified Network Associate (CCNA) Routing and Switching – allows you to make the most of your basic networking knowledge while also boosting the value of your company’s network.
The CCNA Routing and Switching Certification Course is open to anybody who meets the prerequisites.
Discover how to communicate with network administrators and IT managers more effectively.
Windows and Linux network administrators
Project managers and salesmen in the technology sector
Certification for CCNA Routing and Switching Learning Objectives
Troubleshoot hardware and network issues in a Cisco environment.
Upgrades to Cisco hardware and setup and configuration of software.
Engage in productive user interaction and communication to pinpoint network problems and upgrade needs.
Be a team player who gets along well with others.
Initial Network Concepts
1.1 Describe the purpose and role of network components.
Switches at the L2 and L3 levels 1.1.a Routers
1.1.c Modern firewalls and IPS
Access points, 1.1.d
Endpoints 1.1.f Servers 1.1.g Controllers (Cisco DNA Center and WLC)
1.2 List the traits of network topology architectures.
2 tier 1.2.a 1.2.b 3 tier
Spine-leaf (1.2.c)
1.2.d WAN
1.2.e Home or small office (SOHO)
On-premises and cloud computing
Compare the many kinds of physical interfaces and cabling
1.3.a Copper, multimode fibre, and single-mode fiber.
1.3.b Relationships (Ethernet shared media and point-to-point)
1.3.c PoE concepts
1.4 Spot problems with the interface and cable (collisions, errors, mismatched duplex or speed, etc.)
1.5 TCP vs. UDP comparison
1.6 Set up and check IPv4 addressing and subnetting 1.7 Explain why private IPv4 addressing is necessary 1.8 Set up and check IPv6 addressing and prefix
1.9 Examine IPv6 address formats
1.9.a International unicast 1.9.b Locally specific 1.9.c Local links 1.9.d Anycast 1.9.e Multicast
Modified EUI 64 1.9.f
1.10 Check Client OS IP Parameters (Windows, Mac OS, Linux)
1.11 Explain wireless principles.
1.11.a Wi-Fi channels that don’t overlap
SSID 1.11.b 1.11.c RF
1.11.d Encryption 1.12 Describe the foundations of virtualization (virtual machines)
1.13 Explain concept changes
1.13.a MAC learning and aging
Frame switching, frame flooding, MAC address table, and 1.13.b
Setup and test VLANs (typical range) across several switches in 2.0 Network Access 2.1
2.1.a Ports for access (data and voice)
2.1.b Standard VLAN
Connectivity (2.1.c)
2.2 Establish inter-switch communication and confirm it
Trunk ports (2.2.a)
2.2.b 802.1Q
2.
Native VLAN 2.c
Set up and check Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)
2.4 Set up and check the Layer 2 and Layer 3 ether channels (LACP)
2.5 Explain the necessity of the Quick PVST+ Spanning Tree Protocol and its fundamental operations.
2.5.a Root port names, primary/secondary root bridge names, and other port names
2.5.b Forwarding/blocking port states
2.c PortFast advantages
2.6 Compare the AP modes and Cisco Wireless Architectures
2.7 Explain how WLAN components (AP, WLC, access/trunk ports, and LAG) are connected to the physical infrastructure.
2.8 Explain the AP and WLC management access connections (console, TACACS+/RADIUS, SSH, HTTP, and HTTPS).
2.9 Only use the GUI to configure the wireless LAN access components for client connectivity, including WLAN setup, security configurations, QoS profiles, and advanced WLAN configurations.
IP connectivity 3.0
3.1 Explain the elements of the routing table.
Routing protocol code, 3.1.a
Prefix 3.1.b
Network mask (3.1.c)
3.1.d Upcoming hop
Administrative distance (3.1.e)
measure 3.1.f
3.1.g Last-resort gateway
Find out how a router decides to forward traffic by default in section 3.2. 3.2.a Longest match
Administrative distance (3.2.b)
Routing protocol metric 3.2.c
3.3 Set up and check static IPv4 and IPv6 routing
Default route: 3.3.a
Network route (3.3.b)
Hosting route
floating static in 3.3.d
3.4 Set up and test OSPFv2 for a single area
3.4.a Adjacencies with neighbors
Point-to-point 3.4.b
Broadcast (DR/BDR selection), clause 3.4.c
Router ID (3.4.d)
3.5 Explain the first hop redundancy protocol’s objectives.
IP Services 4.0
4.1 Set up and test internal source NAT with static and pools
4.2 Set up and test NTP in both client and server modes.
4.3 Describe the functions of DNS and DHCP in a network.
4.4 Describe how SNMP is used in network operations.
4.5 Explain how to use the facilities and levels of Syslog.
4.6 Set up and check the DHCP client and relay.
4.7 Describe the forwarding per-hop behavior (PHB) for quality of service (QoS), including classification, marking, queuing, congestion, policing, and shaping.
4.8 Set up network hardware for remote access using SSH
4.9 Explain TFTP/capabilities FTP’s and their role in the network.
5.0 Basics of Security
5.1 Describe essential security ideas (threats, vulnerabilities, exploits, and mitigation techniques)
5.2 List the components of a security program (user awareness, training, and physical access control)
5.3 Set local passwords for device access control
5.4 Explain the components of security password rules, such as management, difficulty, and alternate passwords (multifactor authentication, certificates, and biometrics)
5.5 Explain site-to-site VPNs and remote access.
5.6 Establishing and confirming access control lists
5.7 Set up Layer 2 security components (DHCP snooping, dynamic ARP inspection, and port security)
5.8 Distinguish ideas of authorization, authentication, and accounting
Explain wireless security protocols in 5.9 (WPA, WPA2, and WPA3)
5.10 Use the GUI to configure WLAN with WPA2 PSK
6.0 Programmability And Automation
6.1 Describe the effects of automation on network administration.
6.2 Contrast controller-based networking with conventional networks.
6.3 Explain software-defined architectures and controller-based architectures (overlay, underlay, and fabric)
6.3.a Control plane and data plane separation
North- and south-bound APIs (paragraph 6.3.b)
6.4 Compare Cisco DNA Center-enabled device management to conventional campus device management.
6.5 List the traits of REST-based APIs (CRUD, HTTP verbs, and data encoding)
6.6 Acknowledge the capabilities of Puppet, Chef, and Ansible as configuration management tools.
6.7 Decode data represented in JSON