Cisco Certified Network Associate (200-301) Pearson Skilling Suite
🔍 Click to enlarge photo

Cisco Certified Network Associate CCNA (200-301 v1.1) Pearson Skilling Suite

Web price: Rs16,584.91
Member price: Rs16,584.91
Qty
Description
Overview:

Cisco is a world-wide leader in IT, networking, and security solutions. Achieving the Cisco Certified Network Associate Certification (CCNA) is a valuable first step toward a career in IT. To gain CCNA certification, you must pass one exam that covers a wide range of IT fundamentals and knowledge bases including the latest networking technologies, software development skills, and job roles. CCNA certification gives you the foundation to build the career you want.

The goal of this course is to provide you with all the tools you need to prepare for the Cisco Certified Network Associate (200-301 CCNA) exam — including text explanations, video demos, lab activities, self-assessment questions, and a practice exam — to increase your chances of passing the exam on your first try

Duration:

Approximately 40 hours. Actual duration will vary by student.

Course Components:
  • Full eBook Text Lessons
  • Video learning
  • Hands-on Labs
  • Certification Practice Exams
Audience:

Aspiring Network Professionals:

  • Individuals with little to no prior IT experience who are looking to start a career in networking. The CCNA is an entry-level certification that provides the foundational knowledge and skills needed for a variety of IT and networking roles.
  • Existing IT Professionals: This includes help desk technicians, systems administrators, and other IT specialists who want to expand their skillset to include networking. Earning the CCNA can help them advance their careers, increase their earning potential, and transition into more specialized networking roles.
  • Network Administrators and Support Technicians: These professionals may already be working with networks but want to formalize their skills with a globally recognized certification. The CCNA validates their expertise and demonstrates their ability to manage and troubleshoot Cisco-based networks.
  • Students and Recent Graduates: Those in IT-related programs or who have recently graduated and are looking for a competitive edge in the job market. The CCNA is a highly sought-after credential by employers for entry-level networking positions.
Recomended Prerequisites
  • Recommended 1 year experience implementing and administering Cisco solutions
  • Basic knowledge of course objectives
Objectives:

Upon successful completion of a CCNA training course, students should be able to:

Network Fundamentals
  • Explain the role and function of various network components like routers, switches, access points, and firewalls:
    • Routers: Interconnect different IP networks, making forwarding decisions based on IP addresses (Layer 3).
    • Switches: Connect devices within a local network (LAN), forwarding data based on MAC addresses (Layer 2).
    • Access Points (APs): Create a Wireless LAN (WLAN), allowing devices to connect using Wi-Fi signals.
    • Firewalls: Monitor and control network traffic, enforcing security policies to protect the network perimeter.
  • Describe different network architectures and topologies (e.g., two-tier, three-tier, spine-leaf):
    • Two-tier: Simplified architecture with Access and Core layers.
    • Three-tier: Traditional hierarchical model with Access, Distribution (policy enforcement), and Core layers.
    • Spine-leaf: A flattened, high-speed, non-blocking data center topology, connecting every leaf (access) switch to every spine (backbone) switch.
  • Compare physical interfaces and cabling types, and identify common issues like collisions and errors:
    • Interfaces: Ports like RJ-45 (Ethernet) for copper and LC/SC for fiber optics.
    • Cabling: Copper (Cat 6/6A) is cost-effective but limited in distance; Fiber Optic is for high bandwidth and long distances, immune to EMI.
    • Issues: Collisions (simultaneous transmission on shared media) and Errors (e.g., CRC errors indicating data corruption).
  • Understand IPv4 and IPv6 addressing, subnetting, and the differences between TCP and UDP:
    • IPv4: Uses 32-bit addresses; supports subnetting to segment networks.
    • IPv6: Uses 128-bit addresses for a massive address space.
    • TCP: Connection-oriented, reliable protocol with error checking and sequencing (e.g., HTTP).
    • UDP: Connectionless, unreliable protocol that prioritizes speed over delivery guarantees (e.g., DNS, VoIP).
  • Explain the fundamentals of wireless networking and virtualization:
    • Wireless: Uses radio waves (IEEE 802.11 standards) for connectivity, managed by Access Points and SSIDs.
    • Virtualization: The creation of a logical version of a resource (e.g., server, OS, or network function) on shared physical hardware, enhancing resource utilization.
Network Access
  • Configure and verify VLANs and trunking to segment a network and allow inter-VLAN communication:
    • VLANs: Logically segment a physical switch into multiple broadcast domains for improved security and performance.
    • Trunking: Carries traffic for multiple VLANs over a single link between switches or a switch and a router (using 802.1Q tagging).
  • Implement Layer 2 discovery protocols like CDP and LLDP:
    • CDP (Cisco Discovery Protocol): Proprietary protocol to discover directly connected Cisco devices.
    • LLDP (Link Layer Discovery Protocol): Industry-standard protocol for discovering neighboring devices from any vendor.
  • Configure and troubleshoot EtherChannel and Spanning Tree Protocol (STP) to ensure network redundancy and prevent loops:
    • EtherChannel (LAG): Bundles multiple physical links into one logical link for increased bandwidth and link redundancy.
    • STP: Logically blocks redundant paths on switches to prevent Layer 2 loops (broadcast storms) while maintaining fault tolerance.
  • Describe the components and connections of a wireless LAN (WLAN):
    • Components: Access Points (APs), Wireless LAN Controller (WLC) (optional), and client devices.
    • Connections: Client devices connect wirelessly to the AP via an SSID, and the AP is wired to the network infrastructure.
IP Connectivity
  • Interpret the components of a routing table and understand how a router makes forwarding decisions:
    • Routing Table: Includes Destination Network, Next Hop, Outgoing Interface, and Administrative Distance.
    • Forwarding: Router uses the longest prefix match rule and the best route (lowest Administrative Distance) to determine the path for a packet.
  • Configure and verify both IPv4 and IPv6 static routing:
    • Static Routing: Manually configured, fixed routes, suitable for small or stub networks, requiring no overhead.
  • Implement and troubleshoot single-area OSPFv2:
    • OSPFv2 (Open Shortest Path First): A link-state dynamic routing protocol for IPv4. Single-area simplifies the design by placing all routers in Area 0.
  • Explain the purpose of First Hop Redundancy Protocols (FHRPs):
    • FHRPs (e.g., HSRP, VRRP): Provide an active/standby mechanism to ensure the default gateway remains available even if the primary router fails, offering gateway redundancy.
IP Services
  • Configure and verify Network Address Translation (NAT) and Network Time Protocol (NTP):
    • NAT: Translates private internal IP addresses to a public external IP address, conserving public IP space.
    • NTP: Synchronizes the clocks of network devices, which is critical for accurate log analysis and security.
  • Explain the role of services like DHCP, DNS, SNMP, and syslog:
    • DHCP: Automatically assigns IP configurations (address, subnet mask, gateway) to network clients.
    • DNS: Translates domain names (e.g., https://www.google.com/search?q=google.com) into IP addresses.
    • SNMP: Enables centralized monitoring and management of network devices by an NMS.
    • Syslog: Standardized protocol for collecting system and event messages from network devices to a central server.
  • Configure devices for secure remote access using SSH:
    • SSH (Secure Shell): Provides an encrypted, secure command-line interface for remotely managing network devices, replacing the insecure Telnet protocol.
Security Fundamentals
  • Define key security concepts, threats, and vulnerabilities:
    • Concepts: CIA Triad (Confidentiality, Integrity, Availability).
    • Threats: Potential dangers that could exploit a vulnerability (e.g., malware, hacker).
    • Vulnerabilities: Weaknesses in a system that can be exploited (e.g., unpatched software, weak passwords).
  • Configure and verify access control lists (ACLs) to filter network traffic:
    • ACLs: Ordered lists of permit/deny rules applied to router/switch interfaces to filter packets based on criteria like source/destination IP and port.
  • Implement Layer 2 security features like port security and DHCP snooping:
    • Port Security: Restricts the number or specific MAC addresses allowed on a switch port to prevent unauthorized devices.
    • DHCP Snooping: Filters untrusted DHCP messages to prevent rogue DHCP servers and protect the DHCP process.
  • Describe wireless security protocols (WPA, WPA2, WPA3):
    • WPA2: Uses AES encryption and is the current industry standard.
    • WPA3: The latest standard, offering stronger encryption and enhanced protection against password guessing and security for open networks.
Automation and Programmability
  • Explain how network automation impacts network management:
    • Impact: Reduces manual configuration and human error, speeds up provisioning and deployment, and allows engineers to focus on strategic tasks.
  • Compare traditional networks with controller-based and software-defined architectures:
    • Traditional: Decoupled management, configuration done individually on each device.
    • Controller-based/SDN: Centralized management with a controller separating the control plane from the data plane, allowing for network-wide policy changes.
  • Describe the characteristics of REST-based APIs and interpret JSON-encoded data:
    • REST APIs: Use standard HTTP methods (GET, POST, PUT, DELETE) to manage network resources; they are stateless and simple.
    • JSON (JavaScript Object Notation): A lightweight, human-readable data format used by REST APIs to structure and transmit data as key-value pairs and arrays.

Volume 1

Lesson 1

  • Perspectives on Networking
  • TCP/IP Networking Model
  • Data Encapsulation Terminology

Lesson 2

  • An Overview of LANs
  • Building Physical Ethernet LANs with UTP
  • Building Physical Ethernet LANs with Fiber
  • Sending Data in Ethernet Networks

Lesson 3

  • Wide-Area Networks
  • IP Routing
  • Other Network Layer Features

Lesson 4

  • Accessing the Cisco Catalyst Switch CLI
  • Configuring Cisco IOS Software

Lesson 5

  • LAN Switching Concepts
  • Verifying and Analyzing Ethernet Switching

Lesson 6

  • Securing the Switch CLI
  • Enabling IPv4 for Remote Access
  • Miscellaneous Settings Useful in the Lab

Lesson 7

  • Configuring Switch Interfaces
  • Analyzing Switch Interface Status and Statistics

Lesson 8

  • Virtual LAN Concepts
  • VLAN and VLAN Trunking Configuration and Verification
  • Troubleshooting VLANs and VLAN Trunks

Lesson 9

  • STP and RSTP Basics
  • Details Specific to STP (and Not RSTP)
  • Rapid STP Concepts

Lesson 10

  • Understanding RSTP Through Configuration
  • Configuring Layer 2 EtherChannel

Lesson 11

  • Introduction to Subnetting
  • Analyze Subnetting and Addressing Needs
  • Make Design Choices
  • Plan the Implementation

Lesson 12

  • Classful Network Concepts
  • Practice with Classful Networks

Lesson 13

  • Subnet Mask Conversion
  • Identifying Subnet Design Choices Using Masks

Lesson 14

  • Defining a Subnet
  • Analyzing Existing Subnets: Binary
  • Analyzing Existing Subnets: Decimal
  • Practice Analyzing Existing Subnets

Lesson 15

  • Installing Cisco Routers
  • Enabling IPv4 Support on Cisco Router Interfaces

Lesson 16

  • IP Routing
  • Configuring IP Addresses and Connected Routes
  • Configuring Static Routes
  • IP Forwarding with the Longest Prefix Match

Lesson 17

  • VLAN Routing with Router 802.1Q Trunks
  • VLAN Routing with Layer 3 Switch SVIs
  • VLAN Routing with Layer 3 Switch Routed Ports

Lesson 18

  • Problem Isolation Using the ping Command
  • Problem Isolation Using the traceroute Command
  • Telnet and SSH

Lesson 19

  • Comparing Dynamic Routing Protocol Features
  • OSPF Concepts and Operation
  • OSPF Areas and LSAs

Lesson 20

  • Implementing Single-Area OSPFv2
  • Using OSPFv2 Interface Subcommands
  • Additional OSPFv2 Features

Lesson 21

  • OSPF Network Types
  • OSPF Neighbor Relationships

Lesson 22

  • Introduction to IPv6
  • IPv6 Addressing Formats and Conventions

Lesson 23

  • Global Unicast Addressing Concepts
  • Unique Local Unicast Addresses

Lesson 24

  • Implementing Unicast IPv6 Addresses on Routers
  • Special Addresses Used by Routers

Lesson 25

  • Connected and Local IPv6 Routes
  • Static IPv6 Routes
  • The Neighbor Discovery Protocol

Lesson 26

  • Comparing Wired and Wireless Networks
  • Wireless LAN Topologies
  • Other Wireless Topologies
  • RF Overview

Lesson 27

  • Autonomous AP Architecture
  • Cloud-based AP Architecture
  • Split-MAC Architectures
  • Comparing Wireless LAN Controller Deployments

Lesson 28

  • Anatomy of a Secure Connection
  • Wireless Client Authentication Methods
  • Wireless Privacy and Integrity Methods

Lesson 29

  • Connecting a Cisco AP
  • Accessing a Cisco WLC
  • Connecting a Cisco WLC
  • Configuring a WLAN

Volume 2

Lesson 1

  • TCP/IP Layer 4 Protocols: TCP and UDP
  • TCP/IP Applications

Lesson 2

  • IPv4 Access Control List Basics
  • Standard Numbered IPv4 ACLs
  • Practice Applying Standard IP ACLs

Lesson 3

  • Extended Numbered IP Access Control Lists
  • Named ACLs and ACL Editing

Lesson 4

  • Security Terminology
  • Common Security Threats
  • Controlling and Monitoring User Access
  • Developing a Security Program to Educate Users

Lesson 5

  • Securing IOS Passwords
  • Firewalls and Intrusion Prevention Systems

Lesson 6

  • Port Security Concepts and Configuration
  • Firewalls and Intrusion Prevention Systems

Lesson 7

  • Dynamic Host Configuration Protocol
  • Identifying Host IPv4 Settings

Lesson 8

  • DHCP Snooping
  • Dynamic ARP Inspection

Lesson 9

  • System Message Logging (Syslog)
  • Network Time Protocol (NTP)
  • Analyzing Topology Using CDP and LLDP

Lesson 10

  • Perspectives on IPv4 Address Scalability
  • Network Address Translation Concepts
  • NAT Configuration and Troubleshooting

Lesson 11

  • Introduction to QoS
  • Classification and Marking
  • Queuing
  • Shaping and Policing
  • Congestion Avoidance

Lesson 12

  • First Hop Redundancy Protocol
  • Simple Network Management Protocol
  • FTP and TFTP

Lesson 13

  • Analyzing Campus LAN Topologies
  • Small Office/Home Office
  • Power over Ethernet (PoE)

Lesson 14

  • Metro Ethernet
  • Multiprotocol Label Switching (MPLS)
  • Internet VPNs

Lesson 15

  • Server Virtualization
  • Cloud Computing Services
  • WAN Traffic Paths to Reach Cloud Services

Lesson 16

  • SDN and Controller-Based Networks
  • Examples of Network Programmability and SDN
  • Comparing Traditional Versus Controller-Based Networks

Lesson 17

  • SDA Fabric, Underlay, and Overlay
  • DNA Center and SDA Operation
  • DNA Center as a Network Management Platform

Lesson 18

  • REST-Based APIs
  • Data Serialization and JSON

Lesson 19

  • Device Configuration Challenges and Solutions
  • Ansible, Puppet, and Chef Basics

Lesson 20

  • Advice About the Exam Event