Βρείτε Σεμινάρια
x

Σεμινάριο εξ αποστάσεως

Cisco CCNA (Official Cisco Networking Academy version)

Διοργανωτής Σεμιναρίου E-Learning:
New Horizons
Το σεμινάριο έχει λήξει! Αναζητήστε παρόμοια σεμινάρια στην κατηγορία Πληροφορική

Σε ποιους απευθύνεται

TARGET AUDIENCE
The Cisco Networking Academy® CCNA curriculum is designed for participants who are seeking or have jobs in the ICT industry. Relevant job titles: Network Engineer, Network Administrator, IT support technician. Prerequisites: basic knowledge of computer networks.

Περιγραφή σεμιναρίου

This is an official Cisco Academy course and consists of 3 modules: Introduction to Networks, Routing Switching & Wireless Essentials, Enterprise Networking Security & Automation. 

COURSE OUTLINE

1 - EXPLORING THE FUNCTIONS OF NETWORKING
•  What is a computer network?
•  Components of a network
•  Characteristics of a network
•  Physical vs. Logical Topologies
•  Interpreting a network diagram
•  Impact of user applications on the network

2 - INTRODUCING THE HOST-TO-HOST COMMUNICATIONS MODEL
•  Host-to-host communications overview
•  ISO OSI reference model
•  TCP/IP protocol Suite
•  Peer-to-peer communications
•  Encapsulation and de-encapsulation
•  TCP/IP stack vs OSI reference model

3 - OPERATING CISCO IOS SOFTWARE
•  Cisco IOS software features and functions
•  Cisco IOS software CLI functions
•  Cisco IOS software models

4 - INTRODUCING LANS
•  Local area networks
•  LAN components
•  Need for switches
•  Characteristics and features of switches

5 - EXPLORING THE TCP/IP LINK LAYER
•  Ehernet LAN connection media
•  Ethernet frame structure
•  LAN communication types
•  MAC addresses
•  Frame switching
•  Discovery 2: Observe how a switch operate
•  Duplex communication

6 - STARTING A SWITCH
•  Switch installation
•  Connecting to a console port
•  Switch LED indicators
•  Basic show commands and information
•  Discovery 3: Perform basic switch configuration
•  Implement the initial switch configuration

7 - INTRODUCING THE TCP/IP INTERNET LAYER, IPV4 ADDRESSING, AND SUBNETS
•  Internet protocol
•  Decimal and binary number systems
•  Binary-to-decimal conversion
•  Decimal-to-binary conversion
•  IPv4 address representation
•  IPv4 header fields
•  IPv4 address classes
•  Subnet masks
•  Subnets
•  Implementing subnetting: Bowwing bits
•  Implementing subnetting: Determining the addressing scheme
•  Benefits of VLSM and Implementing VLSM
•  Private vs. Public IPv4 addresses
•  Reserved IPv4 addresses
•  Verifying IPv4 address of a host

8 - EXPLAINING THE TCP/IP TRANSPORT LAYER AND APPLICATION LAYER
•  TCP/IP transport layer functions
•  Reliable vs. Best-effort transport
•  TCP characteristics
•  UDP characteristics
•  TCP/IP application layer
•  Introducing HTTP
•  Domain name system
•  Explaining DHCP for IPv4

9 - EXPLORING THE FUNCTIONS OF ROUTING
•  Role of a router
•  Router components
•  Router functions
•  Routing table
•  Path determination

10 - CONFIGURING A CISCO ROUTER
•  Initial router setup
•  Configuring router interfaces
•  Configuring IPv4 addresses on router interfaces
•  Checking interface configuration and status
•  Discovery 5: Configure an interface on a Cisco router
•  Exploring connected devices
•  Using Cisco Discovery Protocol
•  Configure and verify LLDP
•  Implement an initial router configuration

11 - EXPLORING THE PACKET DELIVERY PROCESS
•  Layer 2 addressing
•  Layer 3 addressing
•  Default gateways
•  Address resolution protocol
•  Host-to-host packet deliver

12 - TROUBLESHOOTING A SIMPLE NETWORK
•  Troubleshooting methods
•  Troubleshooting tools
•  Troubleshooting common switch media issues
•  Troubleshooting common switch port issues
•  Troubleshooting common problems associated with IPv4 addressing

13 - INTRODUCING BASIC IPV6
•  IPv4 address exhaustion workarounds
•  IPv6 features
•  IPv6 addresses and address types
•  Comparison of IPv4 and IPv6 header
•  Internet control message protocol version 6
•  Neighbor discovery
•  IPv6 address allocation
•  Configure basic IPv6 conncetivity
•  Verification of end-to-end IPv6 connectivity

14 - CONFIGURING STATIC ROUTING
•  Routing Operation
•  Static and dynamic routing comparison
•  When to use static routing
•  IPv4 static route configuration
•  Default routes
•  Verifying static and default route configuration
•  Configure and verify IPv4 static routes
•  Configuring IPv6 static routes
•  Implement IPv4 static routing
•  Implement IPv6 static routing

15 - IMPLEMENTING VLANS AND TRUNKS
•  VLAN Introduction
•  Creating a VLAN
•  Assigning a port to a VLAN
•  Trunking with 802.1Q
•  Configuring an 802.1Q trunk
•  VLAN design considerations
•  Troubleshoot VLANs and trunk

16 - ROUTING BETWEEN VLANS
•  Purpose of Inter-VLAN routing
•  Options for the Inter-VLAN routing
•  Configure a router on a stick
•  Implement multiple VLANs and basic routing between the VLANs

17 - INTRODUCING OSPF
•  Dynamic routing protocols
•  Path selection
•  Link-State routing protocol overview
•  Link-State routing protocol data structures
•  Introducing OSPF
•  Establishing OSPF neighbor adjacencies
•  OSPF neighbor states
•  SPF algorithm
•  Building a Link-State database
•  Discovery 16: Configure and verify single-area OSPF
•  Routing for IPv6

18 - BUILDING REDUNDANT SWITCHED TOPOLOGIES
•  Physical redundancy in a LAN
•  Issues in redundant topologies
•  Spanning tree operation
•  Types of spanning tree protocols
•  PortFast and BPDU guard
•  Rapid spanning tree protocol

19 - IMPROVING REDUNDANT SWITCHED TOPOLOGIES WITH ETHERCHANNEL
•  EtherChannel overview
•  EtherChannel configuration options
•  Configuring and verifying EtherChannel
•  Improve redundant switched topologies with EtherChannel

20 - EXPLORING LAYER 3 REDUNDANCY
•  Need for default gateway redundancy
•  Understanding FHRP
•  Understanding HSRP

21 - INTRODUCING WAN TECHNOLOGIE
•  Introduction to WAN technologies
•  WAN devices and demarcation point
•  WAN topology options
•  WAN connectivity options
•  Virtual private networks
•  Enterprise-manged VPNs
•  Provider-managed VPNs

22 - EXPLAINING BASICS OF ACL
•  ACL overview
•  ACL operation
•  ACL wildcard masking
•  Wildcard mask abbreviations
•  Types of basic ACLs
•  Configuring standard IPv4 ACLs
•  Configuring extended IPv4 ACLs
•  Verifying and modifying IPv4 ACLs
•  Applying IPv4 ACLs to filter network traffic
•  Implement numbered and named IPv4 ACLs

23 - ENABLING INTERNET CONNECTIVITY
•  Introducing network address translation
•  NAT terminology and translation mechanisms
•  Benefits and drawbacks of NAT
•  Static NAT and port forwarding
•  Dynamic NAT
•  Port address translation
•  Configuring and verifying inside IPv4 NAT
•  Implement PAT

24 - INTRODUCING QOS
•  Converged networks
•  Quality of service defined
•  QoS policy
•  QoS mechanisms
•  QoS models
•  Deploying end-to-end QoS

25 - EXPLAINING WIRELESS FUNDAMENTALS
•  Wireless technologies
•  WLAN architechtures
•  WiFi channels
•  AP and WLC management
•  Log into the WLC
•  Monitor the WLC
•  Configure a dynamic (VLAN) interface
•  Configure a DHCP scope
•  Configure a WLAN
•  Define a RADIUS server
•  Explore management options

26 - INTRODUCING ARCHITECTURES AND VIRTUALIZATION
•  Introduction to network design
•  Enterprise three-tier hierarchical network design
•  Spine-leaf network design
•  Cisco enterprise architecture model
•  Cloud computing overview
•  Network device architecture
•  Virtualization fundamentals

27 - EXPLAINING THE EVOLUTION OF INTELLIGENT NETWORKS
•  Overview of network programmability in enterprise networks
•  Software-defined networking
•  Common programmability protocols and methods
•  Configuration management tools
•  Introducing Cisco DNA center
•  Introducing Cisco SD-Access
•  Introducing Cisco SD-WAN

28 - INTRODUCING SYSTEM MONITORING
•  Introducing Syslog
•  Syslog message format
•  SNMP overview
•  Enabling network time protocol
•  Configure and verify NTP
•  Configure system message logging

29 - MANAGING CISCO DEVICES
•  Cisco IOS intergrated file system adn devices
•  Stages of the router power-on boot sequence
•  Loading and managing system images files
•  Loading Cisco IOS configuration files
•  Validating Cisco IOS images using MD5
•  Managing Cisco IOS images and device configuration files
•  Create the Cisco IOS impage backup
•  Upgrade Cisco IOS image

30 - EXAMINING THE SECURITY THREAT LANDSCAPE
•  Security threat landscape overview
•  Malware
•  Hacking tools
•  Denial of service and distributed denial of service
•  Spoofing
•  Reflection and amplification attacks
•  Social engineering
•  Evolution of Phishing
•  Password attacks
•  Reconnaissance attacks
•  Buffer overflow attacks
•  Man-in-the-middle attacks
•  Vectors of data loss and exfiltration
•  Other considerations

31 - IMPLEMENTING THREAT DEFENSE TECHNOLOGIES
•  Information security overview
•  Firewalls
•  Intrusion prevention systems
•  Protection against data loss and phishing attacks
•  Defending against DoS and DDoS attacks
•  Introduction to cryptographic technologies
•  IPsec security services
•  Seccure sockets Layer and transport layer securiy
•  Wireless security protocols
•  Configure WLAN using WPA2 PSK using the GUI

32 - SECURING ADMINISTRATIVE ACCESS
•  Network device security overview
•  Securing access to privileged EXEC mode
•  Securing console access
•  Securing remote access
•  Configuring the login banner
•  Limiting remote access with ACLs
•  Enable and limit remote access connectivity
•  External authentication options
•  Secure device administrative access

33 - IMPLEMENTING DEVICE HARDENING
•  Securing unused ports
•  Infrastructure ACL
•  Disabling unused services
•  Port security
•  Configure and verify port security
•  Mitigating VLAN attacks
•  DHCP snooping
•  Dynamic ARP inspection
•  Mitigation STP attacks
•  Implement device hardening

Πληροφορίες συμμετοχής

Course Length: 5 Days

You will receive a Cisco certificate of completion.

Κόστος Συμμετοχής

Για πληροφορίες σχετικά με το κόστος συμμετοχής επικοινωνήστε με το φορέα εκπαίδευσης

Φόρμα Εκδήλωσης Ενδιαφέροντος

Τα στοιχεία σας αποστέλλονται απευθείας στην εταιρεία που διοργανώνει το πρόγραμμα εκπαίδευσης.