Network+, Security+, CCNA

Hours: 240 / Access Length: 12 Months / Delivery: Open, Mentor Supported
Retail Price: $3,495.00

Course Overview:

The CompTIA Security+ SY0-501 exam will be retiring on July 31, 2021.
The SY0-601 certification exam has been released and we are expecting updated content within Q1 of 2021.

This course is intended for entry-level computer support professionals with a basic knowledge of computer hardware, software, and operating systems who wish to increase their knowledge and understanding of networking concepts and acquire the required skills to prepare for a career in network support or administration, or who wish to prepare for the CompTIA Network+ certification (Exam N10-007).

Gain hands-on expertise in CompTIA Security+ certification exam by course and performance based labs. Performance based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. CompTIA Security+ is an entry-level, international, vendor-neutral credential designed for IT security professionals to identify risk, participate in risk mitigation activities, provide infrastructure, information, operational, and application security. CompTIA Security+ SY0-401 exam covers the application of security controls to maintain confidentiality, integrity, and availability; identification of appropriate technologies and products; troubleshooting security events and incidents, and many more.

Cisco CCNA Part 1 course introduces the fundamentals of the most important topics in TCP/IP networking (networking, focusing on Ethernet LANs, WANs, Virtual LANs (VLANs), Spanning Tree Protocol (STP), and IP routing). Students will learn the details of how to implement IPv4 routing in Cisco routers and the core concepts of IPv6. 

The CCNA Official Cert Guide, Part 2 includes the topics that help students build an enterprise network so all devices can communicate with all other devices and includes the majority of the new security topics added to the new CCNA 200-301 certification as well as a few of the classic topics found in previous CCNA R&S exams. Students will then turn their attention away from the concept-configure-verify approach to topics that will be presented more from an architecture and design perspective. Finally, students will examine a wide range of products and architectures that also enable better operations and automation - how controllers can separate out part of the work formerly done by networking devices, the advantages of these new controller-based models, and details about Cisco Software-Defined Access (SDA), a controller-based networking approach to building enterprise campus networks.

This course includes FREE access for 12 months to a cloud based lab platform to assist students in developing the practical information technology (IT) skills necessary to succeed in high in demand IT jobs.  This cloud based lab solution uses real equipment that enables our students to execute each practical task in a safe environment that is accessible from anywhere without needing to buy their own hardware or risk damage to their own system.

Along with providing the necessary hardware in a virtual environment, students gain access to high quality practical exercises that cover many of the exam topics they will encounter on their certifying exams.

This course prepares students to take the CompTIA N10-007: Network+, SY0-501: Security+ and Cisco CCNA 200-301 certification exams.

Course Outline:

CompTIA Network+ N10-007 Curriculum:
Lesson 1: Introduction
Lesson 2: Computer Network Fundamentals
  • Defining a Network
  • Networks Defined by Geography
  • Networks Defined by Topology
  • Wireless Topologies
  • Networks Defined by Resource Location
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
Lesson 3: The OSI Reference Model
  • The Purpose of Reference Models
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
Lesson 4: Network Components
  • Media
  • Network Infrastructure Devices
  • Specialized Network Devices
  • Virtual Network Devices
  • Voice over IP Protocols and Components
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
Lesson 5: Ethernet Technology
  • Principles of Ethernet
  • Ethernet Switch Features
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
Lesson 6: IPv4 and IPv6 Addresses
  • Binary Numbering
  • IPv4 Addressing
  • Assigning IPv4 Addresses
  • Subnetting
  • IP Version 6
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
Lesson 7: Routing IP Packets
  • Basic Routing Processes
  • Sources of Routing Information
  • Routing Protocol Characteristics
  • Routing Protocol Examples
  • Address Translation
  • Multicast Routing
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
Lesson 8: Wide Area Networks (WANs)
  • WAN Properties
  • WAN Technologies
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
Lesson 9: Wireless Technologies
  • Introducing Wireless LANs
  • Deploying Wireless LANs
  • Securing Wireless LANs
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
Lesson 10: Network Optimization
  • High Availability
  • QoS Technologies
  • Case Study: SOHO Network Design
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
Lesson 11: Command-Line Tools
  • Windows Commands
  • UNIX Commands
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
Lesson 12: Network Management
  • Maintenance Tools
  • Network Documentation
  • Monitoring Resources and Reports
  • Remote Access Methods
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
Lesson 13: Network Security
  • Security Fundamentals
  • Categories of Network Attacks
  • Defending Against Attacks
  • Remote-Access Security
  • Firewalls
  • Virtual Private Networks
  • Intrusion Detection and Prevention
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
Lesson 14: Network Policies and Best Practices
  • Policies
  • Best Practices
  • Real-World Case Study
  • Summary
  • Review All the Key Topics
Lesson 15: Network Troubleshooting
  • Troubleshooting Basics
  • Physical Layer Troubleshooting
  • Data Link Layer Troubleshooting
  • Network Layer Troubleshooting
  • Wireless Troubleshooting
  • Specialized Networks
  • Real-World Case Study
  • Troubleshooting Scenarios
  • Summary
  • Review All the Key Topics
CompTIA Security+ SY0-501 Curriculum:
Lesson 1: Introduction
  • Who Should Read This Book?
  • CompTIA Security+ Exam Topics
Lesson 2: Introduction to Security
  • Security 101
  • Think Like a Hacker
  • Threat Actor Types and Attributes
  • Review Key Topics
Lesson 3: Computer Systems Security Part I
  • Malicious Software Types
  • Delivery of Malware
  • Preventing and Troubleshooting Malware
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 4: Computer Systems Security Part II
  • Implementing Security Applications
  • Securing Computer Hardware and Peripherals
  • Securing Mobile Devices
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 5: OS Hardening and Virtualization
  • Hardening Operating Systems
  • Virtualization Technology
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 6: Application Security
  • Securing the Browser
  • Securing Other Applications
  • Secure Programming
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 7: Network Design Elements
  • Network Design
  • Cloud Security and Server Defense
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 8: Networking Protocols and Threats
  • Ports and Protocols
  • Malicious Attacks
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 9: Network Perimeter Security
  • Firewalls and Network Security
  • NIDS Versus NIPS
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 10: Securing Network Media and Devices
  • Securing Wired Networks and Devices
  • Securing Wireless Networks
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 11: Physical Security and Authentication Models
  • Physical Security
  • Authentication Models and Components
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 12: Access Control Methods and Models
  • Access Control Models Defined
  • Rights, Permissions, and Policies
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 13: Vulnerability and Risk Assessment
  • Conducting Risk Assessments
  • Assessing Vulnerability with Security Tools
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 14: Monitoring and Auditing
  • Monitoring Methodologies
  • Using Tools to Monitor Systems and Networks
  • Conducting Audits
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 15: Encryption and Hashing Concepts
  • Cryptography Concepts
  • Encryption Algorithms
  • Hashing Basics
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 16: PKI and Encryption Protocols
  • Public Key Infrastructure
  • Security Protocols
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 17: Redundancy and Disaster Recovery
  • Redundancy Planning
  • Disaster Recovery Planning and Procedures
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 18: Social Engineering, User Education, and Facilities Security
  • Social Engineering
  • User Education
  • Facilities Security
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 19: Policies and Procedures
  • Legislative and Organizational Policies
  • Incident Response Procedures
  • IT Security Frameworks
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Cisco Certified Network Associate (CCNA) 100-105 Curriculum:
Lesson 1: Introduction
  • About the Exams
  • Part Features
  • Book Organization, Lessons, and Appendixes
Lesson 2: Introduction to TCP/IP Networking
  • Perspectives on Networking
  • TCP/IP Networking Model
  • OSI Networking Model
  • Lesson Summary
  • Review All the Key Topics
Lesson 3: Fundamentals of Ethernet LANs
  • An Overview of LANs
  • Building Physical Ethernet Networks with UTP
  • Sending Data in Ethernet Networks
  • Lesson Summary
  • Review All the Key Topics
Lesson 4: Fundamentals of WANs
  • Leased-Line WANs
  • Ethernet as a WAN Technology
  • Accessing the Internet
  • Lesson Summary
  • Review All the Key Topics
Lesson 5: Fundamentals of IPv4 Addressing and Routing
  • Overview of Network Layer Functions
  • IPv4 Addressing
  • IPv4 Routing
  • IPv4 Routing Protocols
  • Other Network Layer Features
  • Lesson Summary
  • Review All the Key Topics
Lesson 6: Fundamentals of TCP/IP Transport and Applications
  • TCP/IP Layer 4 Protocols: TCP and UDP
  • TCP/IP Applications
  • Lesson Summary
  • Review All the Key Topics
Lesson 7: Using the Command-Line Interface
  • Accessing the Cisco Catalyst Switch CLI
  • Configuring Cisco IOS Software
  • Lesson Summary
  • Review All the Key Topics
  • Command References
Lesson 8: Analyzing Ethernet LAN Switching
  • LAN Switching Concepts
  • Verifying and Analyzing Ethernet Switching
  • Lesson Summary
  • Review All the Key Topics
Lesson 9: Configuring Basic Switch Management
  • Securing the Switch CLI
  • Enabling IPv4 for Remote Access
  • Miscellaneous Settings Useful in Lab
  • Lesson Summary
  • Review All the Key Topics
Lesson 10: Configuring Switch Interfaces
  • Configuring Switch Interfaces
  • Port Security
  • Lesson Summary
  • Review All the Key Topics
Lesson 11: Analyzing Ethernet LAN Designs
  • Analyzing Collision Domains and Broadcast Domains
  • Analyzing Campus LAN Topologies
  • Analyzing LAN Physical Standard Choices
  • Lesson Summary
  • Review All the Key Topics
Lesson 12: Implementing Ethernet Virtual LANs
  • Virtual LAN Concepts
  • VLAN and VLAN Trunking Configuration and Verification
  • Lesson Summary
  • Review All the Key Topics
  • Command References
Lesson 13: Troubleshooting Ethernet LANs
  • Perspectives on Applying Troubleshooting Methodologies
  • Analyzing Switch Interface Status and Statistics
  • Predicting Where Switches Will Forward Frames
  • Analyzing Port Security Operations on an Interface
  • Analyzing VLANs and VLAN Trunks
  • Lesson Summary
  • Review All the Key Topics
  • Command References
Lesson 14: Perspectives on IPv4 Subnetting
  • Introduction to Subnetting
  • Analyze Subnetting and Addressing Needs
  • Make Design Choices
  • Plan the Implementation
  • Lesson Summary
  • Review All the Key Topics
Lesson 15: Analyzing Classful IPv4 Networks
  • Classful Network Concepts
  • Practice with Classful Networks
  • Lesson Summary
  • Review All the Key Topics
  • Answers to Earlier Practice Problems
  • Answers to Practice Problem 7 (from Table 14-4)
  • Answers to Practice Problem 8 (from Table 14-4)
  • Answers to Practice Problem 9 (from Table 14-4)
Lesson 16: Analyzing Subnet Masks
  • Subnet Mask Conversion
  • Identifying Subnet Design Choices Using Masks
  • Lesson Summary
  • Review All the Key Topics
  • Answers to Earlier Practice Problems
Lesson 17: Analyzing Existing Subnets
  • Defining a Subnet
  • Analyzing Existing Subnets: Binary
  • Analyzing Existing Subnets: Decimal
  • Practice Analyzing Existing Subnets
  • Lesson Summary
  • Review All the Key Topics
  • Answers to Earlier Practice Problems
Lesson 18: Operating Cisco Routers
  • Installing Cisco Routers
  • Enabling IPv4 Support on Cisco Router Interfaces
  • Lesson Summary
  • Review All the Key Topics
  • Command References
Lesson 19: Configuring IPv4 Addresses and Static Routes
  • IP Routing
  • Configuring IP Addresses and Connected Routes
  • Configuring Static Routes
  • Lesson Summary
  • Review All the Key Topics
  • Command References
Lesson 20: Learning IPv4 Routes with RIPv2
  • RIP and Routing Protocol Concepts
  • Core RIPv2 Configuration and Verification
  • Optional RIPv2 Configuration and Verification
  • Troubleshooting RIPv2
  • Lesson Summary
  • Review All the Key Topics
  • Command References
Lesson 21: DHCP and IP Networking on Hosts
  • Implementing and Troubleshooting DHCP
  • Verifying Host IPv4 Settings
  • IPv4 Address Types
  • Lesson Summary
  • Review All the Key Topics
  • Command References
Lesson 22: Subnet Design
  • Choosing the Mask(s) to Meet Requirements
  • Finding All Subnet IDs
  • Lesson Summary
  • Review All the Key Topics
  • Additional Practice for This Lesson’s Processes
  • Answers to Practice Choosing Subnet Masks
  • Answers to Practice Finding All Subnet IDs
Lesson 23: Variable-Length Subnet Masks
  • VLSM Concepts and Configuration
  • Finding VLSM Overlaps
  • Adding a New Subnet to an Existing VLSM Design
  • Lesson Summary
  • Review All the Key Topics
  • Additional Practice for This Lesson’s Processes
  • Answers to Practice Finding VLSM Overlaps
Lesson 24: IPv4 Troubleshooting Tools
  • Problem Isolation Using the ping Command
  • Problem Isolation Using the traceroute Command
  • Telnet and SSH
  • Lesson Summary
  • Review All the Key Topics
Lesson 25: Troubleshooting IPv4 Routing
  • Problems Between the Host and the Default Router
  • Problems with Routing Packets Between Routers
  • Lesson Summary
  • Review All the Key Topics
Lesson 26: Basic IPv4 Access Control Lists
  • IPv4 Access Control List Basics
  • Standard Numbered IPv4 ACLs
  • Practice Applying Standard IP ACLs
  • Lesson Summary
  • Review All the Key Topics
  • Additional Practice for This Lesson’s Processes
  • Command References
  • Answers to Earlier Practice Problems
Lesson 27: Advanced IPv4 Access Control Lists
  • Extended Numbered IP Access Control Lists
  • Named ACLs and ACL Editing
  • Troubleshooting with IPv4 ACLs
  • Lesson Summary
  • Review All the Key Topics
  • Command References
  • Answers to Earlier Practice Problems
Lesson 28: Network Address Translation
  • Perspectives on IPv4 Address Scalability
  • Network Address Translation Concepts
  • NAT Configuration and Troubleshooting
  • Lesson Summary
  • Review All the Key Topics
  • Command References
Lesson 29: Fundamentals of IP Version 6
  • Introduction to IPv6
  • IPv6 Addressing Formats and Conventions
  • Lesson Summary
  • Review All the Key Topics
  • Additional Practice for This Lesson’s Processes
  • Answers to Earlier Practice Problems
Lesson 30: IPv6 Addressing and Subnetting
  • Global Unicast Addressing Concepts
  • Unique Local Unicast Addresses
  • Lesson Summary
  • Review All the Key Topics
Lesson 31: Implementing IPv6 Addressing on Routers
  • Implementing Unicast IPv6 Addresses on Routers
  • Special Addresses Used by Routers
  • Lesson Summary
  • Review All the Key Topics
  • Additional Practice for This Lesson’s Processes
  • Command References
  • Answers to Earlier Practice Problems

Lesson 32: Implementing IPv6 Addressing on Hosts

  • The Neighbor Discovery Protocol
  • Dynamic Configuration of Host IPv6 Settings
  • Troubleshooting IPv6 Addressing
  • Lesson Summary
  • Review All the Key Topics
  • Command References
Lesson 33: Implementing IPv6 Routing
  • Connected and Local IPv6 Routes
  • Static IPv6 Routes
  • Lesson Summary
  • Review All the Key Topics
  • Command References
Lesson 34: Device Management Protocols
  • System Message Logging (Syslog)
  • Network Time Protocol (NTP)
  • Analyzing Topology Using CDP and LLDP
  • Lesson Summary
  • Review All the Key Topics
  • Command References
Lesson 35: Device Security Features
  • Securing IOS Passwords
  • Cisco Device Hardening
  • Lesson Summary
  • Review All the Key Topics
  • Command References
Lesson 36: Managing IOS Files
  • Managing Cisco IOS Images and Upgrades
  • Password Recovery
  • Managing Configuration Files
  • Lesson Summary
  • Review All the Key Topics
  • Command References
Lesson 37: IOS License Management
  • IOS Packaging
  • IOS Software Activation with Universal Images
  • Managing Software Activation with Cisco License Manager
  • Lesson Summary
  • Review All the Key Topics
  • Command References
Lesson 38: Final Review
  • Advice About the Exam Event
  • Exam Review
Lesson 39: Appendix A: Numeric Reference Tables
Lesson 40: Appendix B: Practice for Lesson 14: Analyzing Classful IPv4 Networks
  • Practice Problems
  • Answers
Lesson 41: Appendix C: Practice for Lesson 15: Analyzing Subnet Masks
  • Mask Conversion Problems
  • Answers to Mask Conversion Problems
  • Mask Analysis Problems
  • Answers to Mask Analysis Problems
Lesson 42: Appendix D: Practice for Lesson 16: Analyzing Existing Subnets
  • Practice Problems
  • Answers
Lesson 43: Appendix E: Practice for Lesson 21: Subnet Design
  • Mask Design Practice Problems
  • Mask Design Answers
  • Practice Finding All Subnet IDs
Lesson 44: Appendix F: Practice for Lesson 22: Variable-Length Subnet Masks
  • Practice Problems
  • Answers
Lesson 45: Appendix G: Practice for Lesson 25: Basic IPv4 Access Control Lists
  • Practice Problems
  • Practice Building access-list Commands
  • Reverse Engineering from ACL to Address Range
  • Answers to Earlier Practice Problems
  • Answers: Practice Building access-list Commands
  • Answers: Reverse Engineering from ACL to Address Range
Lesson 46: Appendix H: Practice for Lesson 28: Fundamentals of IP Version 6
  • Address Abbreviating and Expanding Problems
  • Calculating the IPv6 Prefix Problems
  • Answers to Address Abbreviating and Expanding Problems
  • Answers to Calculating IPv6 Prefix Problems
Lesson 47: Appendix I: Practice for Lesson 30: Implementing IPv6 Addressing on Routers
  • EUI-64 and Solicited Node Multicast Problems
  • Answers to EUI-64 and Solicited Node Multicast Problems
Lesson 48: Appendix J: Classless Inter-domain Routing
  • Using CIDR Classless Prefixes
  • Understanding Subnetted CIDR Classless Prefixes
  • Challenges with CIDR Terminology and Processes
  • Review All the Key Topics
  • Answers to Earlier Practice Problems
  • Practice for Lesson 30: Implementing IPv6 Addressing on Routers
Lesson 49: Appendix K: Route Summarization
  • Manual Route Summarization Concepts
  • Choosing the Best Summary Routes
  • Exam Preparation Tasks
  • Review All the Key Topics
  • Answers to Earlier Practice Problems
  • Problem 1
  • Problem 2
  • Problem 3
  • Problem 4
Lesson 50: Appendix L: Implementing Point-to-Point WANs
  • Leased Line WANs with HDLC
  • Leased Line WANs with PPP
  • Troubleshooting Serial Links
  • Command References
Lesson 51: Appendix M: Topics from Previous Editions
  • Internal Processing on Cisco Switches
  • IOS Version and Other Reload Facts
  • Secondary IP Addressing
  • Internal Processing on Cisco Routers
  • Potential Routing Performance Issues
  • Cisco Router Fast Switching and CEF
  • OSPF Configuration
  • OSPF Single-Area Configuration
  • Configuring the OSPF Router ID
  • Miscellaneous OSPF Configuration Settings
  • Name Resolution with DNS
  • IOS Reorders ACEs
  • IOS Renumbers ACL Line Numbers, by 10s, at Reload
  • NAT Overload (PAT) on Consumer Routers
  • Dynamic Routes with OSPFv3
  • Comparing OSPF for IPv4 and IPv6
  • Verifying OSPFv3 Status and Routes
Lesson 52: Appendix N: Exam Topics Cross Reference
  • ICND1 100-105 Exam Topic Order
  • Book Lessons, with Exam Topics Covered in Each
  • CCNA R&S 200-125 Exam Topics
Cisco Certified Network Associate (CCNA) 100-105 Live Labs:
  • Performing Initial Device Configuration  
  • Troubleshooting Methodologies  
  • Configure, Verify, and Troubleshoot IPv4 Addressing and Subnetting  
  • Configure, Verify, and Troubleshoot IPv6 Addressing  
  • Configure and Verify Switching Concepts  
  • Interface Configuration and Cabling  
  • Configuring and Verifying VLANs  
  • Configure, Verify and Troubleshoot Interswitch Connectivity  
  • Configure, Verify and Troubleshoot Port Security  
  • Configure, Verify and Troubleshoot Inter-VLAN Routing  
  • Compare Static and Dynamic Routing  
  • Configure and verify RIPv2 for IPv4  
  • Configure and Verify DHCP and DNS  
  • Configuring and Verifying NTP Operation  
  • Configure and Verify Standard Access Lists 
  • Configure and Verify NAT  
  • Configure and Verify Device Management  
  • Device Maintenance Procedures  
  • Cisco IOS Troubleshooting Tools 
Cisco Certified Network Associate (CCNA) 200-301Curriculum:
Lesson 1: Introduction to Networking

This first part of the book introduces the fundamentals of the most important topics in TCP/IP networking. Chapter 1 provides a broad look at TCP/IP, introducing the common terms, big concepts, and major protocols for TCP/IP. Chapter 2 then examines local-area networks (LAN), which are networks that connect devices that are located near each other; for instance, in the same building. Chapter 3 then shows how to connect those LANs across long distances with wide-area networks (WAN) with a focus on how routers connect LANs and WANs to forward data between any two devices in the network.

Lesson 2: Implementing Ethernet LANs

Part I provided a broad look at the fundamentals of all parts of networking, focusing on Ethernet LANs, WANs, and IP routing. Parts II and III now drill into depth about the details of Ethernet, which was introduced in Chapter 2, “Fundamentals of Ethernet LANs.”

Part II begins that journey by discussing the basics of building a small Ethernet LAN with Cisco Catalyst switches. The journey begins by showing how to access the user interface of a Cisco switch so that you can see evidence of what the switch is doing and configure the switch to act in the ways you want it to act. At this point, you should start using whatever lab practice option you chose in the “Your Study Plan” section that preceded Chapter 1, “Introduction to TCP/IP Networking.” (And if you have not yet finalized your plan for how to practice your hands-on skills, now is the time.)

After you complete Chapter 4 and see how to get into the command-line interface (CLI) of a switch, the next three chapters step through some important foundations of how to implement LANs—foundations used by every company that builds LANs with Cisco gear. Chapter 5 takes a close look at Ethernet switching—that is, the logic used by a switch—and how to know what a particular switch is doing. Chapter 6 shows the ways to configure a switch for remote access with Telnet and Secure Shell (SSH), along with a variety of other useful commands that will help you when you work with any real lab gear, simulator, or any other practice tools. Chapter 7, the final chapter in Part II, shows how to configure and verify the operation of switch interfaces for several important features, including speed, duplex, and auto-negotiation.

Lesson 3: Implementing VLANs and STP

Part II of this book introduces the basics of Ethernet LANs, both in concept and in how to implement the features. However, the two primary features discussed in Part III of this book—Virtual LANs (VLANs) and Spanning Tree Protocol (STP)—impact almost everything you have learned about Ethernet so far. VLANs allow a network engineer to create separate Ethernet LANs through simple configuration choices. The ability to separate some switch ports into one VLAN and other switch ports into another VLAN give network designers a powerful tool for creating networks. Once created, VLANs also have a huge impact on how a switch works, which then impacts how you verify and troubleshoot the operation of a campus LAN.

STP—and the related and similar Rapid STP (RSTP)—acts to prevent frames from looping around a LAN. Without STP or RSTP, in LANs with redundant links, broadcasts and some other frames would be forwarded around and around the LAN, eventually clogging the LAN so much as to make it unusable.

The current CCNA 200-301 exam blueprint includes exam topics for the configuration and verification of VLANs and related topics. However, the CCNA exam topics only mention RSTP concepts rather than configuration/verification. To that end, Part III opens with Chapter 8, which goes to the configuration/verification depth with VLAN topics, followed by Chapter 9, which introduces the concepts of STP and RSTP.

Part III closes with Chapter 10, which includes some RSTP configuration, along with Layer 2 EtherChannel configuration.

Lesson 4: IPv4 Addressing

The book makes a big transition at this point. Part I gave you a broad introduction to networking, and Parts II and III went into some detail about the dominant LAN technology today: Ethernet. Part IV transitions from Ethernet to the network layer details that sit above Ethernet and WAN technology, specifically IP Version 4 (IPv4).

Thinking about the network layer requires engineers to shift how they think about addressing. Ethernet allows the luxury of using universal MAC addresses, assigned by the manufacturers, with no need to plan or configure addresses. Although the network engineer needs to understand MAC addresses, MAC already exists on each Ethernet NIC, and switches learn the Ethernet MAC addresses dynamically without even needing to be configured to do so. As a result, most people operating the network can ignore the specific MAC address values for most tasks.

Conversely, IP addressing gives us flexibility and allows choice, but those features require planning, along with a much deeper understanding of the internal structure of the addresses. People operating the network must be more aware of the network layer addresses when doing many tasks. To better prepare you for these Layer 3 addressing details, this part breaks down the addressing details into four chapters, with an opportunity to learn more in preparation for the CCNP Enterprise certification.

Part IV examines most of the basic details of IPv4 addressing and subnetting, mostly from the perspective of operating an IP network. Chapter 11 takes a grand tour of IPv4 addressing as implemented inside a typical enterprise network. Chapters 12, 13, and 14 looks at some of the specific questions people must ask themselves when operating an IPv4 network.

Lesson 5: IPv4 Routing

Parts V and VI work together to reveal the details of how to implement IPv4 routing in Cisco routers. To that end, Part V focuses on the most common features for Cisco routers, including IP address configuration, connected routes, and static routes. Part VI then goes into some detail about the one IP routing protocol discussed in this book: OSPF Version 2 (OSPFv2).

Part V follows the progression of topics. First, Chapter 15 examines the fundamentals of routers—the physical components, how to access the router command-line interface (CLI), and the configuration process. Chapter 15 makes a close comparison of the switch CLI and its basic administrative commands so that you have to learn only new commands that apply to routers but not to switches.

Chapter 16 then moves on to discuss how to configure routers to route IPv4 packets in the most basic designs. Those designs require a simple IP address/mask configuration on each interface, with the addition of a static route command—a command that directly configures a route into the IP routing table—for each destination subnet.

By the end of Chapter 16, you should have a solid understanding of how to enable IP addressing and routing in a Cisco router, so Chapter 17 continues the progression into more challenging but more realistic configurations related to routing between subnets in a LAN environment. Most LANs use many VLANs, with one subnet per VLAN. Cisco routers and switches can be configured to route packets between those subnets, with more than a few twists in the configuration.

Finally, Part V closes with a chapter about troubleshooting IPv4 routing. The chapter features the ping and traceroute commands, two commands that can help you discover not only whether a routing problem exists but also where the problem exists. Chapters 15, 16, and 17 show how to confirm whether a route has been added to one router’s routing table, while the commands discussed in Chapter 18 teach you how to test the end-to-end routes from sending host to receiving host.

Lesson 6: OSPF

Part IV began the story in this book about IP Version 4 (IPv4) addressing. Part V continued that story with how to implement addressing in Cisco routers, along with a variety of methods to route packets between local interfaces. But those topics delayed the discussion of one of the most important topics in TCP/IP, namely IP routing protocols.

Routers use IP routing protocols to learn about the subnets in an internetwork, choose the current best routes to reach each subnet, and to add those routes to each router’s IP routing table. Cisco chose to include one and only one IP routing protocol in the CCNA 200-301 exam: the Open Shortest Path First (OSPF) routing protocol. This entire part focuses on OSPF as an example of how routing protocols work.

Lesson 7: IP Version 6

So far, this book has mostly ignored IP version 6 (IPv6). This part reverses the trend, collecting all the specific IPv6 topics into four chapters.

The chapters in Part VII walk you through the same topics discussed throughout this book for IPv4, often using IPv4 as a point of comparison. Certainly, many details differ when comparing IPv4 and IPv6. However, many core concepts about IP addressing, subnetting, routing, and routing protocols remain the same. The chapters in this part build on those foundational concepts, adding the specific details about how IPv6 forwards IPv6 packets from one host to another.

Lesson 8: IP Version 6

This book began with an overview of the fundamentals of LANs, WANs, and IP routing. It then described Ethernet LANs (wired LANs) in some depth over the course of seven chapters. The book then meandered through many chapters exploring the many concepts of IPv4 and IPv6 addressing, routing, and how to implement those features in Cisco devices.

This final part of Volume 1 turns our attention back to the LAN, not to wired Ethernet LANs, but to IEEE 802.11 wireless LANs—in other words, Wi-Fi. The four chapters in this part of the book lay down the foundations of how wireless LANs work and then show how to implement wireless LANs using Cisco devices.

Building wireless LANs requires some thought because the endpoints that use the LAN do not sit in one place and connect via a known cable and known switch port. To explain those details, Chapter 26 begins with the basics of how a wireless client can connect to the wireless network through a wireless access point (AP). After you learn the foundations in Chapter 26, Chapter 27 takes an architectural view of wireless LANs to discuss how you might build a wireless LAN for an enterprise, which requires much different thinking than, for instance, building a wireless LAN for your home.

Chapter 28 completes the three concepts-focused wireless LAN chapters by working through the alphabet soup that is wireless LAN security. The fact that wireless LAN clients come and go means that the LAN may be under constant attack as an easy place for an attacker to gain access to the network, so wireless LANs must use effective security. Finally, Chapter 29 closes by showing how to configure an enterprise wireless LAN using Cisco APs and the Cisco Wireless LAN Controller (WLC) from the WLC’s graphical interface.

Cisco CCNA 200-301 Part 2 Curriculum:
Lesson 1: IP Access Control Lists

The CCNA Official Cert Guide, Volume 2 includes the topics that help you build an enterprise network so all devices can communicate with all other devices. Parts I and II of this book focus on how to secure that enterprise network so that only the appropriate devices and users can communicate.

Part I focuses on IP Version 4 (IPv4) access control lists (ACLs). ACLs are IPv4 packet filters that can be programmed to look at IPv4 packet headers, make choices, and either allow a packet through or discard the packet. Because you can implement IPv4 ACLs on any router, a network engineer has a large number of options of where to use ACLs, without adding additional hardware or software, making ACLs a very flexible and useful tool.

Chapter 1 begins this part with an introduction to the TCP/IP transport layer protocols TCP and UDP, along with an introduction to several TCP/IP applications. This chapter provides the necessary background to understand the ACL chapters and to better prepare you for upcoming discussions of additional security topics in Part II and IP services topics in Part III.

Chapters 2 and 3 get into details about ACLs. Chapter 2 discusses ACL basics, avoiding some of the detail to ensure that you master several key concepts. Chapter 3 then looks at the much wider array of ACL features to make you ready to take advantage of the power of ACLs and to be ready to better manage those ACLs.

Lesson 2: Security Services

With the introduction of the new CCNA certification in early 2020, Cisco expanded the number of security topics in comparison to the old CCNA Routing and Switching certification. Part II includes the majority of the new security topics added to the new CCNA 200-301 certification as well as a few of the classic topics found in previous CCNA R&S exams.

Chapter 4 kicks off Part II with a wide description of security threats, vulnerabilities, and exploits. This introductory chapter sets the stage to help you think more like a security engineer.

Chapters 5, 6, and 8 then focus on a wide range of short security topics. Those topics include Chapter 5’s discussion of how to protect router and switch logins and passwords, along with an introduction to the functions and roles of firewalls or intrusion protection systems (IPSs). Chapters 6 and 8 then get into three separate security features built into Cisco switches: port security (Chapter 6), DHCP Snooping (Chapter 8), and Dynamic ARP Inspection (DAI). All three security features require a switch to examine frames as they enter the switch interface. This information enables port security, DHCP Snooping, and DAI to decide whether to allow the message to continue on its way.

Chapter 7 discusses the Dynamic Host Configuration Protocol (DHCP) as an end to itself. While this topic is actually an IP Service and would be a great fit for Part III (IP Services), the topics in Chapter 8 require that you know DHCP, so Chapter 7 sets that stage.

Lesson 3: Services

Part III shifts to a variety of topics that can be found in almost every network. None are required for a network to work, but many happen to be useful services. Most happen to use IP or support the IP network in some way, so Part III groups the topics together as IP Services.

Part III begins and ends with chapters that examine a series of smaller topics. First, Chapter 9 examines several IP services for which the CCNA exam requires you to develop configuration and verification skills. Those services include logging and syslog, the Network Time Protocol (NTP), as well as two related services: CDP and LLDP.

Chapter 12, at the end of Part III, closes with another series of smaller topics—although the CCNA 200-301 exam topics require only conceptual knowledge, not configuration skills for these topics. This chapter includes First Hop Redundancy Protocols (FHRPs), Simple Network Management Protocol (SNMP), and two related protocols: TFTP and FTP.

The two middle chapters in Part III also focus on IP-based services, beginning with Chapter 10’s examination of Network Address Translation (NAT). Almost every network uses NAT with IPv4, although in many cases, the firewall implements NAT. This chapter shows how to configure and verify NAT in a Cisco router.

Chapter 11 at first may give the appearance of a large chapter about one topic—Quality of Service—and it does focus on QoS; however, QoS by nature includes a wide variety of individual QoS tools. This chapter walks you through the basic concepts of the primary QoS features.

Lesson 4: Network Architecture

Part IV turns the attention away from the concept-configure-verify approach needed for many of the topics seen earlier in this book and in CCNA 200-301 Official Cert Guide, Volume 1. Instead, this part collects topics that will be presented more from an architecture and design perspective. In fact, the CCNA 200-301 exam organizes six exam topics with this same approach, all listed under exam topic 1.2 “Describe characteristics of network topology architectures.” The chapters in this part examine most of those topics.

First, Chapter 13 revisits LAN switching, which was covered to some depth in Volume 1. This chapter discusses campus LAN design concepts and terminology, like the 2 tier and 3 tier terms listed in the exam topics. This chapter also discusses how to supply power over that LAN infrastructure using Power over Ethernet (PoE), as well as the term small office/home office (SOHO).

CCNA 200-301 mentions WAN as an end to itself in one exam topic within the context of topology and architecture. Chapter 14 takes that thread and presents three major WAN architectures, going beyond the concepts you need to know to support the simple WAN cases used in the examples throughout both books so far. Those topics include MPLS VPN WANs, Ethernet WANs, and Internet VPNs.

Chapter 15 completes the architecture-focused chapters with a discussion of cloud architectures. This chapter begins by defining basic concepts and terms related to data centers and cloud and closes with design discussions that show packet flows in a public cloud environment.

Lesson 5: Network Automation

Part V of this book includes most of the network automation topics from the CCNA blueprint; however, the part includes as much discussion of how Cisco and others have changed the way networks work to enable better automation as it discusses tools and processes to automate networks.

Chapters 16 and 17 examine a wide range of products and architectures that also enable better operations and automation. Chapter 16 discusses how controllers can separate out part of the work formerly done by networking devices. The chapter shows the advantages of these new controller-based models and details a few examples. Chapter 17 then goes on to give more detail about Cisco Software-Defined Access (SDA), a controller-based networking approach to building enterprise campus networks.

Chapters 18 and 19 discuss a few more specific details about network automation. Controllers typically include REST APIs and often return data to automation programs in the form of formatted data like JSON. Chapter 18 introduces these concepts. Chapter 19 then moves on to discuss IT automation tools, specifically Ansible, Puppet, and Chef, with a focus on how to use these tools for network automation.

Lesson 6: Final Review

Now that you have finished the bulk of this book, you could just register for your Cisco CCNA exam, show up, and take the exam. However, if you spend a little time thinking about the exam event itself, learning more about the user interface of the real Cisco exams and the environment at the Pearson VUE testing centers, you will be better prepared, particularly if this is your first Cisco exam.

This first of two major sections in this chapter gives some advice about the Cisco exams and the exam event itself, specifically about:

  • Question types
  • Your time budget
  • A sample time-check method
  • The final week
  • The 24 hours before the exam
  • The final 30 minutes before the exam
  • The hour after the exam
Cisco 200-301 - Implementing and Administering Cisco Solutions (CCNA) Live Labs:
  • Networking Concepts - Part One
  • Networking Concepts - Part Two
  • IP Addressing and Virtualization Concepts
  • Switching Fundamentals - Part One
  • Switching Fundamentals - Part Two
  • Configuring VLANs - Part One
  • Configuring VLANs - Part Two
  • Static and Dynamic Routing Principles
  • Configure OSPFv2
  • FHRP Configuration and Verification
  • Static NAT Configuration
  • NTP Configuration
  • DHCP Concepts, Configuration and Verification
  • Network Traffic Management using SNMP
  • Configuring Syslog for Switching and Routing
  • Remote Management Techniques
  • Using File Transfer Protocols on Routers
  • Network Management Tools
  • Applying Security Protocols
  • QoS for Routing Configuration using PHB
  • Security Mitigation Techniques
  • Wireless Architecture and Application

Certifications:

This course prepares students to take the CompTIA N10-007: Network+, SY0-501: Security+ and Cisco CCNA 200-301 certification exams.

 

ProTrain, LLC is not affiliated with and has no relationship with Cisco Systems, Inc.


System Requirements:

System Requirements:

Internet Connectivity Requirements:
  • Cable and DSL internet connections are recommended for the best experience.
Hardware Requirements:
  • CPU: 1 GHz or higher
  • RAM: 2 GB or higher
  • Resolution: 1280 x 720 or higher
  • Speakers / Headphones
  • Microphone (Webinar / Live Online sessions)
Operating System Requirements:
  • Microsoft Windows 7 or 10 (Home, Pro)
  • Mac OSX 10 or higher.
  • Latest Chrome OS
  • Latest Linux Distributions

NOTE: While we understand that our courses can be viewed on Android and iPhone devices, we do not recommend the use of these devices for our courses. The size of these devices do not provide a good learning environment for students taking online or live online based courses.

Web Browser Requirements:
  • Latest Google Chrome is recommended for the best experience.
  • Latest Mozilla FireFox
  • Latest Microsoft Edge
  • Latest Apple Safari
Basic Software Requirements (These are recommendations of software to use):
  • Office suite software (Microsoft Office, OpenOffice, or LibreOffice)
  • PDF reader program (Adobe Reader, FoxIt)
  • Courses may require other software that is denoted in the above course outline.


** The course outlines displayed on this website are subject to change at any time without prior notice. **