PROGRAM NAME
CCNA 1
DURATION OF PROGRAM
40 HOURS
- No. of hours 8
- Networks Affect Our Lives
- Network Components
- Network Representations and Topologies
- Common Types of Networks
- Internet Connections
- Reliable Networks
- Network Trends
- Network Security
- The IT Professional
- Cisco IOS Access
- IOS Navigation
- The Command Structure
- Basic Device Configuration
- Save Configurations
- Ports and Addresses
- Configure IP Addressing
- Verify Connectivity
- No. of hours 8
- The Rules
- Protocols
- Protocol Suites
- Standards Organizations
- Reference Models
- Data Encapsulation
- Data Access
- Purpose of the Physical Layer
- Physical Layer Characteristics
- Copper Cabling
- UTP Cabling
- Fiber-Optic Cabling
- Wireless Media
- No. of hours 8
- Binary Number System
- Hexadecimal Number System
- Purpose of the Data Link Layer
- Topologies
- Data Link Frame
- Ethernet Frame
- Ethernet MAC Address
- The MAC Address Table
- Switch Speeds and Forwarding Methods
- Network Layer Characteristics
- IPv4 Packet
- IPv6 Packet
- How a Host Routes
- Router Routing Tables
- MAC and IP
- ARP
- Neighbor Discovery
- No. of hours 8
- Configure Initial Router Settings
- Configure Interfaces
- Configure the Default Gateway
- IPv4 Address Structure
- IPv4 Unicast, Broadcast, and Multicast
- Types of IPv4 Addresses
- Network Segmentation
- Subnet an IPv4 Network
- Subnet a /16 and /8 Prefix
- Subnet to Meet Requirements
- Variable Length Subnet Masking
- Structured Design
- No. of hours 8
- IPv4 Issues
- IPv6 Addressing
- IPv6 Address Types
- GUA and LLA Static Configuration
- Dynamic Addressing for IPv6 GUAs
- Dynamic Addressing for IPv6 LLAs
- IPv6 Multicast Addresses
- Subnet an IPv6 Network
- ICMP Messages
- Ping and Traceroute Testing
- Transportation of Data
- TCP Overview
- UDP Overview
- Port Numbers
- TCP Communication Process
- Reliability and Flow Control
- UDP Communication
- No. of hours 8
- Application, Presentation, and Session
- Peer-to-Peer
- Web and Email Protocols
- IP Addressing Services
- File Sharing Services
- Security Threats and Vulnerabilities
- Network Attacks
- Network Attack Mitigation
- Device Security
- Devices in a Small Network
- Small Network Applications and Protocols
- Scale to Larger Networks
- Verify Connectivity
- Host and IOS Commands
- Troubleshooting Methodologies
- Troubleshooting Scenarios