Cisco Certified Network Associate (CCNA)
- Price: $4,175.00.00
- Duration: 5 Days
- Delivery Methods: In-person, virtual instructor led
Hybrid (in-person & online-live option)​
Name | Start Date | Days | Class Times | Price | Enroll |
---|---|---|---|---|---|
Cisco® Implementing and Administering Cisco® Solutions v1.0 (CCNA) | 05/15/2023 | 5 | 8:00 AM-5:00 PM Central | $4,175.00 | |
Cisco® Implementing and Administering Cisco® Solutions v1.0 (CCNA) | 08/14/2023 | 5 | 8:00 AM-5:00 PM Central | $4,175.00 | |
Cisco® Implementing and Administering Cisco® Solutions v1.0 (CCNA) | 11/13/2023 | 5 | 8:00 AM-5:00 PM Central | $4,175.00 |
Proud to Be an Official Partner With:

New Horizons Dallas is a Platinum Cisco Learning Partner with extensive experience in tailoring Cisco training programs to meet the unique needs of our customers. We provide a complete learning solution that includes certification courses, solution-based training, content development, customization, and customer training plans. With our end-to-end learning experience, you can be confident that you are receiving the highest quality training to help you achieve your goals. Let us help you manage your Cisco training path and take your career to the next level.
Course Overview
This course gives you a broad range of fundamental knowledge for all IT careers. You will learn how to install, operate, configure, and verify a basic IPv4 and IPv6 network. The course covers configuring network components such as switches, routers, and Wireless LAN Controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation, and software-defined networking. This course helps you prepare to take the 200-301 Cisco Certified Network Associate (CCNA) exam to earn CCNA certification. This course consists of 5 days of instructor-led training with hands-on lab practice, plus the equivalent of 3 days of self-paced material. This course includes post class lab access- a total of 60 hours of labs over a 90 day period. This course eligible for registration with CLC’s. This course may earn a Credly Badge.
Prerequisites
While there are no prerequisites for this course, please ensure you have the right level of experience to be successful in this training:
– Basic computer literacy
– Basic PC operating system navigation skills
– Basic internet usage skills
– Basic IP address knowledge
Audience
This course is designed for anyone seeking CCNA certification. The course also provides foundational knowledge for all support technicians involved in the basic installation, operation, and verification of Cisco networks.
The job roles best suited to the material in this course are:
– Entry-level network engineer
– Network administrator
– Network support technician
– Help desk technician
Course Outline
What is a computer network?
Components of a network
Characteristics of a network
Physical vs. Logical Topologies
Interpreting a network diagram
Impact of user applications on the network
Host-to-host communications overview
ISO OSI reference model
TCP/IP protocol Suite
Peer-to-peer communications
Encapsulation and de-encapsulation
TCP/IP stack vs OSI reference mode
Cisco IOS software features and functions
Cisco IOS software CLI functions
Cisco IOS software models
Discovery 1: Get started with Cisco CLI
Local area networks
LAN components
Need for switches
Characteristics and features of switches
Ehernet LAN connection media
Ethernet frame structure
LAN communication types
MAC addresses
Frame switching
Discovery 2: Observe how a switch operate
Duplex communication
Switch installation
Connecting to a console port
Switch LED indicators
Basic show commands and information
Discovery 3: Perform basic switch configuration
Implement the initial switch configuration
Internet protocol
Decimal and binary number systems
Binary-to-decimal conversion
Decimal-to-binary conversion
IPv4 address representation
IPv4 header fields
IPv4 address classes
Subnet masks
Subnets
Implementing subnetting: Bowwing bits
Implementing subnetting: Determining the addressing scheme
Benefits of VLSM and Implementing VLSM
Private vs. Public IPv4 addresses
Reserved IPv4 addresses
Verifying IPv4 address of a host
TCP/IP transport layer functions
Reliable vs. Best-effort transport
TCP characteristics
UDP characteristics
TCP/IP application layer
Introducing HTTP
Domain name system
Explaining DHCP for IPv4
Discovery 4: Inspect TCP/IP applications
Role of a router
Router components
Router functions
Routing table
Path determination
Initial router setup
Configuring router interfaces
Configuring IPv4 addresses on router interfaces
Checking interface configuration and status
Discovery 5: Configure an interface on a Cisco router
Exploring connected devices
Using Cisco Discovery Protocol
Configure and verify LLDP
Disconvery 6: Configure and verify layer 2 discovery protocols
Implement an initial router configuration
Layer 2 addressing
Layer 3 addressing
Default gateways
Address resolution protocol
Discovery 7: Configure default gateway
Host-to-host packet delivery
Discovery 8: Explore packet forwarding
Troubleshooting methods
Troubleshooting tools
Troubleshooting common switch media issues
Troubleshooting common switch port issues
Discovery 9: Troubleshoot switch media and port issues
Discovery 10: Troubleshoot port duplex issues
Troubleshooting common problems associated with IPv4 addressing
IPv4 address exhaustion workarounds
IPv6 features
IPv6 addresses and address types
Comparison of IPv4 and IPv6 header
Internet control message protocol version 6
Neighbor discovery
IPv6 address allocation
Discovery 11: Configure basic IPv6 connectivity
Verification of end-to-end IPv6 connectivity
Routing Operation
Static and dynamic routing comparison
When to use static routing
IPv4 static route configuration
Default routes
Verifying static and default route configuration
Discovery 12: Configure and verify IPv4 static routes
Configuring IPv6 static routes
Discovery 13: Configure IPv6 static routes
Implement IPv4 static routing
Implement IPv6 static routing
VLAN Introduction
Creating a VLAN
Assigning a port to a VLAN
Trunking with 802.1Q
Configuring an 802.1Q trunk
Discovery 14: Configure VLAN and trunk
VLAN design considerations
Troubleshoot VLANs and trunk
Purpose of Inter-VLAN routing
Options for the Inter-VLAN routing
Discovery 15: Configure a router on a stick
Implement multiple VLANs and basic routing between the VLANs
Dynamic routing protocols
Path selection
Link-State routing protocol overview
Link-State routing protocol data structures
Introducing OSPF
Establishing OSPF neighbor adjacencies
OSPF neighbor states
SPF algorithm
Building a Link-State database
Discovery 16: Configure and verify single-area OSPF
Routing for IPv6
Physical redundancy in a LAN
Issues in redundant topologies
Spanning tree operation
Types of spanning tree protocols
PortFast and BPDU guard
Rapid spanning tree protocol
EtherChannel overview
EtherChannel configuration options
Configuring and verifying EtherChannel
Discovery 17: Configure and verify EtherChannel
Improve redundant switched topologies with EtherChannel
Need for default gateway redundancy
Understanding FHRP
Understanding HSRP
Introduction to WAN technologies
WAN devices and demarcation point
WAN topology options
WAN connectivity options
Virtual private networks
Enterprise-manged VPNs
Provider-managed VPNs
ACL overview
ACL operation
ACL wildcard masking
Wildcard mask abbreviations
Types of basic ACLs
Configuring standard IPv4 ACLs
Configuring extended IPv4 ACLs
Verifying and modifying IPv4 ACLs
Applying IPv4 ACLs to filter network traffic
Discovery 18: Configure and verify IPv4 ACLs
Implement numbered and named IPv4 ACLs
Discovery 19: Configure a provider-assigned IPv4 address
Introducing network address translation
NAT terminology and translation mechanisms
Benefits and drawbacks of NAT
Static NAT and port forwarding
Dynamic NAT
Port address translation
Configuring and verifying inside IPv4 NAT
Discovery 20: Configure static NAT
Discovery 21: Configure dynamic NAT and PAT
Implement PAT
Converged networks
Quality of service defined
QoS policy
QoS mechanisms
QoS models
Deploying end-to-end QoS
Wireless technologies
WLAN architechtures
WiFi channels
AP and WLC management
Discovery 22: Log into the WLC
Discovery 23: Monitor the WLC
Discovery 24: Configure a dynamic (VLAN) interface
Discovery 25: Configure a DHCP scope
Discovery 26: Configure a WLAN
Discovery 27: Define a RADIUS server
Discovery 28: Explore management options
Introduction to network design
Enterprise three-tier hierarchical network design
Spine-leaf network design
Cisco enterprise architecture model
Cloud computing overview
Network device architecture
Virtualization fundamentals
Overview of network programmability in enterprise networks
Software-defined networking
Common programmability protocols and methods
Configuration management tools
Introducing Cisco DNA center
Discovery 29: Explore the Cisco DNA center
Introducing Cisco SD-Access
Introducing Cisco SD-WAN
Introducing Syslog
Syslog message format
SNMP overview
Enabling network time protocol
Discovery 30: Configure and verify NTP
Configure system message logging
Cisco IOS intergrated file system adn devices
Stages of the router power-on boot sequence
Loading and managing system images files
Loading Cisco IOS configuration files
Validating Cisco IOS images using MD5
Managing Cisco IOS images and device configuration files
Discovery 31: Create the Cisco IOS impage backup
Discovery 32: Upgrade Cisco IOS image
Security threat landscape overview
Malware
Hacking tools
Denial of service and distributed denial of service
Spoofing
Reflection and amplification attacks
Social engineering
Evolution of Phishing
Password attacks
Reconnaissance attacks
Buffer overflow attacks
Man-in-the-middle attacks
Vectors of data loss and exfiltration
Other considerations
Information security overview
Firewalls
Intrusion prevention systems
Protection against data loss and phishing attacks
Defending against DoS and DDoS attacks
Introduction to cryptographic technologies
IPsec security services
Secure sockets Layer and transport layer security
Wireless security protocols
Discover 33: Configure WLAN using WPA2 PSK using the GUI
Network device security overview
Securing access to privileged EXEC mode
Securing console access
Securing remote access
Discover 34: Secure console and remote access
Configuring the login banner
Limiting remote access with ACLs
Discovery 35: Enable and limit remote access connectivity
External authentication options
Secure device administrative access
Securing unused ports
Infrastructure ACL
Disabling unused services
Port security
Discovery 36: Configure and verify port security
Mitigating VLAN attacks
DHCP snooping
Dynamic ARP inspection
Mitigation STP attacks
Implement device hardening
The self-study material can be done at your own pace after the instructor-led portion of the course
Do you have questions? Contact us
- 469-721-6100
- Learn@newhorizonsdallas.com
