Routing & Switching (CCNA)

CCNA certification proves you have what it takes to navigate the ever-changing landscape of IT. CCNA exam covers networking fundamentals, IP services, security fundamentals, automation and programmability. Designed for agility and versatility, CCNA validates that you have the skills required to manage and optimize today’s most advanced networks.

The CCNA training course and exam give you the foundation to take your career in any direction. When you certify with Cisco, you are living proof of the standard and rigor that businesses recognize and trust to meet and exceed market demands.

Language: English

Duration: 3 Months

Level: Intermediate

Duration: 5 days

The Cisco Certified Network Associate v1.0 (CCNA 200-301) exam is a 120-minute exam associated with the CCNA certification. This exam tests a candidate’s knowledge and skills related to network fundamentals, network access, IP connectivity, IP services, security fundamentals, and automation and programmability. The course, Implementing and Administering Cisco Solutions (CCNA), helps candidates prepare for this exam.

Objectives

  • This exam tests your knowledge and skills related to:

    • Network fundamentals
    • Network access
    • IP connectivity
    • IP services
    • Security fundamentals
    • Automation and programmability

Prerequisites

No formal prerequisites but one or more years of experience implementing and administering Cisco solutions is recommended.

The CCNA exam is the foundation exam of the Cisco certification paths. This means that you do not need to have any certifications or passed any exams before you can sit for the CCNA exam. There are few basic restrictions and prerequisites that one should be aware of before attempting to take the exam.

Outline for Cisco CCNA 200-301 Training

  • 1.1 Basic Networking
      • Client/Server Vs Peer-to-Peer Networking.
      • SOHO VS Lans VS Wans
      • Intranet Vs Extranets.
      • Converged Networks
      • Fault Tolerance VS Scalability
      • Cloud Computing Types

  • 2.1 Cisco IOS
      • Cisco IOS Access Methods
      • Terminal Emulation Software VS Putty VS Secure CRT.
      • Cisco IOS Navigation-Video
      • Navigate between IOS Modes-  Video
      • Context Sensitive Help-Video
      • Hot Keys
      • Basic Device Configuration.
      • Saving Configuration in Startup.
      • Configure IP Addressing. (Before it complete 11.1.1)
      • Switches Virtual Interfaces (SVI)

  • 3.3.4 TCP/IP Protocol Suite
      • OSI VS TCP/IP Reference Model
      • Encapsulation – Video
      • Layer 3 Logical Addressing
      • Data Link Address (MAC) on different IP Network

  • 4.0 Physical Layer Connectivity

  • 5.0 Number System
      • Convert Binary to Decimal and Vice versa.
      • Hexadecimal and IPV6 addresses.
      • Converting B/W Hexa- decimal and Decimal-Video and Vice Versa
      • Quiz

  • 6.1 Data Link Layer
      • Providing access to Media- Video
      • Physical VS Logical Topologies diagram.
      • WAN Topologies.
      • LAN Topologies.
      • Half VS Full Duplex Communication.
      • CSMA/CD Vs CSMA/CA
      • Layer 2 along the Path.
      • Layer 2 Lan and Wan Encapsulations – Video

  • 7.1 Ethernet MAC address.
      • Unicast Vs Multicast Vs Broadcast.
      • Switch Learning, Forwarding and Filtering phases. – Video
      • Frame Forwarding methods. 
      • Store & Forward Vs Cut-through Switching.

  • 8.1 Network Layer
      • Characteristics of IP i-e Connectionless, Best Effort, Media Independent
      • IPV4 Vs IPV6 Headers.
      • A Host route to the Default Gateway.
      • Windows Host Routing Tables.
      • Statice Vs Dynamic Routing.
      • IPV4 Router Routing Table.

  • 9.1 Destination On a Remote Network. Mac and IP address Conversions.
      • ARP request and reply -Video
      • ARP issues like ARP Broadcast and ARP Spoofing.
      • IPV6 Neighbor Discovery Protocol (NDP) messages.
      • IPV6 NS and NA messages
  • 10.1 Basic Router Configuration
      • Configuration Verification Commands
      • Default Gateway on Router Vs Switch.
      • Network Device Differences

  • 11.1 IPV4 Address, Subnet Mask and Prefix Length.
      • Determining the Network Address.
      • Network, Host (First usable and Last Useable) and Broadcast Addresses – Video
      • IPV4 Unicast, Broadcast and Multicast addresses.
      • Public and Private IP addresses.
      • 11.3.3 Game or Activity – Pass or Fail.
      • Classful Vs Classless Addressing.
      • Network Segmentation.
      • Sunet an IPV4 address
      • Subnet a /16 and /8 prefix
      • VLSM, IP address conservation.

  • 12.1 IPV6 Addressing.
      • IPV4 and IPV6 Coexistence using Dual Stack, Tunneling and Translation.
      • IPV6 Address Representation and Format of 128 bit.
      • IPV6 Unicast addresses.
      • IPV6 GUA Vs LLA.
      • IPV6 GUA and LLA Static Configuration.
      • Dynamic Addressing for IPV6 GUA’s using methods:
        • 1. SLAAC
        • 2. SLAAC and Stateless DHCPv6
        • 3. Stateful DHCPv6
      • EUI -64 Process Vs Randomly Generated.
      • Dynamic Addressing for IPV6 LLA’s.
      • Verify IPV6 Address Configuration
      • IPV4 Multicast Addresses
      • Subnet an IPV6 Address.

  • 13.1 ICMP Messages
      • Destination or Service Unreachable 
      • ICMPv6 Messages
      • RA/RS Vs NA/NS
      • Ping and Traceroute Tests.

  • 14.1 Transport Layer
      • TCP Communication Process.
      • Reliability and Flow Control 
      • UDP Communication

  • 15.1 Application, Presentation and Session Layer.

  • 16.1 Network Security Fundamentals.
      • Types of Threats and Vulnerablilities.
      • Types of Attacks 
      • Types of Malware.
      • Denial of Service Attacks.
      • Network Attack Mitigations. 
      • Authentication, Authorization and Accounting (AAA)
      • Enable SSH for devices.
  • 1.0 Basic Device Configuration.
      • Download and Install Packet Tracer.
      • Configure a Switch with initial settings.
      • Switch SVI Configuration for Management Access.
      • Configure Switch Ports 
      • Verify Switch Port Configuration.
      • Interface Input and Output errors.
      • Secure Remote Access Configuration Telnet Vs SSH.
      • Configure Basic Router Settings like Secret Passwords,
      • Dual Stack Topology Configuration.
      • IPV4 Loopback Interfaces Features.
      • Interface Verification Commands
      • Verify IPv6 Link Local and Multicast Addresses
      • Filter Show command output

  • 2.0 Switching Concepts
      • Switching Forwarding Methods- Store and Forward Vs Cut-Through
      • Collision Vs Broadcast Domains.

  • 3.0 Benefits of a VLAN Design.
      • Types of VLANs
      • Networks With and Without Vlans – Video
      • VLAN Ranges on Catalyst Switches.
      • VLAN creation, deletion and Port Assignment.
      • Data and Voice VLan Configuration.
      • Change Vlan Port Membership
      • Vlan Trunk Configuration commands
      • Reset the Trunk to the Default State.
      • Dynamic Trunking Protocol (DTP).
      • DTP Negotiation.

  • 4.0 Inter-Vlan Routing.
      • Legacy VS Router-on-a Stick Inter-Vlan Routing.
      • Inter-Vlan Routing Using Layer 3 Switches.
      • Router-on-a-Stick Inter-Vlan Routing Configuration.
      • Router-on-a-Stick Inter-VLAN Routing Verification
      • Layer 3 Switch Inter-VLAN Routing Configuration.
      • Layer 3 Switch Inter-VLAN Routing Verification
      • Troubleshoot Inter-Vlan Routing.

  • 5.0 Spanning Tree Protocol
      • Issues with Redundant Switch Links
      • Layer 2 Loops – Video
      • Broadcast Storm
      • Steps to a Loop-Free Topology. 
      • Electing a Root Bridge (RB) with the help of BID.
      • Elect Root Port (RP), Designated Port (DP), Alternate Port (AP) etc,
      • STP Timers and Port States
      • Per-VLAN Spanning Tree
      • Different Versions of STP, PVSTP+, RSTP,  MSTP etc.
      • RSTP Port States and Port Roles
      • PortFast and BPDU Guard

  • 6.0 Ether Channel
      • Link Aggregation Vs Ether Channel.
      • Implementation Restrictions
      • AutoNegotiation Protocols PAgP Vs LACP
      • LACP Configuration 
      • Verify and Troubleshoot EtherChannel

  • 7.0 DHCPv4
      • DORA Process
      • Configure a Cisco IOS Router as a DHCP Server
      • Configure a DHCP Client

  • 8.0 SLAAC and DHCPv6
      • IPv6 Host Configuration
      • LLA Vs GUA Assignments.
      • ICMPv6 RA Vs RS
      • RA Message Flags.
      • Enable SLAAC
      • NS Vs NA Vs DAD
      • Stateless DHCPv6 Operation
      • Enable Stateless DHCPv6 on an interface
      • Enable Stateful DHCPv6 on an interface.
      • Configure Cisco Router as Stateless DHCPv6 Server/Client.
      • Configure Cisco Router as DHCPv6 Relay Agent.
  • 9.0 First Hop Redundancy Protocol (FHRP).
      •  Default Gateway Limitations
      • Virtual Router Redundancy.
      • Steps for Router Failover
      • FHRP Variations.
      • HSRP
      • HSRP Priority and Preemption
      • HSRP States and Timers

  • 10.0 LAN Security Concepts
      • Authentication with a Local Password
      • Authentication Vs Authorization Vs Accounting (AAA).
      • Switch Attack Categories and Mitigation Techniques.
      • MAC Address Table Flooding Attack and its Mitigation.
      • VLAN and DHCP Attacks – Video
      • DHCP, ARP and STP attacks.

  • 11.1 Switch Security Configuration.
      • Secure Unused Ports
      • Mitigate MAC Address Table Attacks
      • Enable Port Security
      • Limit the MAC Address Learning on a switch Port.
      • Port Security Aging
      • Port Security Violation Modes Restrict Vs Protect.
      • Ports in error-disabled State
      • Verify Port Security
      • Mitigating Vlan Hoping attacks. 
      • Steps to Implement DHCP Snooping
      • Dynamic ARP Inspection (DAI)
      • DAI Configuration Steps.
      • Spanning Tree Portfast and BPDU Guard.

  • 12.0 Wireless Lan (WLAN)
      • Introduction to CAPWAP
      • Split MAC Architecture
      • WLAN Threats -Video
      • DoS Attacks
      • Rogue Access Points
      • Securing WLANs 
      • SSID Cloaking and MAC Address Filtering
      • 802.11 Original Authentication Methods
      • Shared Key Authentication Methods

  • 13.0 Wireless Configuration.

  • 14.0 Routing Concepts

  • 15.0 Static Routing

  • 16.0 Troubleshoot Static and Dynamic Routes.
  • 1.0 OSPFv2 Within Single Area
      • OSPFv2 Vs OSPFv3
      • Components of OSPF
      • Link-State Routing Protocol Convergence  Process
      • Single Area Vs Multi-Area OSPF
      • Benefits of Multi-Area OSPF.
      • OSPF Packet Types – Video
      • LSU Vs LSA
      • OSPF Operational States
      • Establish Neighbor Adjacencies
      • Synchronizing OSPF Databases
      • DR and BDR Election for a Multiaccess Network

  • 2.0 OSPFv2 Configuration
      • OSPF Routing Process ID
      • Router-ID and its precedence
      • Why Configure a Loopback Interface as the Router ID
      • Manually Configuring a Router-ID.
      • Advertising Networks Using Network command
      • what is Wild Card Mask
      • Configure Specific Interfaces to run OSPF.
      • OSPF Passive Interfaces
      • OSPF Network Types Loopback Vs Point-to-Point Vs Broadcast.
      • OSPF Network Type BMA Vs NBMA
      • Change the OSPF Network Type from Broadcast to Point-to-Point.
      • DR and BDR election Criteria on OSPF Broadcast Multiaccess Networks.
      • DR failure and Recovery
      • Manually Changing the OSPF Priority to elect a DR.
      • Propagate a Default Static Route in OSPFv2
      • Verify the Propagated Default Route
      • OSPF Verification commands.

  • 3.0 Network Security Concepts
      • Type of Hackers
      • Attack Types
      • Malware
      • Dos Vs DDos Attacks
      • TCP and UDP Vulnerabilities. 
      • TCP SYN Flood Attack
      • ARP Cache Poisoning.
      • DNS Attacks
      • Cryptography

  • 4.0 Access Control Lists (ACL)
      • Packet Filtering with ACLs.
      • Wild Card Mask usage in ACLs.
      • Types of WCM and Calculations.
      • Types of IPV4 ACLs
        • Standard and Extended ACLs
        • Numbered and Named ACLs
        • Placement of Standard and Extended ACLs.

  • 5.0 Configure a Standard ACLs
      • Configure Numbered Standard ACL.
      • Configure a Named Standard ACL
      • Apply to an Interface in In-Bound or Out-Bound.
      • Modify IPV4 ACLs Using Text Editors Vs Sequence Numbers.
      • Modify a Named ACL
      • Verify ACL Implementation
      • Securing VTY access using ACLs
      • The Access-Class command.
      • Configure Extended IPV4 ACLs
      • Numbered and Named Extended ACLs
      • Using Protocols and Port Numbers.
      • TCP Established Extended ACL
      • Edit Extended ACLs
      • Verify Extended ACLs

  • 6.0 Network Address Translation (NAT).
      • Private IP address to Public IP address Conversion.
      • How NAT Works – Video
      • NAT Terminology Inside Vs Outside Addresses.
      • Static One-to-One Nating.
      • Dynamic NAT Vs PAT
      • NAT and PAT Comparison.
      • Packets without a Layer 4 Segment Port Numbers.
      • Advantages Vs Dis-Advantages of NAT
      • Configure and Verify Static NAT
      • Configure and Verify Dynamic NAT
      • Debug Dynamic NAT
      • Analyze Dynamic NAT
      • Configure PAT to Use a Single IPv4 Address
      • Configure PAT to Use an Address Pool
      • Analyze PAT – PC to Server
      • Analyze PAT – Server to PC
      • Verifying PATing.
      • NAT64 with IPv6

  • 7.0 Wide Area Network (WAN)
      • LANs Vs WANs
      • Dedicated and Shared WANs
      • WAN Topologies
      • Single Vs Dual Carrier (Multi-Homed) WAN connections.
      • Evolving Networks
      • Common WAN Terminologies.
      • Circuit-Switched Vs Packet-Switched Communication
      • SDH, SONET, and DWDM
      • Legacy or Traditional WAN Connectivity Options.
      • Modern WAN Connectivity Options
      • Ethernet WAN Vs MPLS
      • Internet-Based Connectivity Options.
      • Wired Options DSL, Cable, Optical Fiber etc.
      • Wireless Options Wi-Fi, Cellular, WiMax, Satellite etc.

  • 8.0 VPN Technologies.
      • Site-to-Site Vs Remote-Access VPNs.
      • Enterprise-Managed Vs Service-Provider-Managed VPNs
      • Remote-Access VPNs
      • SSL VPNs
      • Site-to-Site IPsec VPNs
      • GRE over IPsec
      • Dynamic Multipoint VPNs
      • IPsec Virtual Tunnel Interface
      • Service Provider MPLS VPNs
      • IPsec Technologies
      • IPsec Protocol Encapsulation
      • Confidentiality, Integrity and Authentication
  • 9.0 Quality Of Service (QOS)
      • Prioritizing Traffic
      • Bandwidth, Congestion, Delay, and Jitter
      • Queuing Algorithms FIFO, WFQ, CBWFQ, LLQ etc.
      • QOS Model Best efforts, Integrated Vs Differentiated Service.
      • QOS Tools Classification and Marking.
      • Layer 2COS and Layer 3 TOS Bits.
      • DSCP Values
      • Congestion Avoidance 
      • Shaping Vs Policing.

  • 10.0 Network Management
      • Discover Devices using Cisco CDP Protocol
      • Configure and Verify CDP
      • Discover Devices using LLDP.
      • Configure and Verify LLDP.
      • Configure and Verify Network Time Protocol (NTP).
      • Introduction of Simple Network Management Protocol (SNMP).
      • SNMP Operation.
      • Introduction to SysLog Service.
      • Syslog Operation.
      • Configure Syslog TimeStamps.
      • Router and Switch File maintenance. 
      • Router and Switch File Systems.
      • Using TFTP server to Backup and Restore a Device Configuration.
      • Password Recovery Procedures.
      • Backup and Restore an IOS image to and from a TFTP Server.
      • The Boot System Command to Run Specific IOS.

  • 11.0 Network Design.
      • 11.1.1 Three Layer Network Design – Video
      • 11.1.2 The Need to Scale the Network – Video
      • Three-Tier Vs Two-Tier
      • Scalable Vs Redundant Networks
      • Enterprise Switch Platforms
      • Port Density.
      • Power Over Ethernet (POE)
      • Cisco Routers
  • 12.0 Network Troubleshooting.
      • Network Topologies Physical Vs Logical
      • Protocol Analyzers
      • Syslog Server as a Troubleshooting Tool
      • 12.4.0 Layered Troubleshooting
      • Components of Troubleshooting End-to-End Connectivity
      • End-to-End Connectivity Problem Initiates Troubleshooting
      • Step 1 – Verify the Physical Layer
      • Step 2 – Check for Duplex Mismatches
      • Step 3 – Verify Addressing on the Local Network
      • Step 4 – Verify Default Gateway
      • Step 5 – Verify Correct Path
      • Step 6 – Verify the Transport Layer
      • Step 7 – Verify ACLs
      • Step 8 – Verify DNS

  • 13.0 Network Virtualization
      • Cloud Computing versus Data Center
      • Cloud Services and Models
      • Cloud Computing and Virtualization
      • Dedicated Servers Vs Server Virtualization
      • Advantages of Virtualization
      • Abstraction Layers
      • Type 2 Hypervisors
      • Type 1 Hypervisors
      • Installing a VM on a Hypervisor
      • Software-Defined Networking SDN
      • Control Plane and Data Plane
      • Network Virtualization Technologies
      • Traditional and SDN Architectures
      • SDN Controller and Operations

  • 14.0 Network Automation
      • Video – Automation Everywhere
      • The Increase in Automation
      • Video – Data Formats
      • 14.3.1 Video – APIs
      • The API Concept
      • 14.3.3 An API Example
      • 14.4.2 REST and RESTful API
      • Traditional Network Configuration
      • Network Automation
      • Compare Ansible, Chef, Puppet, and SaltStack
      • IBN and Cisco DNA Center

                 Group-1       Online virtual Class               06/15/2025 –  09/18/2025

200-301: Cisco Certified Network Associate CCNA

10:00 PM – 12:30 AM 

          PK Rupee 6000

                 Group-2       Online virtual Class               06/23/2025 –  09/24/2025

200-301: Cisco Certified Network Associate CCNA

10:00 PM – 12:30 AM 

          PK Rupee 6000