Computer Hardware
Computer Networking
Cisco Certified Network Assocoate
Microsoft Certified Systems Engineer
Red Hat Examination

Cisco Certified Network Associate : CCNA(640-802)(1 month 15 days)


  • Internetworking Basics

  • Internetworking Models
  • The Layered Approach
  • Advantages of Reference Models

The OSI Reference Model

  • The Application Layer
  • The Presentation Layer
  • The Session Layer
  • The Transport Layer
  • The Network Layer
  • The Data Link Layer
  • The Physical Layer

Ethernet Networking

  • Half- and Full-Duplex Ethernet
  • Ethernet at the Data Link Layer
  • Ethernet at the Physical Layer

Ethernet Cabling

  • Straight-Through Cable
  • Crossover Cable
  • Rolled Cable

Data Encapsulation

The Cisco Three-Layer Hierarchical Model

  • The Core Layer
  • The Distribution Layer
  • The Access Laer

Introduction to TCP/IP

TCP/IP and the DoD Model

  • The Process/Application Layer Protocols
  • The Host-to-Host Layer Protocols
  • The Internet Layer Protocols

IP Addressing

  • IP Terminology
  • The Hierarchical IP Addressing Scheme
  • Private IP Addresses

Broadcast Addresses

Subnetting, Variable Length Subnet Masks (VLSMs), and Troubleshooting TCP/IP

Subnetting Basics

  • IP Subnet-Zero
  • How to Create Sunets
  • Subnet Masks
  • Classless Inter-Domain Routing (CIDR)
  • Subnetting Class C Addresses
  • Subnetting Class B Addresses
  • Subnetting Class A Addresses

Variable Length Subnet Masks (VLSMs)

  • VLSM Design
  • Implementing VLSM Networks


Troubleshooting IP Addressing

  • Determining IP Address Problems

Cisco’s Internetworking Operating System (IOS) and Security Device Manager (SDM)

The IOS User Interface

  • Cisco Router IOS
  • Connecting to a Cisco Router
  • Bringing Up a Router

Command-Line Interface (CLI)

  • Entering the CLI from a Non-ISR Router
  • Overview of Router Modes
  • CLI Prompts
  • Editing and Help Features
  • Gathering Basic Routing Information

Router and Switch Administrative Configurations

  • Hostnames
  • Banners
  • Setting Passwords
  • Encrypting Your Passwords
  • Descriptions

Router Interfaces

  • Bringing Up an Interface

Viewing, Saving, and Erasing Configurations

  • Deleting the Configuration and Reloading the Router
  • Verifying Your Configuration

Cisco’s Security Device Manager (SDM)

Managing a Cisco Internetwork

The Internal Components of a Cisco Router

The Router Boot Sequence

Managing Configuration Register

  • Understanding the Configuration Register Bits
  • Checking the Current Configuration Register Value
  • Changing the Configuration Register
  • Recovering Passwords
  • Boot System Commands

Backing Up and Restoring the Cisco IOS

  • Verifying Flash Memory
  • Backing Up the Cisco IOS
  • Restoring or Upgrading the Cisco Router IOS
  • Using the Cisco IOS File System (Cisco IFS)
  • Using the SDM to Manage the Flash Memory

Backing Up and Restoring the Cisco Configuration

  • Backing Up the Cisco Router Configuration
  • Restoring the Cisco Router Configuration
  • Erasing the Configuration
  • Using the Cisco IOS File System to Manage Your
  • Router’s Configuration (Cisco IFS)
  • Using the SDM to Back Up/Restore and Edit the Router’s Configuration

Using Cisco Discovery Protocol (CDP)

  • Getting CDP Timers and Holdtime Information
  • Gathering Neighbor Information
  • Gathering Interface Traffic Information
  • Gathering Port and Interface Information
  • Documenting a Network Topology Using CDP

Using Telnet

  • Telnetting into Multiple Devices Simultaneously
  • Checking Telnet Connections
  • Checking Telnet Users
  • Closing Telnet Sessions
  • Using SDM to Telnet into Your Router

Resolving Hostnames

  • Building a Host Table
  • Using DNS to Resolve Names

Checking Network Connectivity and Troubleshooting

  • Using the ping Command
  • Using the traceroute Command
  • Debugging
  • Using the show processes Command

IP Routing

Routing Basics

The IP Routing Process

  • Testing Your IP Routing Understanding
  • Configuring IP Routing

Configuring IP Routing in Our Network

  • Static Routing
  • Default Routing

Dynamic Routing

  • Routing Protocol Basics

Distance-Vector Routing Protocols

  • Routing Loops

Routing Information Protocol (RIP)

  • RIP Timers
  • Configuring RIP Routing
  • Verifying the RIP Routing Tables
  • Configuring RIP Routing
  • Holding Down RIP Propagations
  • RIP Version 2 (RIPv2)

Interior Gateway Routing Protocol (IGRP)

Verifying Your Configurations

  • The show ip protocols Command
  • The debug ip rip Command
  • Enabling RIPv2 on Our Internetwork

Enhanced IGRP (EIGRP) and Open Shortest Path First (OSPF)

    EIGRP Features and Operation
  • Protocol-Dependent Modules
  • Neighbor Discovery
  • Reliable Transport Protocol (RTP)
  • Diffusing Update Algorithm (DUAL)
  • Using EIGRP to Support Large Networks
  • Multiple ASes
  • VLSM Support and Summarization
  • Route Discovery and Maintenance
  • Configuring EIGRP
  • Corp
  • R1
  • R2
  • R3
  • Redistributing to the 871W Router from R3
  • Configuring Discontiguous Networks

Load Balancing with EIGRP

Verifying EIGRP

Open Shortest Path First (OSPF) Basics

  • OSPF Terminology
  • SPF Tree Calculation
  • Configuring OSPF
  • Enabling OSPF
  • Configuring OSPF Areas
  • Configuring Our Network with OSPF

Verifying OSPF Configuration

  • The show ip ospf Command
  • The show ip ospf database Command
  • The show ip ospf interface Command
  • The show ip ospf neighbor Command
  • The show ip protocols Command
  • Debugging OSPF OSPF DR and BDR Elections
  • Neighbors
  • Adjacencies
  • DR and BDR Elections
  • OSPF and Loopback Interfaces
  • Configuring Loopback Interfaces
  • OSPF Interface Priorities
  • Troubleshooting OSPF
  • Configuring EIGRP and OSPF Summary Routes

Layer 2 Switching and Spanning Tree Protocol (STP)

Before Layer 2 Switching Switching Services

  • Limitations of Layer 2 Switching
  • Bridging vs. LAN Switching
  • Three Switch Functions at Layer 2

Spanning Tree Protocol (STP)

  • Spanning Tree Terms
  • Spanning Tree Operations
  • Configuring Catalyst Switches
  • Catalyst Switch Configuration
  • Verifying Cisco Catalyst Switches

Cisco Network Assistant

Virtual LANs (VLANs)

VLAN Basics

  • Broadcast Control
  • Security
  • Flexibility and Scalability

VLAN Memberships

  • Static VLANs
  • Dynamic VLANs

Identifying VLANs

  • Frame Tagging
  • VLAN Identification Methods

VLAN Trunking Protocol (VTP)

  • VTP Modes of Operation
  • VTP Pruning

Routing between VLANs

Configuring VLANs

  • Assigning Switch Ports to VLANs
  • Configuring Trunk Ports
  • Configuring Inter-VLAN Routing

Configuring VTP

  • Troubleshooting VTP
  • Telephony: Configuring Voice VLANs
  • Configuring the Voice VLAN
  • Configuring IP Phone Voice Traffic
  • Using the CNA to Configure VLANs and

    Inter-VLAN Routing


  • Perimeter, Firewall, and Internal Routers
  • Recognizing Security Threats
  • Mitigating Security Threats
  • Cisco’s IOS Firewall
  • Introduction to Access Lists
  • Mitigating Security Issues with ACLs
  • Standard Access Lists
  • Wildcard Masking
  • Standard Access List Example
  • Controlling VTY (Telnet) Access
  • Extended Access Lists Advanced Access Lists
  • Named ACLs
  • Switch Port ACLs
  • Lock and Key (Dynamic ACLs)
  • Reflexive ACLs
  • Time-Based ACLs
  • Remarks
  • Context-Based Access Control (Cisco IOS Firewall)
  • Authentication Proxy
  • Monitoring Access Lists Configuring Access Lists Using SDM
  • Creating ACLs with SDM
  • Creating Firewalls with SDM

Network Address Translation (NAT)

When Do We Use NAT?

Types of Network Address Translation

NAT Names

How NAT Works

  • Static NAT Configuration
  • Dynamic NAT Configuration
  • PAT (Overloading) Configuration
  • Simple Verification of NAT

Testing and Troubleshooting NAT

Configuring NAT on Our Internetwork

Configuring NAT Using SDM

Cisco’s Wireless Technologies

Introduction to Wireless Technology

  • The 802.11 Standards
  • Comparing 802.11

Cisco’s Unified Wireless Solution

  • Split-MAC Architecture
  • MESH and LWAPP
  • AWPP
  • Wireless Security

Configuring Our Wireless Internetwork

Internet Protocol Version 6 (IPv6)

Why Do We Need IPv6?

The Benefits and Uses of IPv6

IPv6 Addressing and Expressions

  • Shortened Expression
  • Address Types
  • Special Addresses

How IPv6 Works in an Internetwork

  • Autoconfiguration
  • Configuring Cisco Routers with IPv6
  • DHCPv6
  • ICMPv6

IPv6 Routing Protocols

  • RIPng
  • EIGRPv6
  • OSPFv3

Migrating to IPv6

  • Dual Stacking
  • 6to4 Tunneling
  • NAT-PT
  • Configuring IPv6 on Our Internetwork
  • Configuring RIP
  • Configuring OSPFv3

Wide Area Networks

Introduction to Wide Area Networks

  • Defining WAN Terms
  • WAN Connection Types
  • WAN Support

Cable and DSL

  • Cable
  • Digital Subscriber Line (DSL)
  • Cabling the Serial Wide Area Network

    • Serial Transmission
    • Data Terminal Equipment and Data Communication


    High-Level Data-Link Control (HDLC) Protocol

    Point-to-Point Protocol (PPP)

  • Link Control Protocol (LCP) Configuration Options
  • PPP Session Establishment
  • PPP Authentication Methods
  • Configuring PPP on Cisco Routers
  • Configuring PPP Authentication
  • Verifying PPP Encapsulation
  • PPPoE Configuration

Frame Relay

  • Introduction to Frame Relay Technology
  • Frame Relay Implementation and Monitoring

Using SDM for WAN Connections

  • Configuring PPP with Authentication Using SDM
  • Configuring PPPoE with SDM
  • Configuring Frame Relay with SDM

Virtual Private Networks

  • Introduction to Cisco IOS IPSec
  • IPSec Transforms
  • Configuring VPNs/IPSec Using the SDM
User :
Password :

Home - About Us - Services - Courses- Photogallery - Testimonial - Enquiry - Contact Us