وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CCNA 200-301 Complete course – Not Just another CCNA course

سرفصل های دوره

A complete course which covers all the exam topics of CCNA 200-301. It includes 18 Hours of Theory and 9 Hours of Lab.


1. Introduction
  • 1. Instructor s profile, why it is the best course, Exam topics, & Course Duration
  • 2. What is your REASON to study CCNA
  • 3. What is CCNA, who is CISCO, why to follow cisco learning program
  • 4. What Jobs you can take as a Network Engineer

  • 2. Chapter 1 Network Fundamentals
  • 1. History of Networking Standards
  • 2. What is TCPIP
  • 3. Comparing OSI and TCPIP Models
  • 4. TCPIP Transport Layer
  • 5. Compare TCP to UDP
  • 6. Multiplexing using port numbers
  • 7. TCP connection establishment and termination
  • 8. Server Virtualization
  • 9. Cloud Computing Services
  • 10. Ethernet cable & Fiber optic cable
  • 11. Understanding Binary, Decimal, and Hexadecimal numbers
  • 12. What is an IP Address
  • 13. Understanding Network Addressing and its different classes
  • 14. Private IP addresses (RFC 1918), Layer 2 & 3 Broadcast, Subnet Mask, and CIDR
  • 15. Understanding IPv4 Subnetting Rules with help of Class C Network Address Example
  • 16. IPv4 Subnetting using Class B addresses
  • 17. IPv4 Subnetting using Class A addresses
  • 18. Understanding Unicast, Broadcast, Multicast and IPv4 address types
  • 19. What is an IPv6 Address
  • 20. IPv6 address expression, IPv6 address types, and IPv6 global routing prefix
  • 21. IPv6 Global Routing Prefix & IPv6 Subnetting
  • 22. How IPv6 Addressing works Manual, Stateless & Stateful Auto-Configuration
  • 23. What is Anycast Address And how does it work
  • 24. IP Parameters for a Client OS IP, Subnet Mask, Default Gateway, DNS
  • 25. Verify IP parameters for Client OS (Windows, Mac OS, Linux)

  • 3. Chapter 2 Network Access
  • 1. Introduction
  • 2. Understanding Collision Domain and Broadcast Domain
  • 3. Understanding Different Types of Network Devices
  • 4. What is a HUB device How does it work
  • 5. What is a Switch Understanding Layer 2 Switching & unknown unicast flooding
  • 6. What is a Bridge Device How does it work
  • 7. Half Duplex and Full Duplex Ethernet
  • 8. What is a VLAN How does it work
  • 9. Understanding Switch Port Types Access, Voice Access, Trunk
  • 10. What is a TRUNK port How does it work
  • 11. Understanding Native VLAN, Untagged frames, ISL, 802.1Q, VTP
  • 12. Understanding INTER-VLAN routing and its different scenarios
  • 13. Cisco Packet Tracer Introduction and Setup
  • 14.1 2. Network Access-LAB-1.pdf
  • 14. LAB1 Configure and verify initial switch configuration including remote access
  • 15.1 2. Network Access-LAB-2.pdf
  • 15. LAB2 Verify network status and switch operation using basic utilities
  • 16.1 2. Network Access-LAB-3.pdf
  • 16. LAB3 Configure speed, duplex, and description
  • 17.1 2. Network Access-LAB-4.pdf
  • 17. LAB4 Configure, verify, and troubleshoot VLANs (NormalExtended)
  • 18.1 2. Network Access-LAB-5.pdf
  • 18. LAB5 Configure, verify, and troubleshoot Inter-Switch connectivity
  • 19.1 2. Network Access-LAB 5A.pdf
  • 19. LAB5A Configure Inter-VLAN routing - Scenario 1
  • 20.1 2. Network Access-LAB5B.pdf
  • 20. LAB5B Configure Inter-VLAN routing - Scenario 2
  • 21.1 2. Network Access-LAB 5C.pdf
  • 21. LAB5C Configure Inter-VLAN routing - Scenario 3
  • 22. Spanning Tree Protocol (STP)
  • 23. Spanning Tree Terminologies
  • 24. Spanning Tree Port Roles
  • 25. Spanning Tree Port Stages
  • 26. Understanding Convergence
  • 27. Spanning Tree Link cost
  • 28. Spanning Tree protocol Operation
  • 29. Spanning Tree Protocol Animation
  • 30. Types of Spanning Tree Protocols
  • 31.1 2. Network Access-LAB-6.pdf
  • 31. LAB6 Spanning tree & toolkit configuration
  • 32.1 2. Network Access-LAB-7.pdf
  • 32. LAB7 Configure and verify layer 2 protocols (CDP,LLDP)
  • 33. Understanding EtherChannel
  • 34.1 2. Network Access-LAB-8.pdf
  • 34. LAB8 Configure, verify, and troubleshoot L2L3 EtherChannel
  • 35. Understanding Power Over Ethernet (POE), Terminology and operation
  • 36. Campus LAN topologies and design terminologies
  • 37. Understanding Wireless Technology
  • 38. Understanding Wireless Access point (AP)
  • 39. Understanding Other Wireless Topologies
  • 40. Understanding Radio Frequency (RF), Wireless Band, and channels
  • 41. Access Point and Wireless Standards
  • 42. Securing a Wireless Connection
  • 43. Understanding Wireless Authentication methods
  • 44. Understanding EAP and its authentication methods
  • 45. Understanding TKIP (Temporal Key Integrity Protocol)
  • 46. Understanding CCMP & GCMP
  • 47. Understanding WPA, WPA2, and WPA3
  • 48. Understanding Different Types of Access Points
  • 49. Understanding Light Weight AP(Access-point) and WLC (Wireless LAN Controller)
  • 50. Understanding Cloud Based AP Architecture and Securing WLAN
  • 51. Scaling AP (Access point) and WLC (Wireless LAN Controller)
  • 52. Understanding Cisco WLAN Deployments options
  • 53. Understanding Cisco Light-Weight AP(Access-Point) modes

  • 4. 3. IP Connectivity
  • 1. Router - What is it and how it works
  • 2. Longest Match Rule
  • 3. IP Routing Process
  • 4. Cisco Router Internal Process
  • 5. Routing Table
  • 6. Routing Protocol Basics
  • 7. Types of Routing
  • 8. Static Routing
  • 9. Default Route
  • 10. GNS3 Introduction and setup guide
  • 11.1 c3725-adventerprisek9-mz.124-15.t7.zip
  • 11. GNS3 Setting up Lab Topology
  • 12.1 3. IP Connectivity-LAB 1.pdf
  • 12. LAB 1 Network Topology Setup with Initial configuration
  • 13.1 3. IP Connectivity-LAB 2.pdf
  • 13. LAB 2 Static and Default Routing
  • 14. Dynamic Routing
  • 15. OSPF Introduction, Areas, OSPF Routers
  • 16. OSPF Terminologies
  • 17. OSPF Network Types
  • 18. OSPF Operation
  • 19. OSPF Metric
  • 20. OSPF Single Area vs Multi Area
  • 21. OSPF Adjacency requirements
  • 22. OSPF How to Memorize it
  • 23.1 3. IP Connectivity-LAB 3.pdf
  • 23. LAB 3 Enabling OSPF
  • 24.1 3. IP Connectivity-LAB 4.pdf
  • 24. LAB 4 Configure single area OSPF version 2
  • 25. FHRP (First Hop Redundancy Protocols)
  • 26.1 3. IP Connectivity-LAB 1.pdf
  • 26. HSRP (Hot Standby Router Protocol)
  • 27.1 3. IP Connectivity-LAB 5.pdf
  • 27. LAB 5 IPv6 Topology setup with Initial configuration
  • 28.1 3. IP Connectivity-LAB 6.pdf
  • 28. LAB 6 IPv6 static routing

  • 5. 4. IP Services
  • 1. DNS What is it and how it works
  • 2. NAT (Network Address Translation) - Introduction, types, terminology
  • 3. NAT How does it work
  • 4.1 4. IP Services-LAB 1.pdf
  • 4. LAB 1 STATIC NAT
  • 5.1 4. IP Services-LAB 2.pdf
  • 5. LAB 2 Dynamic NAT
  • 6.1 4. IP Services-LAB 3.pdf
  • 6. LAB 3 NAT Overload (PAT)
  • 7.1 4. IP Services-LAB 4.pdf
  • 7. LAB 4 NTP
  • 8. DHCP What is it and how it works
  • 9.1 4. IP Services-LAB 5.pdf
  • 9. LAB 5 DHCP
  • 10.1 4. IP Services-LAB 6.pdf
  • 10. LAB 6 DHCP Relay
  • 11. SNMP What is it and how it works
  • 12. Securing SNMP
  • 13. Understanding FTP Protocol, FTP Server, Client, and connection process
  • 14. FTP connection types and modes
  • 15. Understanding TFTP
  • 16. QOS Overview and why we need it
  • 17. QOS How it manages network traffic
  • 18. Understanding different types of network traffic and their QoS requirements
  • 19. QOS tools
  • 20. QOS Classification & Marking tool, Queuing tools
  • 21. QOS Marking IPP, DSCP, COS, and marking fields
  • 22. QOS Marking Understanding EF, AF, and CS markings
  • 23. QOS Congestion Managment(Queuing), Round Robin Scheduling(Prioritization), LLQ
  • 24. QOS Shaping and policing
  • 25. QOS Trust Boundaries
  • 26. QOS Prioritization strategy for Data, Voice, and Video

  • 6. 5. Security Fundamentals
  • 1. Understanding Security Terminologies
  • 2. Address spoofing attacks
  • 3. Denial of Service (DOS) attack
  • 4. Reflection and Amplification attack
  • 5. Review TCPIP and ARP
  • 6. Man in the Middle attack
  • 7. Reconnaissance attacks, Buffer overflow attacks, and Malware
  • 8. Human Vulnerabilities
  • 9. Password Vulnerabilities and Password alternatives
  • 10. AAA, TACACS+, and RADIUS
  • 11. Developing a security program
  • 12. Internet VPN and its types
  • 13.1 5. Security Fundamentals-LAB 1.pdf
  • 13. LAB 1 Switchport security
  • 14.1 5. Security Fundamentals-LAB 2.pdf
  • 14. LAB 2 SSH
  • 15. ACL(Access-lists)
  • 16. Types of Access-list, Inbound and outbound ACL
  • 17. ACL implementation guidelines
  • 18. Standard Access-List
  • 19. Wild Card Mask
  • 20.1 5. Security Fundamentals-LAB 3.pdf
  • 20. LAB 3 Standard Access-list
  • 21.1 5. Security Fundamentals-LAB 4.pdf
  • 21. LAB 4 Standard Access-list
  • 22.1 5. Security Fundamentals-LAB 5.pdf
  • 22. LAB 5 Controlling VTY(TelnetSSH) access
  • 23. Extended Access-list
  • 24.1 5. Security Fundamentals-LAB 6.pdf
  • 24. LAB 6 Extended ACL
  • 25. Named Access-list
  • 26.1 5. Security Fundamentals-LAB 7.pdf
  • 26. LAB 7 Named Standard Access-list
  • 27.1 5. Security Fundamentals-LAB 8.pdf
  • 27. LAB 8 Named Extended Access-list

  • 7. 6. Network Automation & Programmability
  • 1. Data Plane, Control Plane, and Managment Plane
  • 2. Controllers, Software Defined Architecture, NBI, and SBI
  • 3. Network programmability and SDN solutions
  • 4. Cisco Application Centric Infrastructure (APIC)
  • 5. ACI Operating Model with Intent Based Networking
  • 6. Cisco APIC Enterprise Model
  • 7. Comparing Traditional vs controller-based networks
  • 8. Cisco SDA (Software Defined Access) and DNA (digital network architecture)
  • 9. Cisco SDA - Underlay
  • 10. Cisco SDA underlay roles and SDA overlay
  • 11. Cisco SDA - IP Address usage
  • 12. Revisiting Layer 2 switching, Layer 3 routing & forwarding process
  • 13. Understanding SDA forwarding
  • 14. Cisco DNA center & SDA Security
  • 15. Traditional network management platform vs DNA center
  • 16. REST API
  • 17. Data & Variables
  • 18. REST API & HTTP, Software CRUD actions and HTTP verbs
  • 19. HTTP verbs and URI
  • 20. DATA Serialization
  • 21. Understanding JSON
  • 22. Per device (Traditional) configuration model vs Centralized configuration model
  • 23. Configuration provisioning, templates and variables, management tools & Files
  • 24. ANSIBLE, PUPPET, and CHEF
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 502
    حجم: 14640 مگابایت
    مدت زمان: 1681 دقیقه
    تاریخ انتشار: 22 دی 1401
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید