وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Learning Path Cisco CCNA 200-301

سرفصل های دوره

1.Networking Fundamentals
    1.Introduction to Networking Technologies
  • Introduction to Networking Technologies
  • Intro-Network-Technologies.pdf
  • Intro-to-Networking.pdf
      1.Course Introduction
    • 1.Course Introduction
      1.Course Overview
    • 1.Introduction to Networking Technologies
    • 2.What is a Computer Network
      2.Components Of Computer Networks
    • 1.What Is A Computer Network
    • 2.Components Of Networks Servers, NICs, Switches, Routers Firewalls
    • 3.Components Of Computer Networks Wi-Fi & DNA Center
      2.Networking Technology
    • 1.Components of a Computer Network
    • 2.Technologies That Comprise a Network
      3.Networking Careers
    • 1.Computer Networking Job Roles
    • 2.Computer Networking Job Specialties
      3.Network Math
    • 1.Network Math Binary
    • 2.Network Math Hexadecimal
      4.Conclusion
    • 1.Where Do I Go From Here
      4.Network Architectures
    • 1.Network Topology Architectures
      5.Power Over Ethernet
    • 1.Power Over Ethernet (PoE)
    2.Beginning The Cisco Journey
      1.Introduction
    • 1.Course Introduction
      2.Topic
    • 1.Building a Small Wired Network Part 1
    • 2.Building a Small Wired Network Part 2
    • 3.Building a Small Wired Network Part 3
    • 4.Building a Small Wired Network Part 4
    • 5.Building a Small Wired Network Part 5
    3.Introduction to IPv4 TCP UDP
  • Introductionto IPv4 TCP and UDP
  • Introduction To IPv4 TCP & UDP.pdf
      1.Course
        1.Course Introduction
      • 1.Course Introduction
        2.Introducing IPv4
      • 1.History Purpose Of The Internet Protocol
      • 2.IPv4 Header Fields
        3.IPv4 Address Overview
      • 1.Why Do We Need IPv4 Addresses
      • 2.Identifying The Network Bits
      • 3.Identifying Your Own IP Information
        4.Introducing UDP
      • 1.Overview Of UDP
        5.Introducing TCP
      • 1.Introduction To TCP
      • 2.TCP 3Way Handshake
    4.IPv4 Addressing Subnetting
  • IPv4-Addressing-Subnetting.pdf
      1.Course
        1.Topic
      • 1.Introduction
      • 2.Brief History of IPv4
      • 3.Communications within Broadcast Domains
      • 4.Identifying Classes Types of IPv4 Addresses Part 1
      • 5.Identifying Classes Types of IPv4 Addresses Part 2
      • 6.IPv4 Governing Bodies
      • 7.Private vs Public Addresses
      • 8.IPv4 Subnet Masks
      • 9.SameLength Subnetting Part 1
      • 10.SameLength Subnetting Part 2
      • 11.VariableLength Subnet Masking
      • 12.IPv4 Address Summarization Supernetting
    5.What is Ethernet and Why Should I Care
  • What-Is-Ethernet-Anyway.pdf
      1.Course
        1.Ethernet
      • 1.Course Introduction
      • 2.Overview History
      • 3.CSMA CD Operation
      • 4.Autonegotiation
      • 5.Ethernet Frame Structure
      • 6.Ethernet Frame Size
      • 7.Ethernet Cabling
    7.Introduction to IPv6
      1.Group
        1.Topic
      • 1.Introduction to IPv6 History Address Representation
      • 2.Introduction to IPv6 v4 v6 Header Comparisons
      • 3.Introduction to IPv6 InterfaceIDs
      • 4.Introduction to IPv6 Address Types
      • 5.Introduction to IPv6 IPv6 Neighbor Discovery
      • 6.ARP The IPv6 Solution Solicited Node Multicast
    8.Understanding Common Network Applications
  • Common-Network-Applications.pdf
      1.Course
        1.Topics
      • 1.Understanding Common Network Application
      • 2.What do Applications have to do with a CCNA
      • 3.TCP and UDP An Overview
      • 4.DNS
      • 5.Categories Types of Applications
      • 6.Email
      • 7.Web Browsing
      • 8.Telnet
    9.Virtualization Fundamentals
  • VirtualizationFundamentalscoursetrailer
  • Virtualization-Fundamentals.pdf
      1.Course
        1.Course Introduction
      • 1.Course Introduction
        2.Virtualization Introduction
      • 1.Introduction To Virtualization
      • 2.An Overview Of Hypervisors
      • 3.Virtual Switches
        3.Virtualization Considerations
      • 1.Virtual Machine Resource Considerations
      • 2.Virtualization Networking Management Considerations
        4.Demonstration
      • 1.Virtualization Demonstration
      • 2.Course Conclusion

2.Wired Network Access Technologies
    1.The Rapid PVST Spanning Tree Protocol
  • Loop-Prevention-With-802 1w RSTP.pdf
  • The Rapid Pvst Spanning tree Protocol course trailer
      1.Course
        1.Course Introduction
      • 1.Course Introduction
        2.Loop Prevention
      • 1.The Goals Of Loop Prevention
        3.RSTP Operation
      • 1.Root Bridge Election
      • 2.Essential RSTP Cisco IOS Commands
      • 3.Root Port Election
      • 4.Designated NonDesignated Port Election
          Lab1.Essential Rapid-PVST
        • index.html
        4.RSTP Load-Balancing
      • 1.RapidPVST Topology Manipulation
          Lab1.Manipulating Rapid-PVST
        • index.html
        5.RSTP Sync Process
      • 1.RSTP Sync Process
        6.RSTP Timers
      • 1.RSTP Timers
        7.Topology Changes
      • 1.RSTP Topology Changes
    2.Implementing Interswitch Connectivity Using VLANs VLAN Trunks
      1.Group
        1.Topic
      • 1.Virtual LANs VLANs
      • 2.Voice VLAN
      • 3.VLAN Trunks Part 1
      • 4.VLAN Trunks Part 2
      • 5.Dynamic Trunking Protocol
          Lab1.VLANs & Trunking
        • index.html
          Lab2.Restricting VLANs on Trunks
        • index.html
          Lab3.Dynamic Trunking Protocol (DTP)
        • index.html

3.Wireless Network Access Technologies
    1.Wi-Fi Fundamental Principles
  • WiFi Fundamental Principles PDF.pdf
  • Wi-Fi Fundamental Principles
      1.Course
        1.Course Introduction
      • 1.Course Introduction
        2.Introduction To Wi-Fi
      • 1.Wi-Fi Defined
      • 2.Wi-Fi Components
      • 3.Wi-Fi Network Types & Terminology
        3.Radio Frequency Fundamentals
      • 1.Radio Frequency Explained
      • 2.Wi-Fi Modulation Techniques
      • 3.Radio Frequency Propagation
        4.Implementing RF Channels
      • 1.RF Channels
      • 2.Planning For RF Channel Implementation
      • 3.RF Channel Implementation - Demonstration
    2.An Overview Of WiFi Components Architectures
  • AnOverviewOfWiFiComponentsArchitectures
  • An Overview Of Wi-Fi Components & Architectures.pdf
      1.Course
        1.Course Introduction
      • 1.Course Introduction
      • 2.What Is A Wireless Architecture
        2.Types Of WLAN Architectures
      • 1.Autonomous WLAN Architectures
      • 2.CloudBased WLAN Architectures
      • 3.SplitMAC WLAN Architectures
      • 4.Introduction To CAPWAP
        3.WLAN Controllers
      • 1.WLAN Controller Deployment Options
      • 2.Cisco WLAN Controllers
      • 3.Infrastructure Connections Of WLAN Components
        4.Access Point Modes
      • 1.Cisco Access Point Modes
    3.Jumping Into WiFi Security
  • JumpingIntoWiFiSecurity
  • Jumping-Into-WiFi-Security.pdf
      1.Course
        1.Course Introduction
      • 1.Course Introduction
        2.Overview Of Wi-Fi Security
      • 1.The Need For Components Of WiFi Security
      • 2.WiFi Security Authentication
        3.WEP & WPA
      • 1.Understanding WEP WPA
      • 2.An Overview Of WPA2
      • 3.An Overview Of WPA3
        4.WPA2 Configuration
      • 1.Configuring WPA2 With PSK Autonomous Access Points
      • 2.Configuring WPA2 With PSK Wireless Controller

4.Establishing IPv4IPv6 Connectivity
    1.IP Routing Basics
  • IP-Routing-Basics.pdf
      1.Course
        1.Introduction
      • 1.Course Introduction
      • 2.Why Do We Need Routing
      • 3.Identifying Routable Addresses
      • 4.What Happens to a Packet
      • 5.When Are Routes Stored Part 1
      • 6.When Are Routes Stored Part 2
      • 7.How Are Routes Selected
        2.Contrasting Routing Protocols
      • 1.Contrasting Routing Protocols IGP & EGP
      • 2.Contrasting Routing Protocols High-Level Differences
      • 3.Contrasting Routing Protocols Distance Vector
      • 4.Contrasting Routing Protocols Link State
      • 5.Contrasting Routing Protocols Advanced Distance Vector
      • 6.Contrasting Routing Protocols Path Vector
    2.Implementing Inter-VLAN Routing
  • Implementing Inter-VLAN Routing
  • Inter-VLAN-Routing.pdf
      1.Course
        1.Inter-VLAN Routing
      • 1.Course Introduction
      • 2.Why Do We Need Inter-VLAN Routing
      • 3.Router-On-A-Stick - Theory
      • 4.Router-On-A-Stick - Implementation
      • 5.Switched Virtual Interfaces - Theory
      • 6.Switched Virtual Interfaces - Implementation
          Lab1.Inter-VLAN Routing
        • index.html
    3.IPv4 Routing With OSPF
  • IPv4RoutingWithOSPFCourseTrailer
  • IPv4 Routing With OSPF.pdf
      1.Introduction
    • 1.Ipv4 Routing With Ospf 1
      2.Ospf Basics
    • 1. Ipv4routingwithospf002
    • 2. Ipv4routingwithospf003
    • 3. Ipv4routingwithospf004
    • 4. Ipv4routingwithospf005
    • 5. Ipv4routingwithospf006
    • 6. Ipv4routingwithospf007
    • 7. Ipv4routingwithospf008
    • 8. Ipv4routingwithospf009
        Lab1.Initial Ospf Configuration
      • Index.html
        Lab2.Ospf Router Identifiers
      • Index.html
        Lab3.Ospf Dr
          Bdr Election
        • Index.html
        Lab3.Ospf Drbdr Election
      • Index.html
        Lab4.Ospf Network Types
      • Index.html
      3.Ospf Authentication
    • 1. Ipv4routingwithospf010
        Lab1.Implementing Ospf Authentication
      • Index.html
      4.Ospf Lsas
    • 1. Ipv4routingwithospf011
    • 2. Ipv4routingwithospf012
        Lab1.Ospfv2 Lsas (Summary And External Lsas)
      • Index.html
      5.Virtual Links & Path Selection
    • 1. Ipv4routingwithospf013
    • 2. Ipv4routingwithospf014
      6.Summarization & Filtering
    • 1. Ipv4routingwithospf015
    • 2. Ipv4routingwithospf016
    • 3. Ipv4routingwithospf017
    • 4. Ipv4routingwithospf018
      7.Ospf Stub Areas
    • 1. Ipv4routingwithospf019
      8.Ospf Administrative Distance
    • 1. Ipv4routingwithospf020
      9.Conclusion
    • 1. Ipv4routingwithospf021
    3.IPv4 Routing With OSPFv2
      1.Group
        1.Topic
      • 1.Open Shortest Path First OSPF Introduction
      • 2.OSPF Packet Types Adjacencies
      • 3.OSPF DR BDR Election
      • 4.OSPF Network Types Router Roles Tables
      • 5.Implementing OSPF
      • 6.OSPF Cost

5.Utilizing IP-Based Services
    1.Switching Security Features
  • SwitchingSecurityFeatures
  • Switching-Security-Features.pdf
      1.Course
        1.Course Introduction
      • 1.Course Introduction
        2.Port Security
      • 1.Port Security
      • 2.Monitoring Port Security
      • 3.Port Security Demonstration
          Lab1.Port Security Demonstration
        • index.html
          Lab2.Port-Security
        • index.html
        3.DHCP Snooping
      • 1.Overview Of DHCP Operations
      • 2.Securing Network Access With DHCP Snooping
      • 3.Configuring DHCP Snooping In Cisco IOS
      • 4.DHCP Snooping Demonstration
          Lab1.DHCP Snooping Demonstration
        • index.html
        4.Dynamic ARP Inspection
      • 1.Securing Network Access With Dynamic ARP Inspection
      • 2.Configuring Dynamic ARP Inspection In Cisco IOS
      • 3.Dynamic ARP Inspection Demonstration
          Lab1.Dynamic ARP Inspection Demonstration
        • index.html
        5.AAA Overview
      • 1.Securing Switch Access With AAA
    2.Understanding DHCP DNS NTP Services
  • UnderstandingDHCPDNSNTPServices
  • Understanding DHCP, DNS & NTP Services.pdf
      1.Course
        1.Course Introduction
      • 1.Course Introduction
        2.Introduction To DHCP
      • 1.The Dynamic Host Configuration Protocol DHCP
      • 2.Configuring Cisco IOS As A DHCP Server or Relay Agent
      • 3.Configuring DHCP Clients
        3.Introduction To DNS
      • 1.The Domain Name Service DNS
        4.Introduction To NTP
      • 1.The Network Time Protocol NTP
    3.Access Control Lists
      1.Infrastructure Services
        1.Access-Lists
      • 1.AccessList Overview
      • 2.Standard ACLs
      • 3.Extended ACLs
      • 4.Named ACLs
    4.A Beginners Guide To Network Address Translation NAT
  • A Beginners Guide To Network Address Translation NAT
  • Beginners-Guide-To-NAT.pdf
      1.Course
        1.Course Introduction
      • 1.Course Introduction
        2.Introduction To NAT
      • 1.Introducing Network Address Translation
        3.Types Of NAT
      • 1.Static NAT
      • 2.Dynamic NAT
      • 3.Port Address Translation PAT
    5.Network Monitoring With SNMP SYSLOG
  • NetworkMonitoringWithSNMPSYSLOG
  • Network-Monitoring-With-SNMP-SYSLOG.pdf
      1.Course
        1.Course Introduction
      • 1.Course Introduction
        2.SNMP Introduction
      • 1.Introduction To SNMP
      • 2.SNMP Components
        3.SNMP Versions
      • 1.SNMP Versions
        4.SNMP Configuration
      • 1.Configuring SNMPv1 v2c
      • 2.Configuring SNMPv3
      • 3.Verifying Your SNMP Configuration
        5.Syslog
      • 1.Introduction To Syslog
    6.Enhancing Network Operations With QoS
  • EnhancingNetworkOperationsWithQoscoursetrailer
  • Enhancing-Network-Operations With-QoS.pdf
      1.Course
        1.Course Introduction
      • 1.Course Introduction
        2.Introduction To QoS
      • 1.Introduction To QoS
        3.Classification
      • 1.Classification Marking
      • 2.IP Precedence DSCP
        4.Congestion Avoidance
      • 1.Congestion Avoidance With Policing Shaping
      • 2.Congestion Avoidance With PreEmptive Queue Drops
        5.Congestion Management
      • 1.Congestion Management Control With Queuing Scheduling
    7.Introducing VPNs
      1.WAN Technologies
        1.VPNs & MPLS
      • 1.MPLS Terminology and Concepts
      • 2.Introduction to VPNs
      • 3.Configuring GRE Tunnels

6.Network Automation & Programmability
    1.Introducing Network Programmability Automation
  • IntroducingNetworkProgrammabilityAutomation
  • VOD-3459 Introducing Network Programmability and Automation PDF.pdf
  • json-output-interpreting.zip
      1.Course
        1.Course Introduction
      • 1.Course Introduction
        2.Automation Goals & Impact
      • 1.HistoricalToCurrent Methods Of Network Management
      • 2.Introduction To Network Management Automation
      • 3.Network Management Automation Origination Points
      • 4.Network Management Automation Protocols Impact
        3.SDN & Automation
      • 1.Comparing Traditional Networks With ControllerBased Networking
      • 2.ControllerBased SDN Architectures
      • 3.SDNs Relationship To Management Control Data Planes
      • 4.Introducing Northbound Southbound APIs
        4.DNA Center
      • 1.Introduction To Cisco DNA Center
      • 2.Architectural Elements Of IntentBased Networking
      • 3.Comparing Traditional Campus Networks Against DNA CenterEnabled Networks
        5.REST
      • 1.Characteristics Of RESTbased APIs
        6.Network Automation Tools
      • 1.Overview Of Network Automation Tools
        7.Data Encoding & Representation
      • 1.Encoding Data With JSON

7.Additional Resources
    1.Effective techniques fo rbuilding home labs and using remote labs
  • Building-and-Using-Labs.pdf
      1.Course
        1.Topic
      • 1.Building Home Labs Prepare
      • 2.Building Home Labs Plan
      • 3.Building Home Labs Design Implement Operate
      • 4.Building Home Labs Last Tips
      • 5.Using Remote Labs Following Lab Guides
      • 6.Using Remote Labs Creating Your Own Labs
      • 7.Using Remote Labs Renting INE Remote Racks
    2.Getting Started with GNS3
      1.Course
        1.An Introduction to GNS3
      • 1.GNS3 Course Introduction
      • 2.A Simulator or an Emulator
        2.Selecting a Cisco IOS image
      • 1.Cisco Platform Considerations
      • 2.Feature Sets
      • 3.Memory Considerations
        3.GNS3 Download and Installation
      • 1.Locating and Downloading GNS3
      • 2.The GNS3 Setup Wizard Part 1
      • 3.The GNS3 Setup Wizard Part 2
      • 4.Projects Topologies Nodes
      • 4.Projects, Topologies & Nodes
      • 5.Device Toolbar Workspace Part 1
      • 5.Device Toolbar & Workspace Part 1
      • 6.Device Toolbar and Workspace Part 2
        4.Implementing Switching with GNS3
      • 1.BuiltIn Ethernet Switch Node
      • 1.Built-In Ethernet Switch Node
      • 2.Connecting Your GNS3 Topology to an External Switch
      • 3.EtherSwitch Router
        5.Using Built-In GNS3 Nodes
      • 1.BuiltIn Hub Node
      • 1.Built-In Hub Node
      • 2.BuiltIn FrameRelay Switch Node
      • 2.Built-In Frame-Relay Switch Node
      • 3.Using the VPCS Node
        6.Using Wireshark within GNS3
      • 1.Using Wireshark within GNS3
        7.GNS3 Snapshots
      • 1.Using GNS3 Snapshots
        8.Terminal Emulators
      • 1.Changing your Terminal Emulator within GNS3
        9.GNS3 CCNA Example Labs EIGRP
      • 1.EIGRP Lab Overview Objectives Topology
      • 1.EIGRP Lab Overview, Objectives & Topology
      • 2.EIGRP Part 1 Building the Physical Topology
      • 3.EIGRP Part 2 Adding IP Addresses
      • 4.EIGRP Part 3 Configuring Basic EIGRP
      • 5.EIGRP Part 4 Adding EIGRP Authentication
      • 6.EIGRP Part 5 Manipulating EIGRP Path Selection
        10.GNS3 CCNA Example Labs Switching
      • 1.Switching Lab Overview Objectives Topology
      • 1.Switching Lab Overview, Objectives & Topology
      • 2.Switching Part 1 Building the Physical Topology
      • 3.Switching Part 2 Adding IP Addresses and Static Routes
      • 4.Switching Part 3 Configuring VTP and VLANs
      • 5.Switching Part 4 Modifying SpanningTree
      • 5.Switching Part 4 Modifying Spanning-Tree
    3.Wireshark Technologies
      1.Network Analysis Fundamentals
        1.Network Fundamentals
      • 1.Network Layers and OSI
      • 2.Protocols
      • 3.Routers Switches
      • 4.Other Network Hardware
        2.Protocol & Network Analysis Concepts
      • 1.Protocol Analysis
      • 2.TCP IP
      • 3.Ethernet
        3.Getting, Installing, & Configuring Wireshark
      • 1.Installing Wireshark
      • 2.Configuring your PC
      • 3.Configuring Wireshark
      2.Capturing Network Traffic
        1.Wireshark Interface
      • 1.Navigating the GUI
      • 2.Window Panes
      • 3.Profiles
      • 4.Preferences
        2.Configuring a Capture
      • 1.Selecting an Interface
      • 2.Precapture rules
      • 3.Colorizing
        3.Starting a Capture
      • 1.Capturing Packets
      • 2.Timestamps and time values
      • 3.Navigation
      • 4.Sample Captures
        4.Filters
      • 1.Setting Filters
      • 2.Capture Filters
      • 3.Display Filters
      • 4.Advanced Filters
        5.Statstics
      • 1.Troubleshooting with Statistics
      • 2.Flow Graphs
      • 3.I O Graphs
        6.Command Line
      • 1.CommandLine Tools
      • 2.Tshark
      3.Analyzing Traffic (Troubleshooting)
        1.Basic Analysis
      • 1.UDP TCP Streams
      • 2.Using the Expert
      • 3.Expert Advanced Features
        2.Analyzing TCP
          3.Analyzing ARP
        • 1.Capturing IP Resolution
        • 2.Broadcast Storm
          4.Analyzing DHCP
        • 1.Reviewing DORA
        • 2.Rogue DHCP Server
          5.Analyzing DNS
        • 1.Capturing DNS
        • 2.DNS Resolution Analysis
          6.Analyzing HTTP
        • 1.Capturing HTTP
        • 2.Poorly Performing Website
          7.Analyzing VOIP
        • 1.Capturing VOIP
        • 2.Analyzing Poor Voice Quality
          8.Analyzing FTP
        • 1.Capturing FTP
        • 2.Analyzing Data Transfer
          9.Analyzing Wireless
        • 1.Capturing Wireless
        • 2.Analyzing Incorrect SSID
          IP
        • 1.Capturing Client Server Response
        • 2.TCP Sequencing and Handshake
        4.Saving & Working with Files
          1.Annotating Captures
        • 1.Annotating Files
          2.Saving Captures
        • 1.Saving Captures
        • 2.Multiple Files
        • 3.Different Formats
          3.Merging Captures
        • 1.Importing Data
        • 2.Exporting Data
        • 3.Merging Data
      INE-wireshark-technologies-course-slides
    • INE-Wireshark-Technologies-1.1.1.pdf
    • INE-Wireshark-Technologies-1.1.2.pdf
    • INE-Wireshark-Technologies-1.1.3.pdf
    • INE-Wireshark-Technologies-1.1.4.pdf
    • INE-Wireshark-Technologies-1.2.1.pdf
    • INE-Wireshark-Technologies-1.2.2.pdf
    • INE-Wireshark-Technologies-1.2.3.pdf
    • INE-Wireshark-Technologies-1.3.1.pdf
    • INE-Wireshark-Technologies-1.3.2.pdf
    • INE-Wireshark-Technologies-1.3.3.pdf
    • INE-Wireshark-Technologies-2.1.1.pdf
    • INE-Wireshark-Technologies-2.1.2.pdf
    • INE-Wireshark-Technologies-2.1.3.pdf
    • INE-Wireshark-Technologies-2.1.4.pdf
    • INE-Wireshark-Technologies-2.2.1.pdf
    • INE-Wireshark-Technologies-2.2.2.pdf
    • INE-Wireshark-Technologies-2.2.3.pdf
    • INE-Wireshark-Technologies-2.3.1.pdf
    • INE-Wireshark-Technologies-2.3.2.pdf
    • INE-Wireshark-Technologies-2.3.3.pdf
    • INE-Wireshark-Technologies-2.3.4.pdf
    • INE-Wireshark-Technologies-2.4.1.pdf
    • INE-Wireshark-Technologies-2.4.2.pdf
    • INE-Wireshark-Technologies-2.4.3.pdf
    • INE-Wireshark-Technologies-2.4.4.pdf
    • INE-Wireshark-Technologies-2.5.1.pdf
    • INE-Wireshark-Technologies-2.5.2.pdf
    • INE-Wireshark-Technologies-2.5.3.pdf
    • INE-Wireshark-Technologies-2.6.1.pdf
    • INE-Wireshark-Technologies-2.6.2.pdf
    • INE-Wireshark-Technologies-3.1.1.pdf
    • INE-Wireshark-Technologies-3.1.2.pdf
    • INE-Wireshark-Technologies-3.1.3.pdf
    • INE-Wireshark-Technologies-3.2.1.pdf
    • INE-Wireshark-Technologies-3.2.2.pdf
    • INE-Wireshark-Technologies-3.3.1.pdf
    • INE-Wireshark-Technologies-3.3.2.pdf
    • INE-Wireshark-Technologies-3.4.1.pdf
    • INE-Wireshark-Technologies-3.4.2.pdf
    • INE-Wireshark-Technologies-3.5.1.pdf
    • INE-Wireshark-Technologies-3.5.2.pdf
    • INE-Wireshark-Technologies-3.6.1.pdf
    • INE-Wireshark-Technologies-3.6.2.pdf
    • INE-Wireshark-Technologies-3.7.1.pdf
    • INE-Wireshark-Technologies-3.7.2.pdf
    • INE-Wireshark-Technologies-3.8.1.pdf
    • INE-Wireshark-Technologies-3.8.2.pdf
    • INE-Wireshark-Technologies-3.9.1.pdf
    • INE-Wireshark-Technologies-3.9.2.pdf
    • INE-Wireshark-Technologies-4.1.1.pdf
    • INE-Wireshark-Technologies-4.2.1.pdf
    • INE-Wireshark-Technologies-4.2.2.pdf
    • INE-Wireshark-Technologies-4.2.3.pdf
    • INE-Wireshark-Technologies-4.3.1.pdf
    • INE-Wireshark-Technologies-4.3.2.pdf
    • INE-Wireshark-Technologies-4.3.3.pdf

8.Final Preparations
    1.CCNA 200-301 Exam Review
  • CCNA-Bootcamp Lab Tasks.pdf
  • CCNA-Bootcamp Part-1.pdf
  • CCNA-Bootcamp Part-2.pdf
      1.Networking Basics
        1.The Internet Protocol
      • 1.An Overview Of IPv4 TCP and UDP
      • 2.An Overview Of IPv4 TCP and UDP Part 2
        2.Using Cisco IOS
      • 1.Securing IOS Remote Access
        3.Switching
      • 1.Basic Switch Configuration
      • 2.Using VLANs For Network Segmentation
      • 3.Extending VLANs With VLAN Trunks
      • 4.Dynamic Trunking Protocol
          Lab1.IOS CLI Basics, Switching and IPv4 Subnetting
        • index.html
        4.Topology Mapping
      • 1.Mapping The Topology With CDP LLDP
      2.Layer-2 Loop Prevention
        1.RSTP
      • 1.The Goals Of Loop Prevention
      • 2.Reviewing RSTP Functionality
      • 3.Essential RSTP Cisco IOS Commands
      • 4.Root Port Election
      • 5.Designated Nondesignated Port Election
      • 6.RSTP Timers
      • 7.Portfast Edge Ports
        2.EtherChannel
      • 1.Port Bundling With EtherChannel
      3.Cisco IOS DHCP Services
        1.DHCP Services
      • 1.ineccna200301examreview017hd
      4.Switching Security Features
        1.Port Security
      • 1.Securing Switchports With Port Security
      • 2.Monitoring Port Security
        2.DHCP Protection
      • 1.Securing Network Access With DHCP Snooping
      • 2.Configuring DHCP Snooping In Cisco IOS
        3.ARP Protection
      • 1.Denying ARP Attacks With Dynamic ARP Inspection
      • 2.Configuring Dynamic ARP Inspection In Cisco IOS
      5.IP Routing
        1.Routing Essentials
      • 1.Routing IP Packets
      • 2.InterVLAN Routing
      • 3.Static Routing
          Lab1.Etherchannel, Spanning-Tree, IOS DHCP Server & Static Routing
        • index.html
        2.IPv6 Essentials
      • 1.Introduction To IPv6 Part 1
      • 2.Introduction To IPv6 Part 2
      • 3.Implementing IPv6
        3.OSPF
      • 1.Open Shortest Path First
      • 2.OSPF DR BDR Elections
      • 3.Implementing OSPF In Cisco IOS
      • 4.Influencing OSPF Path Selection
        4.EIGRP
      • 1.An EIGRP Refresher
      6.Access Control Lists
        1.Access Control Lists
      • 1.Classification Using Access Control Lists
      • 2.Standard ACLs
      • 3.Extended ACLs
          Lab1.IPv6 Addressing, OSPFv2 & Access Control Lists
        • index.html
      7.First Hop Redundancy Protocols
        1.The Hot Standby Router Protocol
      • 1.Protecting The First Hop With HSRP
      8.IP Services With NAT
        1.Network Address Translation
      • 1.Introducing Network Address Translation
      • 2.Static NAT
      • 3.Dynamic NAT
      • 4.Port Address Translation
          Lab1.HSRP & Network Address Translation
        • index.html
      9.Wireless LANs
        1.Wi-Fi Principles
      • 1.Working With WiFi
      • 2.WiFi Components
      • 3.WiFi Network Types Terminology
      • 4.WiFi Bands and Channels
        2.WLAN Architectures & Controllers
      • 1.Autonomous WLAN Architectures
      • 2.Split MAC WLAN Architectures
      • 3.Introduction To CAPWAP
      • 4.Cisco WLAN Controllers
      • 5.Infrastructure Connections Of WLAN Components
        3.Wi-Fi Security
      • 1.WiFi Security Authentication
      • 2.Understanding WEP WPA
      • 3.Configuring WPA2 With PSK WLAN Controllers
      10.Quality Of Service
        1.QoS
      • 1.Classification Marking
      • 2.IP Precedence DSCP
        2.Congestion Avoidance
      • 1.Congestion Avoidance With Policing Shaping
      • 2.Congestion Avoidance With PreEmptive Queue Drops
        3.Congestion Management
      • 1.Congestion Management Control With Queuing Scheduling
        4.WLAN QoS
      • 1.WiFi QoS
      11.Network Programmability & Automation
        1.Software Defined Networking
      • 1.Introduction To Network Management Automation
      • 2.Approaches For SDN Controllers
      • 3.ControllerBased SDN Architectures
      • 4.SDNs Relationship To Management Control Data Planes
      • 5.Introducing Northbound Southbound APIs
        2.Network Programmability
      • 1.Characteristics Of RESTbased APIs
      • 2.Encoding Data With JSON
      • 3.Overview Of Network Automation Tools
      12.Virtual Private Networks
        1.VPNs
      • 1.Introduction To VPNs
      • 2.MPLS Terminology and Concepts
      13.Final Lab
        1.CCNA Bootcamp - Final Lab
          Lab1.CCNA Bootcamp - Final Lab
        • index.html
    2.CCNA Exam Assessment Network Fundamentals
  • CCNA Exam Assessment Network Fundamentals Course Trailer
      1.Welcome
        Course Introduction
      • Course Introduction
      2.Exam Assessment Sections
        IPv4 & IPv6
      • 1.IPv4 & IPv6
      • 2.IPv4 & IPv6
          Lab1.IPv4 Addressing & Cisco IOS CLI Essentials
        • index.html
          Lab2.Pv6 Addressing & Configuration
        • index.html
        LAN Switching
      • LAN Switching
          Lab Essential Switching
        • index.html
        Networking
      • 1.Networking
      • 2.Networking
      • 3.Networking
        TCP & UDP
      • TCP & UDP
        Virtualization
      • Virtualization
        Wireless
      • Wireless
      3.Goodbye
        Course Conclusion
      • Course Conclusion
139,000 تومان
بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
خرید دانلودی فوری

در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

ایمیل شما:
تولید کننده:
شناسه: 12025
حجم: 14980 مگابایت
مدت زمان: 5756 دقیقه
تاریخ انتشار: 28 اردیبهشت 1402
طراحی سایت و خدمات سئو

139,000 تومان
افزودن به سبد خرید