1. Course Overview
2. Identifying Network Component Roles
3. Getting Started with the Cisco CLI
4. Introducing the Cisco DNA Center
5. Introducing the Cisco DNA Center
6. Identifying Different Network Types
7. Reviewing Network Topology Design Characteristics
8. Describing Physical Network Cabling
9. Describing PoE Concepts and Contexts
10. Identifying Common Interface and Cable Issues
11. Comparing TCP and UDP Protocols
12. Reviewing IPv4 Addressing
13. Configuring IPv4 Addresses on Network Devices
14. Learning Basic Subnetting Concepts
15. Performing Class C IPv4 Subnetting
16. Performing Class B IPv4 Subnetting
17. Applying IPv4 Subnetting
18. Reviewing IPv6 Addressing
19. Describing IPv6 Unicast Type Addresses
20. Describing IPv6 Anycast, Multicast, and EUI 64
21. Configuring IPv6 Addresses on Network Devices
22. Reviewing Virtualization Concepts
23. Reviewing Wireless Configuration Choices
24. Learning Switch Functionality
25. Configuring and Verifying VLANs
26. Configuring and Verifying Interswitch Connectivity
27. Describing Layer 2 Loop Prevention
28. Describing Spanning Tree Protocol
29. Spanning Tree Protocol Example
30. Configuring and Verifying Layer 2 Discovery
31. Configuring and Verifying EtherChannel
32. Reviewing Cisco Wireless Components
33. Characterizing Wireless Security
34. Configuring Cisco WLAN Management
35. Configuring and Verifying DHCP Snooping and DAI
36. Configuring and Verifying Port Security
37. Identifying Routing Components
38. Interpreting Routing Table Information
39. Reviewing Packet Forwarding
40. Determing Routing Decisions
41. Configuring Static Routing for IPv4
42. Configuring Static Routing for IPv6
43. Reviewing Dynamic Routing Protocols
44. Introducing Single Area OSPFv2
45. Configuring and Verifying Single Area OSPFv2
46. Configuring and Verifying FHRPs
47. Configuring and Verifying Standard ACLs
48. Configuring and Verifying Extended ACLs
49. Configuring and Verifying Named ACLs
50. Introducing Network Address Translation
51. Configuring and Verifying NAT
52. Configuring and Verifying NTP
53. Configuring and Verifying DHCP and DNS
54. Identifying the Function of SNMP
55. Identifying Syslog Message Features
56. Identifying Per-Hop Behavior for QoS
57. Configuring Secured Remote Access
58. Transferring Files using FTP or TFTP
59. Defining Key Security Concepts
60. Identifying Security Awareness Program Elements
61. Identifying Password Policy Elements
62. Identifying AAA Security Elements
63. Differentiating VPN Types
64. Describing Network Management Automation
65. Identifying SDN Architecture Concepts
66. Identifying Campus Device Mgmt. Methods
67. Characterizing REST-based APIs
68. Identifying Configuration Management Methods
69. Interpreting JSON Encoded Data