IIHT
Follow us:

Courses

CCNA

Cisco Routing and Switching CCNA

  • Technology and media access control method for Ethernet networks
  • Identify basic switching concepts and the operation of Cisco switches.
  • Initial switch configuration Including remote access management
  • Configure and verify VLANs
  • Configure and verify PVSTP operation
  • IPv6 addressing scheme
  • IPv4 addressing scheme using VLSM and summarization
  • Technological requirements for running iPv6 in conjunction with iPv4 such as dual stack
  • Basic routing concepts
  • Utilization of the CLI to set basic Router configuration
  • Configure and verify OSPF (single area)
  • Configure and verify EIGRP (single AS)
  • Configure and verify DHCRACL.NAT & NTP (iOS Router)
  • Identify and correct common network problems
  • Configure and verify a basic WAN serial connection
  • Configure and verify a PPP connection between Cisco routers
  • Configure and verify Frame Relay on Cisco routers
  • Implement and troubleshoot PPPoE
  • Wan -PPP, MLPPP, PPPoE, GRE, BGP, WAN access
  • Automation and Programmability - REST APIs, JSON, SDN


CCNA Security

  • Describe hairpinning , split tunneling, always-on, NAT traversal
  • Remote access VPN
  • Implement basic clientless SSL VPN using ASDM
  • Verify clientless connection
  • Implement basic AnyConnect SSL VPN using ASDM
  • Verify AnyConnect connection
  • Identify endpoint posture assessment
  • Site-to-site VPN
  • Implement an IPsec site-to-site VPN with pre-shared key authentication on Cisco routers and ASA firewalls
  • Verify an IPsec site-to-site VPN
  • Secure Routing and Switching
  • Security on Cisco routers
  • Configure multiple privilege levels
  • Configure Cisco IOS role-based CLI access
  • Implement Cisco lOS resilient configuration
  • Securing routing protocols
  • Implement routing update authentication on OSPF
  • Securing the control plane
  • Explain the function of control plane policing
  • Common Layer 2 attacks
  • Describe STP attacks
  • Describe ARP spoofing
  • Describe MAC spoofing
  • Describe Cam table (MAC address table) overflows
  • Describe CDP/LLDP reconnaissance
  • Describe VLAN hopping
  • Describe DHCP spoofing
  • Mitigation procedures
  • Implement DHCP snooping
  • Implement Dynamic ARP Inspection
  • Implement port security
  • Describe BPDU guard, root guard, loop guard
  • Verify mitigation procedures
  • VLAN security
  • Describe the security implications of a PVLAN
  • Describe the security implications of a native VLAN
  • Describe operational strengths and weaknesses of the different firewall technologies
  • Proxy firewalls
  • Application firewall
  • Personal firewall
  • Compare stateful vs. stateless firewalls
  • Operations
  • Function of the state table
  • Implement NAT on Cisco ASA 9.x
  • Static
  • Dynamic
  • PAT
  • Policy NAT
  • Verify NAT operations
  • Implement zone-based firewall
  • Zone to zone
  • Self zone
  • Firewall features on the Cisco Adaptive Security Appliance (ASA) 9.x
  • Configure ASA access management
  • Configure security access policies
  • Configure Cisco ASA interface security levels
  • Configure default Cisco Modular Policy Framework (MPF)
  • Describe modes of deployment (routed firewall, transparent firewall)
  • Describe methods of implementing high availability
  • Describe security contexts
  • Describe firewall services
  • Describe mitigation technology for email-based threats
  • SPAM filtering, anti-malware filtering, DLR blacklisting, email encryption
  • Describe mitigation technology for web-based threats
  • Local and cloud-based web proxies
  • Blacklisting, URL filtering, malware scanning, URL categorization, web application filtering, TLS/SSL decryption
  • Describe mitigation technology for endpoint threats
  • Anti-virus/anti-malware
  • Personal firewall/HIPS
  • Hardware/software encryption of local data