Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages

Course Outline

CCNA: Implementing and Administering Cisco Solutions v2.0

Course Contents

Exploring the Functions of Networking
What is a Computer Network?
Common Usage of a Computer Network
Components of a Network
Characteristics of a Network
Physical vs. Logical Topologies
Interpreting a Network Diagram
Impact of User Applications on the Network

Introducing the Host-To-Host Communications Model
Host-To-Host Communications Overview
ISO OSI Reference Model
TCP/IP Protocol Suite
Peer-To-Peer Communications
Encapsulation and De-Encapsulation
TCP/IP Stack vs OSI Reference Model

Operating Cisco IOS Software
Cisco IOS Software Features and Functions
Cisco IOS Software CLO Functions
Cisco IOS Software Modes
Get Started with Cisco CLI

Introducing LANs
Local Area Networks
LAN Components
Need for Switches
Characteristics and Features of Switches
Activity: Datasheet exploration

Exploring the TCP/IP Link Layer
Ethernet LAN Connection Media
Ethernet Frame Structure
LAN Communication Types
MAC Addresses
Frame Switching
Observe How a Switch Operates
Duplex Communication

Starting a Switch
Switch Installation
Connecting to a Console Port
Switch Components
Switch LED Indicators
Basic show Commands and Information
Perform Basic Switch Configuration
Implement the Initial Switch Configuration

Introducing the TCP/IP Internet Layer, IPv4 Addressing, and Subnets
Internet Protocol
Decimal and Binary Number Systems
Binary-to-Decimal Conversion
Decimal-to-Binary Conversion
IPv4 Address Representation
IPv4 Header Fields
IPv4 Address Classes
Subnet Masks
Subnets
Implementing Subnetting: Borrowing Bits
Implementing Subnetting: Determining the Addressing Scheme
Benefits of VLSM and Implementing VLSM
Private vs. Public IPv4 Addresses
Reserved IPv4 Addresses
Verifying IPv4 Address of a Host

Explaining the TCP/IP Transport Layer and Application Layer
TCP/IP Transport Layer Functions
Reliable vs.Best-Effort Transport
TCP Characteristics
UDP Characteristics
TCP/IP Application Layer
Introducing HTTP
Domain Name System
Explaining DHCP for IPv4
Inspect TCP/IP Applications

Exploring the Functions of Routing
Role of a Router
Router Components
Router Functions
Routing Table
Path Determination
Cisco Router Models
Routing Hierarchy on Internet

Configuring a Cisco Router
Initial Router Setup
Configuring Router Interfaces
Configuring IPv4 Addresses on Router Interfaces
Checking Interface Configuration and Status
Configure an Interface on a Cisco Router
Exploring Connected Devices
Using Cisco Discovery Protocol
Configure and Verify LLDP
Configure and Verify Layer 2 Discovery Protocols
Implement an Initial Router Configuration

Exploring the Packet Delivery Process
Layer 2 Addressing
Layer 3 Addressing
Default Gateways
Address Resolution Protocol
Configure Default Gateway
Host-To-Host Packet Delivery
Explore Packet Forwarding

Troubleshooting a Simple Network
Troubleshooting Methods
Troubleshooting Common Switch Media Issues
Troubleshooting Common Switch Port Issues
Troubleshoot Switch Media and Port Issues
Troubleshoot Port Duplex Issues
Troubleshooting Common Problems Associated with IPv4 Addressing

Introducing Basic IPv6
IPv4 Address Exhaustion Workarounds
IPv6 Features
IPv6 Addresses and Address Types
Comparison of IPv4 and IPv6 Headers
Neighbor Discovery
IPv6 Address Allocation
Configure Basic IPv6 Connectivity
Verification of End-To-End IPv6 Connectivity

Configuring Static Routing
Routing Operation
Static and Dynamic Routing Comparison
When to Use Static Routing
IPv4 Static Route Configuration
Default Routes
Verifying Static and Default Route Configuration
Configure and Verify IPv4 Static Routes
IPv6 Static Route Configuration
Configure IPv6 Static Routes
Implement IPv4 Static Routing
Implement IPv6 Static Routing

Implementing VLANs and Trunks
VLAN Introduction
Creating a VLAN
Assigning a Port to a VLAN
Trunking with 802.1Q
Configuring an 802.1Q Trunk
Configure VLANs and Trunks
VLAN Design Considerations
Troubleshoot VLANS and Trunks

Routing Between VLANs
Purpose of Inter-VLAN Routing
Options for Inter-VLAN Routing
Configure Inter-VLAN Routing
Implement Multiple VLANS and Basic Routing Between the VLANs

Introducing OSPF
Dynamic Routing Protocols
Path Selection
Link-State Routing Protocol Overview
Link-State Routing Protocol Data Structures
Introducing OSPF
Establishing OSPF Neighbor Adjacencies
OSPF Neighbor States
SPF Algorithm
Building a Link-State Database
Configure and Verify Single-Area OSPF
Routing for IPv6

Improving Redundant Switched Topologies with EtherChannel
EtherChannel Overview
EtherChannel Configuration Options
Configuring and Verifying EtherChannel
Configure and Verify EtherChannel
Improve Redundant Switched Toplogies with EtherChannel

Explaining the Basics of ACL
ACL Overview
ACL Operation
ACL Wildcard Masking
Wildcard Mask Abbreviations
Types of Basic ACLs
Configuring Standard IPv4 ACLs
Configuring Extended IPv4 ACLs
Verifying and Modifying IPv4 ACLs
Applying IPv4 ACLs to Filter Network Traffic
Configure and Verify IPv4 ACLs
Implement Numbered and Named IPv4 ACLs

Enabling Internet Connectivity
Configure a Provider-Assigned IPv4 Address
Introducing Network Address Translation
NAT Terminology and Translation Mechanisms
Benefits and Drawbacks of NAT
Static NAT and Port Forwarding
Dynamic NAT
Port Address Translation
Configuring and Verifying Inside IPv4 NAT
Configure Static NAT
Configure Dynamic NAT and PAT
Implement PAT

Explaining the Evolution of Intelligent Networks
Overview of Network Programmability in Enterprise Networks
Software-Defined Networking
Common Programmability Protocols and Methods
Configuration Management Tools
Introducing Cisco DNA Center
Explore the Cisco DNA Center
Downloadable Asset: Using Cisco Meraki Dashboard API
Introducing Cisco SD-Access
Introducing Cisco SD-WAN

Introducing System Monitoring
Introducing Syslog
Syslog Message Format
SNMP Overview
Enabling Network Time Protocol
Configure and Verify NTP
Configure System Message Logging

Managing Cisco Devices
Cisco IOS Integrated File System and Devices
Stages of the Router Power-On Boot Sequence
Loading and Managing System Images Files
Loading Cisco IOS Configuration Files
Validating Cisco IOS Images Using MD5/SHA512
Managing Cisco IOS Images and Device Configuration Files
Create the Cisco IOS Image Backup
Upgrade Cisco IOS Image

Securing Administrative Access
Network Device Security Overview
Securing Access to Priviliged EXEC Mode
Securing Console Access
Securing Remote Access
Secure Console and Remote Access
Configuring the Login Banner
Limiting Remote Access with ACLs
Enable and Limit Remote Access Connectivity
External Authentication Options
Secure Device Administrative Access

Implementing Device Hardening
Securing Unused Ports
Infrastructure ACL
Disabling Unused Services
Port Security
Configure and Verify Port Security
Mitigating VLAN Attacks
Dynamic ARP Inspection
Mitigating STP Attacks
Implement Device Hardening

Building Redundant Switched Topologies (Self-Study)
Physical Redundancy in a LAN
Issues in Redundant Toplogies
Spanning Tree Operation
Types of Spanning Tree Protocols
PortFast and BPDU Guard
Rapid Spanning Tree Protocol

Exploring Layer 3 Redundancy (Self-Study)
Need for Default Gateway Redundancy
Understanding FHRP
Understanding HSRP

Introducing WAN Technologies (Self-Study)
Introduction to WAN Technologies
WAN Devices and Demarcation Point
WAN Topology Options
WAN Connectivity Options
Virtual Private Networks
Enterprise-Managed VPNs

Introducing QoS (Self-Study)
Converged Networks
QoS Defined
QoS Policy
QoS Mechanisms
QoS Models
Deploying End-to-End QoS

Explaining Wireless Fundamentals (Self-Study)
Wireless Technologies
Wireless Radio Communication
WLAN Architectures
WI-FI Channels
AP and WLC Management
Log in to and Monitor the WLC
Configure an Open Wireless Network
Define a RADIUS Server and Enable SNMP and Syslog

Introducing Architectures and Virtualization (Self-Study)
Introduction to Network Design
Enterprise Three-Tier Hierarchical Network Design
Spine – Leaf Network Design
Cisco Enterprise Architecture Model
Underlay and Overlay Network Concepts
Cloud Computing Overview
Network Device Architecture
Virtualization Fundamentals

Examining the Security Threat Landscape (Self-Study)
Security Threat Landscape Overview
Malware
Hacking Tools
DoS and DDoS
Spoofing
Reflection and Amplification Attacks
Social Engineering
Evolution of Phishing
Password Attacks
Reconnaissance Attacks
Buffer Overflow Attacks
Man-in-the-Middle Attacks
Vectors of Data Loss and Exfiltration
Other Considerations

Implementing Threat Defense Technologies (Self-Study)
Information Security Overview
Firewalls
Intrusion Preventions Systems
Protection Against Data Loss and Phishing Attacks
Defending against DoS and DDoS Attacks
Introduction to Cryptographic Technologies
IPsec Security Services
Secure Sockets Layer and Transport Layer Security
Wireless Security Protocols
Configure a WLAN to Use WPA2 PSK


Labs:

•   Discovery 1: Get Started with Cisco Command-Line Interface (CLI)
•   Discovery 2: Observe How a Switch Operates
•   Discovery 3: Perform Basic Switch Configuration
•   FAST Lab 1: Implement the Initial Switch Configuration
•   Discovery 4: Inspect TCP/IP Applications
•   Discovery 5: Configure an Interface on a Cisco Router
•   Discovery 6: Configure and Verify Layer 2 Discovery Protocols
•   FAST Lab 2: Implement an Initial Router Configuration
•   Discovery 7: Configure Default Gateway
•   Discovery 8: Explore Packet Forwarding
•   Discovery 9: Troubleshoot Switch Media and Port Issues
•   Discovery 10: Troubleshoot Port Duplex Issues
•   Discovery 11: Configure Basic IPv6 Connectivity
•   Discovery 12: Configure and Verify IPv4 Static Routes
•   Discovery 13: Configure IPv6 Static Routes
•   FAST Lab 3: Implement IPv4 Static Routing
•   FAST Lab 4: Implement IPv6 Static Routing
•   Discovery 14: Configure VLANs and Trunk
•   FAST Lab 5: Troubleshoot VLANs and Trunk
•   Discovery 15: Configure Inter-VLAN Routing
•   FAST Lab 6: Implement Multiple VLANs and Basic Routing Between the VLANs
•   Discovery 16: Configure and Verify Single-Area OSPF
•   Discovery 17: Configure and Verify EtherChannel
•   FAST Lab 7: Improve Redundant Switched Topologies with EtherChannel
•   Discovery 18: Configure and Verify IPv4 ACLs
•   FAST Lab 8: Implement Numbered and Named IPv4 ACLs
•   Discovery 19: Configure a Provider-Assigned IPv4 Address
•   Discovery 20: Configure Static NAT

We strongly recommend you attend this course before attempting the following exam.

Certification & Exam

One training course, one exam
Achieving CCNA certification is the first step in preparing for a career in IT technologies. To earn CCNA certification, you pass one exam that covers a broad range of fundamentals for IT careers, based on the latest networking technologies, software development skills, and job roles.

The Cisco Certified Network Associate v1.0 (CCNA 200-301) exam is a 120-minute exam associated with the CCNA certification. This exam tests a candidate’s knowledge and skills related to network fundamentals, network access, IP connectivity, IP services, security fundamentals, and automation and programmability. The course, Implementing and Administering Cisco Solutions (CCNA), helps candidates prepare for this exam.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. To better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

20%
1.0 Network Fundamentals
1.1 Explain the role and function of network components
•   1.1.a Routers
•   1.1.b L2 and L3 switches
•   1.1.c Next-generation firewalls and IPS
•   1.1.d Access points
•   1.1.e Controllers (Cisco DNA Center and WLC)
•   1.1.f Endpoints
•   1.1.g Servers
1.2 Describe characteristics of network topology architectures
•   1.2.a 2 tier
•   1.2.b 3 tier
•   1.2.c Spine-leaf
•   1.2.d WAN
•   1.2.e Small office/home office (SOHO)
•   1.2.f On-premises and cloud
1.3 Compare physical interface and cabling types
•   1.3.a Single-mode fiber, multimode fiber, copper
•   1.3.b Connections (Ethernet shared media and point-to-point)
•   1.3.c Concepts of PoE
1.4 Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)
1.5 Compare TCP to UDP
1.6 Configure and verify IPv4 addressing and subnetting
1.7 Describe the need for private IPv4 addressing
1.8 Configure and verify IPv6 addressing and prefix
1.9 Compare IPv6 address types
•   1.9.a Global unicast
•   1.9.b Unique local
•   1.9.c Link local
•   1.9.d Anycast
•   1.9.e Multicast
•   1.9.f Modified EUI 64
1.10 Verify IP parameters for Client OS (Windows, Mac OS, Linux)
1.11 Describe wireless principles
•   1.11.a Nonoverlapping Wi-Fi channels
•   1.11.b SSID
•   1.11.c RF
•   1.11.d Encryption
1.12 Explain virtualization fundamentals (virtual machines)
1.13 Describe switching concepts
•   1.13.a MAC learning and aging
•   1.13.b Frame switching
•   1.13.c Frame flooding
•   1.13.d MAC address table

20%
2.0 Network Access
2.1 Configure and verify VLANs (normal range) spanning multiple switches
•   2.1.a Access ports (data and voice)
•   2.1.b Default VLAN
•   2.1.c Connectivity
2.2 Configure and verify interswitch connectivity
•   2.2.a Trunk ports
•   2.2.b 802.1Q
•   2.2.c Native VLAN
2.3 Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)
2.4 Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)
2.5 Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol and
identify basic operations
•   2.5.a Root port, root bridge (primary/secondary), and other port names
•   2.5.b Port states (forwarding/blocking)
•   2.5.c PortFast benefits
2.6 Compare Cisco Wireless Architectures and AP modes
2.7 Describe physical infrastructure connections of WLAN components (AP, WLC,
access/trunk ports, and LAG)
2.8 Describe AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS,
console, and TACACS+/RADIUS)
2.9 Configure the components of a wireless LAN access for client connectivity using GUI only
such as WLAN creation, security settings, QoS profiles, and advanced WLAN settings

25%
3.0 IP Connectivity
3.1 Interpret the components of routing table
•   3.1.a Routing protocol code
•   3.1.b Prefix
•   3.1.c Network mask
•   3.1.d Next hop
•   3.1.e Administrative distance
•   3.1.f Metric
•   3.1.g Gateway of last resort
3.2 Determine how a router makes a forwarding decision by default
•   3.2.a Longest match
•   3.2.b Administrative distance
•   3.2.c Routing protocol metric
3.3 Configure and verify IPv4 and IPv6 static routing
•   3.3.a Default route
•   3.3.b Network route
•   3.3.c Host route
•   3.3.d Floating static
3.4 Configure and verify single area OSPFv2
•   3.4.a Neighbor adjacencies
•   3.4.b Point-to-point
•   3.4.c Broadcast (DR/BDR selection)
•   3.4.d Router ID
3.5 Describe the purpose of first hop redundancy protocol

10%
4.0 IP Services
4.1 Configure and verify inside source NAT using static and pools
4.2 Configure and verify NTP operating in a client and server mode
4.3 Explain the role of DHCP and DNS within the network
4.4 Explain the function of SNMP in network operations
4.5 Describe the use of syslog features including facilities and levels
4.6 Configure and verify DHCP client and relay
4.7 Explain the forwarding per-hop behavior (PHB) for QoS such as classification, marking,
queuing, congestion, policing, shaping
4.8 Configure network devices for remote access using SSH
4.9 Describe the capabilities and function of TFTP/FTP in the network

15%
5.0 Security Fundamentals
5.1 Define key security concepts (threats, vulnerabilities, exploits, and mitigation
techniques)
5.2 Describe security program elements (user awareness, training, and physical access
control)
5.3 Configure device access control using local passwords
5.4 Describe security password policies elements, such as management, complexity, and
password alternatives (multifactor authentication, certificates, and biometrics)
5.5 Describe remote access and site-to-site VPNs
5.6 Configure and verify access control lists
5.7 Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port
security)
5.8 Differentiate authentication, authorization, and accounting concepts
5.9 Describe wireless security protocols (WPA, WPA2, and WPA3)
5.10 Configure WLAN using WPA2 PSK using the GUI

10%
6.0 Automation and Programmability
6.1 Explain how automation impacts network management
6.2 Compare traditional networks with controller-based networking
6.3 Describe controller-based and software defined architectures (overlay, underlay, and
fabric)
•   6.3.a Separation of control plane and data plane
•   6.3.b North-bound and south-bound APIs
6.4 Compare traditional campus device management with Cisco DNA Center enabled device
management
6.5 Describe characteristics of REST-based APIs (CRUD, HTTP verbs, and data encoding)
6.6 Recognize the capabilities of configuration management mechanisms Puppet, Chef, and
Ansible
6.7 Interpret JSON encoded data

Price per delegate

Please call us on 0141 221 5676, or email info@indiciatraining.com to discuss course prices.

Scheduled Classes

Remote Access:

27 Apr – 01 May 2026
08 – 12 Jun 2026
13 – 17 Jul 2026
10 – 14 Aug 2026
07 – 11 Sep 2026
12 – 16 Oct 2026
09 – 13 Nov 2026
07 – 11 Dec 2026

Please complete the contact form below or call 0141 221 5676 for further course information and available dates.
Alternatively you can email us at info@indiciatraining.com