Sample Video and Course Outline
This course originally was our CCNA course, but it has now been rebranded as our Cisco Networking for Beginners 102 Training course, a continuation from our first Cisco Networking for Beginners 101 course where we taught you the very basics of what is networking and how to configure a Cisco Router starting out. In this revamped series, it is based on the blueprint for one of the CCNA exam tracks (640-802 CCNA, 640-822 ICND1, and 640-816 ICND2) where we discuss network concepts, protocols, and more Cisco configuration.
This video series will provide presentations based on our classroom training and practical videos for learning the topics covered in this certification track. We will teach you the concepts, configuration, monitoring, and troubleshooting related to Cisco networks. Many of the topics are presented in a step-by-step process, and include an example. You will also learn about design, best practices, and topics relevant for real-world networks shown in our practical video labs, showing you how to configure and monitor Cisco routers and switches.
Sample Video
Course Outline
Interconnecting Cisco Network Devices Part 1 (ICND1) for CCENT/CCNA:
- Building Simple Networks
- Exploring the Functions of Networking
- What is a Network?
- Components on a Network
- Network User Applications (Batch, Interactive, Real-Time)
- Physical and Logical Topologies (Bus, Star, Ring)
- Securing the Network
- Need for Network Security
- Open and Closed Networks
- Adversaries & Hacker Motivations
- Classes of Attacks
- Physical Security
- Environmental Threats
- Electrical Threats
- Maintenance Threats
- Reconnaissance and Access/Password Attacks
- Understanding Host-to-Host Communication Models
- OSI Reference Model
- Data Encapsulation and De-encapsulation
- Protocol Data Units (PDU)
- TCP/IP Model
- Network, Routing and Transport Protocols
- Understanding the TCP/IP’s Internet Layer
- IP Addressing
- IP Header
- IP Address Classes
- Network and Broadcast Addresses
- Private IP Addresses & Address Exhaustion
- CIDR Addressing
- DHCP
- DNS
- Determine IP Address of a Host
- Source and Destination Terms
- Understanding the TCP/IPs Transport & Application Layers
- IP and Transport
- TCP
- TCP Header
- 3-Way Handshake
- Segmentation
- Windowing (Fixed, Sliding Window), Window Size, Flow Control
- Error Recovery
- Sequence and Acknowledgements
- Global Synchronization
- UDP, UDP Header
- Port Numbers with TCP and UDP
- Packet Delivery Process
- Layer 1 Devices and Functions
- Layer 1 Devices, Functions, and Addressing (MAC Address)
- Layer 3 Devices, Functions, and Addressing (IP Addressing)
- Address Resolution Protocol (ARP)
- Host-to-Host Packet Delivery Example
- Default Gateway
- Ping and Traceroute
- Understanding Ethernet
- Ethernet and LANs
- Components on the LAN
- Ethernet 802.3
- Data Link Sub-Layers: MAC and LLC
- CSMA/CD, Collision Detection
- Ethernet Frame
- Ethernet Addressing
- Connecting into an Ethernet LAN
- Ethernet Network Speed
- Unshielded Twisted Pair (UTP) Cables
- UTP Cable Categories: CAT3, CAT5, CAT6, etc
- UTP Straight-Through & Crossover Cables
- RJ-45 Ports and Connectors
- GBIC and Fiber Cables (Short, Long range)
- Exploring the Functions of Networking
- Ethernet LANs
- Challenges of Shared LANs
- Ethernet LAN Segments
- Ethernet Specifications (e.g. 100BASE-TX)
- Collisions and Collision Domains
- Cisco IOS Software
- Cisco IOS using CLI (Command Line Interface)
- Basic Startup Process
- Basic Configuration Wizard
- Console and Remote Terminal
- Cisco EXEC Access Levels (User EXEC, Privilege EXEC)
- Keyboard Help: ?, Tab
- Enhanced Editing Commands
- Memory on Cisco Routers (Flash, DRAM, NVRAM, ROM)
- Starting a Cisco Switch
- Switch LED and Port LED Indicators
- Logging into a Cisco Switch
- Cisco Switch Configuration
- Saving Configuration
- Verify Basic Switch Operations
- MAC Address Table Management
- Cisco Switch Security
- Physical and Environmental Threats
- Password Security (Enable, User Accounts)
- Telnet vs. SSH
- Port Security Concepts and Configuration
- Monitoring Port Security
- Maximizing the Benefits of LAN Switching
- Microsegmentation
- Full Duplex and Half Duplex
- Duplex Configuration
- Media Rates in Enterprise Networks
- Hierarchical Design: Core, Distribution, Access
- Spanning Tree Protocol (STP)
- Troubleshooting Switch Issues
- Layered Approach for Troubleshooting
- Identifying and Resolving Media Issues
- Monitoring Commands
- Identifying and Resolving Configuration Issues
- Challenges of Shared LANs
- Wireless LANs (WLANs)
- Wireless Networking
- Business Case for Wireless
- Wireless LAN (WLAN)
- CSMA/CA Collision Avoidance
- Radio Frequency (RF) Transmission
- IEEE and Wireless
- Radio Waves (VHF, UHF, SHF)
- Unlicensed Bands (ISM, UNII)
- EIRP
- 802.11 Standards (802.11a/b/g/n)
- Wireless Security
- Security Threats
- WEP
- WPA, 802.11i/WPA2
- TKIP, AES
- 802.1x
- Service Set Identifier (SSID)
- Wireless Client Association
- Implementing a Wireless LAN
- Ad-Hoc
- Infrastructure Mode: BSS, ESS
- BSA and ESA Wireless Topology
- Wireless Data Rates
- Wireless Clients
- Wireless Troubleshooting
- Wireless Networking
- LAN Concepts and Configuration
- Router Functions
- Routers and Main Functions of Routers
- Path Determination
- Routing Table
- Static Routing
- Dynamic Routing
- Routing Metrics
- Distance Vector and Link State Routing Protocol
- Binary Numbering
- Decimal and Binary Systems
- Significant Bits (LSB, MSB)
- Converting Decimal to Binary
- Converting Binary to Decimal
- Network Addressing & Subnetting
- Sub-Networks
- Flat Networks
- Two-Level and Three-Level Addressing
- Creating Subnets (Subnetting)
- Subnet Masks
- Subnet Address, Broadcast Address
- Starting a Cisco Router
- Startup of Cisco Router
- Setup Wizard
- Auto Secure
- User EXEC, Privilege EXEC modes
- Help Services: ?, Tab
- Basic Cisco IOS Commands
- Viewing Configuration Files
- Configuring a Cisco Router
- Configuration Mode
- Saving Configuration
- Configuring Hostname and Console Settings
- Initializing Interfaces (no shutdown)
- Configuring IP Addresses on Interfaces
- Interface Status
- Cisco Router Security
- Physical and Environmental Threats
- Password Security (Enable, Console, VTY)
- Enable Password Hack
- Configuring Security Banner
- Telnet and SSH Configuration
- Using the Cisco SDM
- Overviews
- Smart Wizards
- Cisco SDM Dashboard
- Cisco SDM Software
- HTTP and HTTPS Configuration
- Username and Password using Privilege 15 Configuration
- VTY Configuration
- Starting Cisco SDM
- Cisco Router acting as a DHCP Server
- Understanding DHCP
- Enabling DHCP on Cisco SDM
- DHCP Tips
- Monitoring DHCP
- Accessing Remote Devices from a Cisco Router
- Telnet and SSH from a Cisco Router
- Suspending and Resuming a Telnet Session
- Connectivity Tests (Ping, Traceroute)
- Router Functions
- WAN Connections and IP Routing
- Understanding WAN Technologies
- What is a WAN?
- WAN vs. LAN
- WAN Cabling
- DCE and DTE
- Dedicated WAN: Leased Line
- Switched WAN: Circuit Switched, Packet Switched, Cell Switched
- Enabling the Internet Connection
- Packet Switched Communication
- DSL
- Cable
- History of the Internet
- NAT and PAT
- Static Routing
- Routing Overview
- Static Route Configuration
- Default Route Configuration
- Routing Table
- Configuring Serial Encapsulations
- Circuit Switching
- PSTN, POTS
- WAN Bandwidth in the US and Europe
- WAN Interface Configuration
- Bandwidth Command
- Point-to-Point Communication: HDLC, PPP
- PPP: LCP, NCP, Authentication
- HDLC Configuration
- PPP Configuration
- Monitoring PPP
- Frame Relay, VC, DLCI
- ATM and Cell Switching
- Configuring RIP
- IP Routing
- Dynamic Routing
- IGP and EGP
- Routing Protocol Classifications: Distance Vector, Link State, Hybrid
- Administrative Distance
- Classful Routing and Classless Routing
- RIP
- RIP Configuration
- Monitoring RIP
- Troubleshooting RIP
- Understanding WAN Technologies
- Network Management
- Discovering Neighbors on the Network
- Cisco Discovery Protocol (CDP)
- Information obtained using CDP
- Configuring CDP
- Disabling CDP
- Monitoring and Maintaining CDP
- Cisco Router Startup and Configuration Files
- Cisco Router Power-on Boot Sequence
- Internal Router Components (CPU, Memory, Interfaces)
- ROM Functions
- Cisco IOS
- Configuration Register
- Managing Files and IOS File Systems
- Cisco IOS File Systems (Network, Flash, RW Data)
- Managing files using Cisco IFS
- IOS file names
- IOS Software Backup
- IOS Software Upload/Upgrade
- Managing Configuration Files
- Merging Configuration Files
- Show and Debug Commands
- Discovering Neighbors on the Network
- Practical Videos
- TCP IP Properties and Network Tools
- CCENT/CCNA Network Design and Diagram
- Operating and Navigating Cisco IOS
- Basic Configuration on Cisco IOS I
- Basic Configuration on Cisco IOS II
- Starting up a Cisco Catalyst Switch
- Basic Configuration and Navigating on a Cisco Switch
- Configuring Port Security (using Sticky MAC addresses)
- Port Security Violations
- Static Port Security Configuration
- Basic Network Configuration
- Managing Telnet Sessions
- Console and VTY Password Configuration
- Sending Session Messages on Cisco IOS
- Configuring DHCP Server on Cisco IOS
- Enabling DHCP on a Cisco Ethernet Interface
- Enabling HTTP Services
- User Accounts with Privilege Level Rights
- Enabling SSHv2 on Cisco IOS
- Using the Configuration Wizard (Setup)
- Using the Auto Secure Wizard
- HDLC and PPP Configuration
- Configuring Static Routes
- Configuring Static Default Routes
- Configuring RIP Routing
- Administrative Distance Configuration Example
- Configuring a Basic Static NAT
- Cisco Discovery Protocol (CDP)
- Managing File Systems on Cisco IOS
- Viewing Processes on Cisco IOS
Interconnecting Cisco Network Devices Part 2 (ICND2) for CCNA:
- Review of Cisco IOS for Routers and Switches
- Configuration and Router Modes
- Other Configuration Modes
- Major Commands and Subcommands
- Help Facilities
- Command Review
- Switched Network Design
- Implementing VLANs and Trunks
- VLANs and Trunks
- Without VLANs (Flat Network)
- VLANs
- VLANs and IP Addressing
- LAN and Data Center traffic
- Traffic Types
- Voice and Data VLANs
- VLAN Membership Modes
- 802.1Q Trunking
- 802.1Q Frame
- Native VLAN
- VLAN Trunking Protocol (VTP)
- vlan.dat File
- VTP Dangers
- VTP Pruning
- VTP Configuration
- Verifying VTP Configuration
- 802.1Q Configuration
- Verifying 802.1Q Configuration
- Default VLANs and User-Defined VLANs
- VLAN Configuration
- Verifying VLAN Configuration
- VLAN Port Assignment
- Adds, Moves and Changes for VLANs Considerations
- Spanning Tree Protocol (STP)
- Redundant Switched Topology
- 2-Tier/3-Tier Switch Topology (Core, Distribution, Access)
- Oversubscription Ratios
- EtherChannel
- Problems with Redundant Topologies
- Switch Behavior with Broadcast Frames
- Broadcast Storms
- Multiple Frame Transmissions
- MAC Database Instabilities
- Resolving Issues with STP
- Bridge Protocol Data Unit (BPDU)
- STP Port States
- Blocking State
- Listening State
- Learning State
- Forwarding State
- Portfast
- Portfast Configuration
- STP Operation
- Selecting the Root Bridge
- Root Ports
- Designated Ports
- Path Cost
- Step-by-Step STP Example
- STP Recalculation
- Common Spanning Tree (CST)
- Per-VLAN Spanning Tree (PVST+)
- PVST+ Operation
- Rapid Spanning Tree (RSTP)
- RSTP Port Roles
- RSTP Example
- Per-VLAN RSTP Plus (PVRST+, RSTP+)
- Configuring PVRST+ (RSTP+)
- Verifying PVRST+ (RSTP+)
- Static Root Bridge Configuration
- Multiple Spanning Tree Protocol (MSTP)
- Routing between VLANs
- Understanding Inter-VLAN routing
- 802.1Q on a Cisco Router interface
- Configuring Inter-VLAN Routing
- Tagged VLAN
- Native VLAN (Untagged VLAN)
- Securing the Expanded Network
- Overview of Switch Security Concerns
- Security Policy
- Securing Switch Devices
- Securing Switch Protocols
- Mitigating Attacks through a Switch
- Port Security
- 802.1x Port-Based Authentication
- Troubleshooting Switched Networks
- Troubleshooting Switches
- Physical Layer/Port Connectivity Issues
- Hardware Issues
- Configuration Issues
- VLAN and Trunking Issues
- Mismatches
- Inter-VLAN connectivity
- VTP Issues
- VTP communication
- Step-by-Step Example of VTP Danger
- Spanning Tree issues
- Broadcast Storm
- Root Ports, Root Bridge
- Verifying the Configuration of RSTP+
- Implementing VLANs and Trunks
- Routed Network Design
- Review of Dynamic Routing
- Types of Routing
- Routed vs. Routing
- Routing Protocols
- Routing Protocol Types (IGP, EGP)
- IGP Routing Protocol Algorithms
- Routing Protocol Metrics
- Administrative Distance (AD)
- Routing Protocol ADs
- Example of Administrative Distance
- Distance Vector Routing Protocols
- Distance Vector Routing
- Route Discovery
- Maintaining Routes
- Routing Loops
- Troubleshooting Routing Loops and TTL (Time-to-Live)
- Route Poisoning
- Poison Reverse
- Hold-Down Timers
- Triggered Updates
- Hold-Downs with Triggered Updates
- Link State and Hybrid Protocols
- Link State Protocols
- Link and Interfaces with Link State Protocols
- Benefits and Advantages
- Link-State Network Hierarchy (AS, Areas)
- Link State Route Types
- Link State Routing Protocol Algorithms & Example
- Link State Protocol Limitations
- Hybrid Routing Protocols
- Implementing Variable-Length Subnet Masks (VLSM)
- VLSM
- Reviewing Subnets and Subnetting
- Classful Prefixes
- VLSM Benefits
- Calculating VLSM Networks
- Example of Calculating VLSM networks
- VLSM Example
- Route Summarization with VLSM
- Summarization with VLSM
- Example of Summarization with VLSM
- Calculating the Summary Route
- Requirements for Summarization
- How route summarization is managed
- Classful Summarization in Discontiguous Networks
- Review of Dynamic Routing
- Simple OSPF Configuration
- Introducing OSPF
- Introducing OSPF
- OSPF Topologies
- OSPF Area Types
- Backbone
- Non-Backbone Area
- OSPF Router Types
- Backbone Router
- Non-Backbone Routers (Internal/Standard, Stub)
- Area Border Router (ABR)
- AS Border Router (ASBR)
- Establishing OSPF Neighbor Adjacencies
- OSPF Hello Packet
- SPF Algorithm
- OSPF Cost Calculation
- Configuring and Verifying OSPF
- Configuring OSPF
- Loopback Interfaces
- Verifying OSPF Configuration
- show ip route
- show ip protocols
- show ip ospf
- show ip ospf interface
- show ip ospf neighbor
- Routing Table Fields and OSPF
- Troubleshooting OSPF
- Load Balancing with OSPF
- Configuring Load Balancing with OSPF
- OSPF Authentication
- Configuring Plaintext Authentication
- Configuration Example for OSPF Authentication
- Verifying Plaintext Authentication
- Troubleshooting
- Troubleshoot OSPF Neighbor Adjacencies
- Troubleshoot OSPF Routing Table issues
- Troubleshoot OSPF Authentication issues
- Introducing OSPF
- Simple EIGRP Configuration
- Implementing EIGRP
- Introducing EIGRP
- Routing Tables for EIGRP
- Successor and Feasible Successor Routes
- Configuring and Verifying EIGRP
- Configuring EIGRP
- Configuration Example
- Summarization
- Verifying EIGRP
- show ip route
- show ip protocols
- show ip eigrp neighbors
- show ip eigrp topology
- show ip eigrp traffic
- debug ip eigrp
- Load Balancing with EIGRP
- Loading with EIGRP
- EIGRP Metrics
- Load Balancing across Equal Cost Paths
- Load Balancing across Unequal Cost Paths
- Concepts
- Configuration & Example
- Route Authentication
- EIGRP Authentication
- Creating a Key Chain
- Configuring MD5 Authentication
- Configuration Examples
- Verifying MD5 Authentication
- Troubleshooting EIGRP
- Troubleshooting EIGRP neighbor relationships
- Troubleshooting EIGRP routing table issues
- Troubleshooting EIGRP authentication issues
- Implementing EIGRP
- Managing Traffic with Access Control Lists (ACLs)
- Access Control List (ACL)
- ACL Operations
- Understanding ACLs
- Outbound ACLs
- Inbound ACLs
- IP ACLs
- ACL Evaluation
- Types of ACLs (Standard, Extended, Numbered, Named)
- ACL Identification
- Sequence Numbers
- General Principles for Creating ACLs
- Dynamic ACLs
- Concepts and Benefits
- Configuration
- Reflexive ACLs
- Concepts and Benefits
- Configuration
- Time-Based ACLs
- Concepts and Benefits
- Configuration
- ACL Wildcard Masking
- Numbered Standard ACLs
- Configuring Numbered Standard ACLs & Examples
- Removing ACLs
- Access Class for VTY Sessions (Telnet, SSH)
- Numbered Extended ACLs
- Configuring Numbered Extended ACLs & Examples
- Extended ACL using Established
- Configuring Named Standard ACLs & Examples
- Configuring Named Extended ACLs & Examples
- Adding Comments to Named/Numbered ACLs
- Troubleshooting ACLs
- Verifying ACLs applied to an interface
- Commands for monitoring ACLs
- ACL Troubleshooting and Problem Solving Scenarios
- Access Control List (ACL)
- Managing Address Space with NAT and IPv6
- Network Address Translation (NAT)
- Scaling the network with NAT and PAT
- Introducing NAT and PAT
- NAT Terms
- NAT Forms (Static, Dynamic, PAT)
- NAT Overload (PAT)
- Static NAT Address Mapping
- Router Processing Order
- Configuring a Static NAT
- Verifying NAT Translations
- Configuring Dynamic NAT
- Configuring NAT Overload
- NAT Process
- NAT Timeouts
- Clearing NAT Translations
- Resolving Translation Table Issues
- Monitoring NAT
- Troubleshooting NAT Examples
- Transitioning to IPv6
- Reasons for using IPv6
- IPv6 and IPv4 comparisons
- IPv6 Benefits
- Internet usage
- Understanding IPv6 addresses
- IPv6 Address Shortcuts
- Broadcasts in IPv6
- IPv6 Unicast Address Space
- Global Unicast Address
- Private Unicast Address (Site-Local, Link-Local)
- IPv6 Address Format
- IPv6 over Data Link Layer
- IPv6 Address Aggregation
- Assigning IPv6 Address
- Manual Interface ID Assignment
- Configuring a Static IPv6 Address
- Name Resolution
- EUI-64 process in IPv6
- EUI-64 Interface ID Assignment
- Configuring IPv6 using EUI-64
- DHCPv6 (Stateful Addressing)
- Routing Characteristics with IPv6
- IPv6 Routing Protocols
- RIP Next Generation (RIPng)
- Configuring RIPng
- IPv4 and IPv6 Transition Mechanisms
- Dual Stack
- Dual Stack Configuration Example
- IPv6 Tunneling
- IPv6 Tunneling Issues and Requirements
- Network Address Translation (NAT)
- Extending the Network into the WAN
- Virtual Private Networks (VPN)
- Introducing VPN Solutions
- VPN Benefits
- VPN Types
- Site-to-Site VPN
- Remote Access (Client VPN)
- Easy VPN
- SSL VPN (AnyConnect)
- VPN Deployment Options
- VPN on Cisco IOS Routers
- VPN on Cisco ASA Firewalls
- Introducing IPSec
- Confidentiality (Encryption)
- Encryption Algorithms (DES, 3DES, AES)
- Authentication
- Authentication/Hash Algorithms (MD5, SHA-1)
- Peer Authentication (PSK, RSA Signature)
- IPSec Protocol Framework
- Authentication Header (AH)
- Encapsulation Security Payload (ESP)
- WAN Connection with PPP
- Understanding WAN Encapsulations
- WAN Protocols
- Metro Ethernet
- Overview of PPP
- PPP Session Establishment (LCP, NCP)
- PAP
- CHAP
- Configuring PPP Authentication using CHAP
- Verifying PPP Encapsulation
- Verifying PPP Authentication
- WAN Connection with Frame Relay
- Understanding Frame Relay
- Frame Relay WAN Devices (DTE, DCE)
- Frame Relay Components
- Local Access Rate
- Virtual Circuit (VC)
- Permanent Virtual Circuit (PVC)
- Switched Virtual Circuit (SVC)
- DLCI
- Committed Information Rate (CIR)
- Discard Eligible (DE)
- Inverse ARP
- Local Management Interface (LMI)
- FECN, BECN
- Frame Relay Topologies (Partial-Mesh, Full-Mesh, Star Topology)
- Frame Relay NBMA
- Resolving Routing Reachability Issues
- Frame Relay VC Mapping
- Signaling with Frame Relay
- Process of Inverse ARP and LMI
- Configuring Frame Relay using Inverse-ARP
- Configuring Frame Relay using Static Maps
- Configuring Frame Relay Point-to-Point interfaces
- Configuring Frame Relay Multipoint (NBMA)
- Verifying Frame Relay
- Troubleshooting Frame Relay
- Troubleshooting Frame Relay Connectivity Issues
- Troubleshooting Frame Relay Remote Router Connectivity
- Troubleshooting Frame Relay End-to-End Connectivity
- Virtual Private Networks (VPN)
- Practical Videos
- Default Switched Network Configuration
- VTP Configuration
- 802.1Q Configuration
- Creating VLANs
- Configuring Primary and Secondary Root Bridges (for each VLAN)
- VLAN Port Mapping
- Inter-VLAN Configuration on Cisco IOS Router
- Monitoring and Verifying Switch Operations
- OSPF Configuration
- Verifying OSPF Configuration
- OSPF Equal-Cost Load Balancing
- OSPF Plaintext Authentication
- EIGRP Configuration
- Verifying EIGRP Configuration
- EIGRP Unequal-Cost Load Balancing
- EIGRP MD5 Authentication
- Troubleshooting EIGRP MD5 Authentication issues
- Standard Numbered ACLs
- Extended Named ACLs
- Adding ACL rules using Sequence Numbers
- Adding ACL Logging
- Verifying ACL Configuration
- Reflexive ACLs (RACL)
- Dynamic ACLs (Lock-and-Key)
- Time-Based ACLs
- Static NAT Configuration
- NAT Overload (PAT) Configuration
- Dynamic NAT Configuration
- Verifying NAT Configuration
- Static IPv6 Address Configuration
- Static IPv6 Address using EUI-64
- RIP Next Generation (RIPng) Configuration for IPv6
- Verifying RIPng Configuration
- Frame Relay Configuration using Multipoint interface
- Frame Relay Static Map Configuration
- Frame Relay using Inverse-ARP
- Frame Relay Configuration using Point-to-Point interfaces
- Configuring EIGRP Routing with Frame Relay
- Verifying Frame Relay Configuration
- Configuring PPP using CHAP Authentication