Best CCNA Training In Dubai With Nlptech

Best CCNA Training In Dubai With Nlptech

CCNA Routing and Switching course overview

Learn basic and advanced networking concepts through hands-on experience and simulations in our CCNA training course. CCNA Routing and Switching will prepare you for employment and success in networking computers, machines, and other networks.

CCNA training is an excellent foundation whether you are starting your first job or want to specialize in advanced studies. The knowledge and skills needed to maintain Cisco networks are validated with CCNA training in Dubai.

CCNA R&S – Cisco Accredited Network Associate (CCNA) Routing and Switching is a specialized, entry-level network certification program that helps you maximize your core network expertise and add value to your business network.

Who can take the CCNA Routing and Switching certification course?

Learn how to work more effectively with network administrators and IT managers.

Windows and Linux network administrators

Project managers and technology vendors

CCNA Routing and Switching certified learning outcomes:

Cisco environment: hardware and network troubleshooting.

Hardware upgrades and Cisco software installation and configuration.

Effective interaction and communication with users to identify network problems and upgrade requirements.

Work well with others as part of a team.

1.0 Network Basics

1.1 Explain the role and function of network components.

1.1.a Router

1.1.b L2 and L3 switches

1.1.c Next-generation firewalls and IPS systems

1.1.d Access points

1.1.e Controllers (Cisco DNA Centre and WLC)

1.1.f Endpoints

1.1.g Servers

1.2 Description of the characteristics of network topology architectures

1.2.a 2 phases

1.2.b Phase 3

1.2.c Backbone

1.2.d WAN

1.2.e Small Offices/Home Offices (SOHO)

1.2.f On-premises and cloud computing

1.3 Comparison of physical interfaces and cable types

1.3.a Single-mode fibre, multimode fibre, copper

1.3.b Interconnections (shared media and Ethernet point-to-point)

1.3.c PoE concepts

1.4 Identification of interface and cable problems (collisions, faults, duplex, and/or speed faults).

1.5 Comparison of TCP and UDP

1.6 Configuring and verifying IPv4 addresses and subnets

1.7 Determining the need for a specific IPv4 address

1.8 Configuring and verifying IPv6 addresses and examples

1.9 Comparing IPv6 address types

1.9.a Global unicast

1.9.b Single pass-through

1.9.c Establishing a local connection

1.9.d Anycast

1.9.e Multicast

1.9.f EUI 64 Modified

1.10 Check the IP settings of the client operating system (Windows, Mac OS, Linux).

1.11 Configure wireless communication policies

1.11.a Overlapping WiFi channels

1.11.b SSID

1.11.c RF

1.11.d Encryption

1.12 Explain the basics of virtualization (virtual machines).

1.13 Explain switching concepts

1.13.a MAC learning and aging

1.13.b Frame replacement

1.13.c Frame overflow

1.13.d MAC address table

2.0 Network access

2.1 Define and verify VLANs (normal range) that span multiple switches.

2.1.a Access ports (data and voice)

2.1.b Default VLAN

2.1.c Communication

2.2 Switch interface configuration and verification

2.2.a Trunk ports

2.2.b 802.1Q

2.2.c Local VLAN

2.3 Layer 2 Discovery Protocol (Cisco Discovery Protocol and LLDP) configuration and verification

2.4 EtherChannel (LACP) configuration and verification (Layer 2/Layer 3).

2.5 Describe the PVST+ protocol requirement and basic functionality.

2.5.a Root port, root bridge (primary/secondary) and other port names.

2.5.b Port modes (forward/deny).

2.5.c Port Fast benefits

2.6 Compare wireless architectures and Cisco access points.

2.7 Describe the physical infrastructure interconnections between WLAN components (APs, WLCs, access ports and trunks, and LAGs).

2.8. Describe the AP and WLC management interfaces (Telnet, SSH, HTTP, HTTPS, console and TACACS+/RADIUS).

2.9 Configure wireless LAN components for client access using GUI only, e.g. WLAN creation, security settings, QoS profiles, and additional WLAN settings.

3.0 IP connectivity

3.1 Interpret routing table components

3.1.a Routing protocol code

3.1.b Prefix

3.1.c Network mask

3.1.d Next hop

3.1.e Administrative distance

3.1.f Metric

3.1.g Last Gateway

3.2 Specify how the router makes default forwarding decisions 3.2.

3.2a Longest match

3.2.b Administrative distance

3.2c Routing protocol metric 3.3c Routing protocol metric

3.3 Configuration and verification of IPv4 and IPv6 static routing

3.3a Default route

3.3.b Network route

3.3.c Host route

3.3.d Floating static route

3.4 Single Area OSPFv2 Configuration and Verification

3.4.a Neighbor adjacencies

3.4.b Point-to-point

3.4.c Description (DR/BDR selection)

3.4.d Router ID

3.5 Describe the purpose of the first hop duplication protocol.

4.0 IP services

4.1 Configure and test internal source NAT using static and pools.

4.2 Configure and test NTP in client and server mode.

4.3 Explain the role of DHCP and DNS in the network.

4.4 Explain the role of SNMP in network operation.

4.5 Describe the use of syslog functions including features and levels.

4.6 Configure and authenticate a DHCP client and router.

4.7 Explain the behavior of QoS functions such as classification, marking, queuing, congestion, order control and shaping, forwarding (PHB).

4.8 Configure network devices for remote access using SSH.

4.9 Describe the functions and operation of TFTP/FTP on a network.

5.0 Basic Information Security

5.1 Define the key security concepts (threats, vulnerabilities, exploits and protection methods).

5.2 Describe the elements of a security programme (user awareness, training and physical access control).

5.3 Define access control to devices using local passwords.

5.4 Describe the elements of a password policy such as password management, complexity and capabilities (multi-factor authentication, certificates and biometrics).

5.5 Describe remote access and site-to-site VPNs.

5.6 Configure and test access control lists.

5.7 Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port protection).

5.8 Separate the concepts of authentication, authorization, and accounting.

5.9 Describe the wireless security protocols (WPA, WPA2, and WPA3).

5.10 Configure a WLAN with WPA2 PSK using the graphical user interface.

6.0 Automation and programming

6.1 Explain how automation affects network management.

6.2 Compare traditional networks with controller-based networks.

6.3 Describe controller-based and software-based architectures (overlay, underlay and fabric).

6.3.a Distinguish between control and data layers.

6.3.b Northbound and Southbound APIs

6.4 Compare traditional campus device management with device management provided by the Cisco DNA Center.

6.5 Describe the features of REST-based APIs (CRUD, HTTP verbs, and data encoding).

6.6 Identify the characteristics of the Puppet, Chef, and Ansible configuration management mechanisms.

6.7 Interpret JSON-encoded data.


Leave a Reply

Your email address will not be published. Required fields are marked *