Course Content - Network Fundamentals
Course Content - Network Fundamentals
Duration: 6 Days
Topics
1.1 Explain the role and function of network components
Routers
L2 and L3 switches
Next-generation firewalls and IPS
Access points
Controllers (Cisco DNA Center and WLC)
Endpoints
Servers
1.4 Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)
1.5 Compare TCP to UDP
1.6 Configure and verify IPv4 addressing and subnetting
1.7 Describe the need for private IPv4 addressing
1.8 Configure and verify IPv6 addressing and prefix
1.9 Compare IPv6 address types
Global unicast
Unique local
Link local
Anycast
Multicast
Modified EUI 64
1.10 Verify IP parameters for Client OS (Windows, Mac OS, Linux)
1.11 Describe wireless principles
Nonoverlapping Wi-Fi channels
SSID
RF
Encryption
1.12 Explain virtualization fundamentals (virtual machines)
1.13 Describe switching concepts
MAC learning and aging
Frame switching
Frame flooding
MAC address table
IP Connectivity
3.1 Interpret the components of routing table
Routing protocol code
Prefix
Network mask
Next hop
Administrative distance
Metric
Gateway of last resort
3.2 Determine how a router makes a forwarding decision by default
Longest match
Administrative distance
Routing protocol metric
3.3 Configure and verify IPv4 and IPv6 static routing
Default route
Network route
Host route
Floating static
3.4 Configure and verify single area OSPFv2
Neighbor adjacencies
Point-to-point
Broadcast (DR/BDR selection)
Router ID
3.5 Describe the purpose of first hop redundancy protocol
IP Services
4.1 Configure and verify inside source NAT using static and pools
Security Fundamentals
5.1 Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)
5.2 Describe security program elements (user awareness, training, and physical access
control)
5.3 Configure device access control using local passwords
5.4 Describe security password policies elements, such as management, complexity, and
password alternatives (multifactor authentication, certificates, and biometrics)
5.5 Describe remote access and site-to-site VPNs
5.6 Configure and verify access control lists
5.7 Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port
security)
5.8 Differentiate authentication, authorization, and accounting concepts
5.9 Describe wireless security protocols (WPA, WPA2, and WPA3)
5.10 Configure WLAN using WPA2 PSK using the GUI
Cloud Networking
Cloud Computing: