Table of Contents

CCNA Course

TTC CCNA Course March 2024 version

This CCNA (Cisco Certified Network Associate) course assumes a standard 8-hour training day, but you can adjust it according to your requirements:

CCNA Course Outline:

Day 1: Introduction to Networking Basics

Session 1 (2 hours): Introduction to Networking Concepts

Overview of computer networking

Why networks are used

Benefits of networking

Data transmission fundamentals

Connectivity basics

Session 2 (2 hours): OSI Model and TCP/IP Model

Introduction to the OSI model

Explanation of the seven OSI layers

Overview of the TCP/IP model

Comparison between OSI and TCP/IP models

Understanding the protocols and functions at each layer

Session 3 (2 hours): Ethernet LANs and Switching

Introduction to Ethernet technology

Ethernet LAN components and standards

Switching basics and how switches operate

MAC address learning and forwarding

VLANs (Virtual LANs) and their significance in network segmentation

Session 4 (2 hours): Lab exercises on Basic Switch Configuration

Hands-on lab exercises on configuring basic switch settings

Setting up VLANs

Configuring port security

Verifying and testing switch configurations

Day 2: IPv4 Addressing and Subnetting

Session 1 (2 hours): Introduction to IPv4 Addressing

Overview of IPv4 addressing

Explanation of IPv4 address structure (32-bit binary)

IPv4 address classes (Class A, B, C, D, E)

Public vs. private IP addresses

IPv4 address notation (dotted decimal notation)

Session 2 (2 hours): Subnetting Basics

Understanding the need for subnetting

Subnet mask and its role in subnetting

Subnetting a network into smaller subnets

Calculating subnet addresses and broadcast addresses

Identifying valid host ranges within subnets

Session 3 (2 hours): Subnetting Practice and Exercises

Hands-on subnetting exercises

Practice converting decimal to binary and vice versa

Subnetting Classful networks (Class A, B, C)

Determining subnet sizes and number of hosts per subnet

Verifying subnet calculations

Session 4 (2 hours): Variable Length Subnet Masking (VLSM)

Introduction to Variable Length Subnet Masking (VLSM)

Understanding the concept of hierarchical addressing

Subnetting a network using VLSM

Designing networks with different subnet sizes

Practical examples and exercises on VLSM implementation

Day 3: Routing Fundamentals

Session 1 (2 hours): Introduction to Routing Concepts

Overview of routing in computer networks

Explanation of the routing process

Routing tables and their role in packet forwarding

Types of routing (static routing vs. dynamic routing)

Routing metrics and their importance in route selection

Session 2 (2 hours): Static Routing Configuration

Introduction to static routing

Configuring static routes on routers

Understanding administrative distance and its significance

Verifying and troubleshooting static routes

Practical examples of static routing configurations

Session 3 (2 hours): Dynamic Routing Protocols (RIP, EIGRP)

Introduction to dynamic routing protocols

Overview of RIP (Routing Information Protocol) and its characteristics

Introduction to EIGRP (Enhanced Interior Gateway Routing Protocol)

Configuring and verifying RIP and EIGRP routing protocols

Comparison between RIP and EIGRP in terms of features and operation

Session 4 (2 hours): Lab exercises on Routing Configuration

Hands-on lab exercises on configuring static and dynamic routing

Implementing static routes between multiple routers

Configuring RIP and EIGRP routing protocols

Verifying routing table entries and routing protocol operation

Troubleshooting routing issues in a simulated network environment

Day 4: IPv6 and Access Control Lists (ACLs)

Session 1 (2 hours): Introduction to IPv6 Addressing

Overview of IPv6 addressing

Comparison between IPv4 and IPv6 addressing

IPv6 address types (unicast, multicast, anycast)

IPv6 address format and notation

IPv6 address allocation and assignment

Session 2 (2 hours): IPv6 Addressing Configuration

Configuring IPv6 addresses on network devices

IPv6 address assignment methods (manual, stateless autoconfiguration, DHCPv6)

Implementing IPv6 addressing on routers and hosts

Verification of IPv6 addressing configurations

Troubleshooting common IPv6 addressing issues

Session 3 (2 hours): Access Control Lists (ACLs) Basics

Introduction to Access Control Lists (ACLs)

Purpose and usage of ACLs in network security

Types of ACLs (standard ACLs, extended ACLs)

ACL syntax and configuration rules

Understanding the order of ACL processing

Session 4 (2 hours): Lab exercises on ACL Configuration

Hands-on lab exercises on configuring ACLs

Implementing standard and extended ACLs on routers and switches

Applying ACLs to control traffic flow based on source and destination IP addresses, protocols, and ports

Verifying ACL configurations and monitoring traffic using ACLs

Troubleshooting ACL-related issues in a simulated network environment

Day 5: VLANs and Inter-VLAN Routing

Session 1 (2 hours): Virtual LANs (VLANs) Concepts

Introduction to Virtual LANs (VLANs)

Purpose and benefits of VLANs in network design

VLAN membership and assignment methods (port-based, MAC-based, protocol-based)

VLAN tagging (802.1Q) and trunking

VLAN trunking protocols (VTP - VLAN Trunking Protocol)

Session 2 (2 hours): VLAN Configuration

Configuring VLANs on switches

Assigning VLANs to switch ports

Configuring VLAN trunks and trunk ports

Verifying VLAN configurations

Best practices for VLAN design and implementation

Session 3 (2 hours): Inter-VLAN Routing Configuration

Introduction to Inter-VLAN Routing

Router-on-a-Stick configuration for Inter-VLAN Routing

Configuring subinterfaces on router interfaces

Configuring routing protocols (static routing or dynamic routing) for Inter-VLAN Routing

Verifying Inter-VLAN Routing configurations

Session 4 (2 hours): Lab exercises on VLAN and Inter-VLAN Routing

Hands-on lab exercises on VLAN configuration

Implementing VLANs on switches and assigning ports to VLANs

Configuring VLAN trunking between switches

Configuring Inter-VLAN Routing using Router-on-a-Stick method

Testing connectivity between VLANs and verifying Inter-VLAN Routing functionality

Troubleshooting VLAN and Inter-VLAN Routing issues in a simulated network environment

Day 6: WAN Technologies

Session 1 (2 hours): Introduction to Wide Area Networks (WANs)

Overview of Wide Area Networks (WANs) and their significance in networking

Differences between LANs and WANs

Common WAN technologies and their use cases

WAN infrastructure components (routers, switches, modems, etc.)

Challenges and considerations in WAN design and implementation

Session 2 (2 hours): WAN Connectivity Options (HDLC, PPP)

Introduction to WAN connectivity protocols

Explanation of HDLC (High-Level Data Link Control) protocol

Overview of PPP (Point-to-Point Protocol) and its features

Comparing HDLC and PPP in terms of functionality and compatibility

Configuring HDLC and PPP encapsulation on WAN interfaces

Session 3 (2 hours): Frame Relay Configuration

Introduction to Frame Relay technology

Understanding Frame Relay concepts (DLCI, PVC, SVC)

Configuring Frame Relay on WAN interfaces

Mapping local and remote DLCIs

Verifying Frame Relay configurations and troubleshooting common issues

Session 4 (2 hours): Lab exercises on WAN Configuration

Hands-on lab exercises on configuring WAN technologies

Implementing HDLC and PPP encapsulation on WAN interfaces

Configuring Frame Relay connections between routers

Testing WAN connectivity and verifying configurations

Troubleshooting WAN configuration issues in a simulated network environment

Day 7: Network Security Fundamentals

Session 1 (2 hours): Introduction to Network Security Concepts

Overview of network security and its importance in modern networks

Common network security threats and vulnerabilities

Principles of CIA (Confidentiality, Integrity, Availability)

Defense-in-depth approach to network security

Introduction to security policies and procedures

Session 2 (2 hours): Implementing Basic Network Security Measures

Implementing access controls (password policies, user authentication)

Configuring firewalls and intrusion detection/prevention systems (IDS/IPS)

Securing network devices (routers, switches, access points)

Hardening network infrastructure (disabling unused services, applying patches)

Best practices for securing physical network components

Session 3 (2 hours): Introduction to VPNs and Encryption

Introduction to Virtual Private Networks (VPNs) and their use cases

Overview of encryption algorithms (symmetric vs. asymmetric encryption)

Key management in encryption systems

Implementing VPNs using IPsec (Internet Protocol Security)

Understanding SSL/TLS (Secure Sockets Layer/Transport Layer Security)

Session 4 (2 hours): Lab exercises on Network Security Configuration

Hands-on lab exercises on configuring basic network security measures

Implementing access controls using ACLs (Access Control Lists)

Configuring firewalls and IDS/IPS systems to protect network traffic

Securing network devices by implementing secure management protocols (SSH, SNMPv3)

Configuring VPN tunnels using IPsec for secure remote access

Testing and verifying network security configurations

Troubleshooting security-related issues in a simulated network environment

Day 8: Wireless LANs and Troubleshooting

Session 1 (2 hours): Introduction to Wireless LANs (WLANs)

Overview of Wireless LANs (WLANs) and their importance in modern networking

Understanding wireless standards (802.11a/b/g/n/ac/ax)

WLAN components: access points, wireless clients, wireless controllers

WLAN architecture and deployment options (autonomous vs. controller-based)

Common challenges and considerations in WLAN design and implementation

Session 2 (2 hours): WLAN Configuration

Configuring basic WLAN settings (SSID, security settings)

Configuring WLAN security (WPA2, WPA3, 802.1X)

Implementing WLAN access control (MAC filtering, captive portal)

Configuring WLAN roaming and mobility features

Verifying WLAN configurations and troubleshooting common WLAN issues

Session 3 (2 hours): Troubleshooting Methodologies

Introduction to troubleshooting methodologies

Understanding the troubleshooting process (identify, isolate, resolve)

Importance of documentation and network monitoring in troubleshooting

Troubleshooting tools and utilities (ping, traceroute, Wireshark)

Best practices for systematic troubleshooting

Session 4 (2 hours): Troubleshooting Scenarios and Labs

Hands-on lab exercises on troubleshooting WLAN issues

Identifying and resolving common WLAN connectivity problems

Troubleshooting issues related to WLAN security and authentication

Analyzing wireless interference and signal strength issues

Investigating performance degradation and latency in WLANs

Documenting troubleshooting steps and outcomes for future reference

Day 9: Review and Practice

Session 1 (4 hours): Review of Key Concepts and Topics

Session 2 (4 hours): Practice Tests and Simulations

Day 10: Exam Preparation and Conclusion

Session 1 (4 hours): Final Exam Preparation

Session 2 (4 hours): Q&A Session and Course Conclusion

This is a basic course and can be modified based on the depth of coverage required, the pace of learning, and the specific needs of the learners. Additionally, practical hands-on labs and exercises should be integrated throughout the course to reinforce theoretical concepts.