CCNA Instructor-Led Training

Circular Pattern
Centered Image

About This Class

Concept Help Image

Explore your next online class schedule.

Class
Date
Action
CCNA Instructor-Led Training
Pattern

What Do You Get?

  • Real-time interaction and feedback with instructors
  • Hands-on Labs for practical application
  • Gamified TestPrep tailored to their needs

Training Essentials

  • Estimated Completion Time: 3 Weeks
  • Methodology: Online, Instructor-Led
  • Level: Beginner-friendly
Pattern

JOB Roles You Can Apply For

Pattern

Components Available

Hands-on Labs

69+ LiveLab | 69+ Video tutorials | 16:41+ Hours

Interactive lessons

66+ Interactive Lessons | 5+ Exercises | 306+ Quizzes | 542+ Flashcards | 542+ Glossary of terms

Video lessons

20+ Videos | 16:41+ Hours

Skills You'll Gain

Pattern
Pattern
Lesson Plan

    • About Cisco Certifications and CCNA
    • Course Organization, Lessons, and Appendixes

    • Perspectives on Networking
    • TCP/IP Networking Model
    • Data Encapsulation Terminology
    • Review All the Key Topics

    • An Overview of LANs
    • Building Physical Ethernet LANs with UTP
    • Building Physical Ethernet LANs with Fiber
    • Sending Data in Ethernet Networks
    • Review All the Key Topics

    • Wide-Area Networks
    • IP Routing
    • Other Network Layer Features
    • Review All the Key Topics

    • Accessing the Cisco Catalyst Switch CLI
    • Configuring Cisco IOS Software
    • Command References
    • Review All the Key Topics

    • LAN Switching Concepts
    • Verifying and Analyzing Ethernet Switching
    • Command References
    • Review All the Key Topics

    • Securing the Switch CLI
    • Enabling IPv4 for Remote Access
    • Miscellaneous Settings Useful in the Lab
    • Command References
    • Review All the Key Topics

    • Configuring Switch Interfaces
    • Analyzing Switch Interface Status and Statistics
    • Command References
    • Review All the Key Topics

    • Virtual LAN Concepts
    • VLAN and VLAN Trunking Configuration and Verification
    • Troubleshooting VLANs and VLAN Trunks
    • Command References
    • Review All the Key Topics

    • STP and RSTP Basics
    • Details Specific to STP (and Not RSTP)
    • Rapid STP Concepts
    • Review All the Key Topics

    • Understanding RSTP Through Configuration
    • Configuring Layer 2 EtherChannel
    • Command References
    • Review All the Key Topics

    • Introduction to Subnetting
    • Analyze Subnetting and Addressing Needs
    • Make Design Choices
    • Plan the Implementation
    • Review All the Key Topics

    • Classful Network Concepts
    • Practice with Classful Networks
    • Review All the Key Topics

    • Subnet Mask Conversion
    • Identifying Subnet Design Choices Using Masks
    • Review All the Key Topics

    • Defining a Subnet
    • Analyzing Existing Subnets: Binary
    • Analyzing Existing Subnets: Decimal
    • Practice Analyzing Existing Subnets
    • Review All the Key Topics

    • Installing Cisco Routers
    • Enabling IPv4 Support on Cisco Router Interfaces
    • Command References
    • Review All the Key Topics

    • IP Routing
    • Configuring IP Addresses and Connected Routes
    • Configuring Static Routes
    • IP Forwarding with the Longest Prefix Match
    • Command References
    • Review All the Key Topics

    • VLAN Routing with Router 802.1Q Trunks
    • VLAN Routing with Layer 3 Switch SVIs
    • VLAN Routing with Layer 3 Switch Routed Ports
    • Command References
    • Review All the Key Topics

    • Problem Isolation Using the ping Command
    • Problem Isolation Using the traceroute Command
    • Telnet and SSH
    • Review All the Key Topics

    • Comparing Dynamic Routing Protocol Features
    • OSPF Concepts and Operation
    • OSPF Areas and LSAs
    • Review All the Key Topics

    • Implementing Single-Area OSPFv2
    • Using OSPFv2 Interface Subcommands
    • Additional OSPFv2 Features
    • Command References
    • Review All the Key Topics

    • OSPF Network Types
    • OSPF Neighbor Relationships
    • Command References
    • Review All the Key Topics

    • Introduction to IPv6
    • IPv6 Addressing Formats and Conventions
    • Review All the Key Topics

    • Global Unicast Addressing Concepts
    • Unique Local Unicast Addresses
    • Review All the Key Topics

    • Implementing Unicast IPv6 Addresses on Routers
    • Special Addresses Used by Routers
    • Command References
    • Review All the Key Topics

    • Connected and Local IPv6 Routes
    • Static IPv6 Routes
    • The Neighbor Discovery Protocol
    • Command References
    • Review All the Key Topics

    • Comparing Wired and Wireless Networks
    • Wireless LAN Topologies
    • Other Wireless Topologies
    • RF Overview
    • Review All the Key Topics

    • Autonomous AP Architecture
    • Cloud-based AP Architecture
    • Split-MAC Architectures
    • Comparing Wireless LAN Controller Deployments
    • Review All the Key Topics

    • Anatomy of a Secure Connection
    • Wireless Client Authentication Methods
    • Wireless Privacy and Integrity Methods
    • WPA, WPA2, and WPA3
    • Lesson Review
    • Review All the Key Topics

    • Connecting a Cisco AP
    • Accessing a Cisco WLC
    • Connecting a Cisco WLC
    • Configuring a WLAN
    • Review All the Key Topics

    • IPv4 Address Types
    • Bandwidth and Clock Rate on Serial Interfaces
    • Using traceroute to Isolate the Problem to Two Routers
    • Troubleshooting Static IPv6 Routes
    • Default Routes with SLAAC on Router Interfaces

    • Analyzing Collision Domains and Broadcast Domains
    • Analyzing Campus LAN Topologies
    • Analyzing LAN Physical Standard Choices

    • Choosing the Mask(s) to Meet Requirements
    • Finding All Subnet IDs

    • Mask Design Practice Problems
    • Practice Finding All Subnet IDs

    • VLSM Concepts and Configuration
    • Finding VLSM Overlaps
    • Adding a New Subnet to an Existing VLSM Design

    • Implementing STP
    • Implementing Optional STP Features
    • Implementing RSTP
    • Command References

    • Troubleshooting STP
    • Troubleshooting Layer 2 EtherChannel
    • Analyzing the Switch Data Plane Forwarding
    • Troubleshooting VLANs and VLAN Trunks

    • Perspectives on Troubleshooting Routing Protocol Problems
    • Interfaces Enabled with a Routing Protocol
    • Neighbor Relationships
    • Command References

    • CCNA 200-301 Exam Topic Order
    • Course Lesson Order Versus CCNA 200-301 Exam Topics

    • About Cisco Certifications and CCNA
    • Course Organization, Lessons, and Appendixes

    • TCP/IP Layer 4 Protocols: TCP and UDP
    • TCP/IP Applications
    • Review All the Key Topics

    • IPv4 Access Control List Basics
    • Standard Numbered IPv4 ACLs
    • Practice Applying Standard IP ACLs
    • Command References
    • Review All the Key Topics

    • Extended Numbered IP Access Control Lists
    • Named ACLs and ACL Editing
    • Command References
    • Review All the Key Topics

    • Security Terminology
    • Common Security Threats
    • Controlling and Monitoring User Access
    • Developing a Security Program to Educate Users
    • Review All the Key Topics

    • Securing IOS Passwords
    • Firewalls and Intrusion Prevention Systems
    • Command References
    • Review All the Key Topics

    • Port Security Concepts and Configuration
    • Port Security Violation Modes
    • Command References
    • Review All the Key Topics

    • Dynamic Host Configuration Protocol
    • Identifying Host IPv4 Settings
    • Command References
    • Review All the Key Topics

    • DHCP Snooping
    • Dynamic ARP Inspection
    • Command References
    • Review All the Key Topics

    • System Message Logging (Syslog)
    • Network Time Protocol (NTP)
    • Analyzing Topology Using CDP and LLDP
    • Command References
    • Review All the Key Topics

    • Perspectives on IPv4 Address Scalability
    • Network Address Translation Concepts
    • NAT Configuration and Troubleshooting
    • Command References
    • Review All the Key Topics

    • Introduction to QoS
    • Classification and Marking
    • Queuing
    • Shaping and Policing
    • Congestion Avoidance
    • Review All the Key Topics

    • First Hop Redundancy Protocol
    • Simple Network Management Protocol
    • FTP and TFTP
    • Command References
    • Review All the Key Topics

    • Analyzing Campus LAN Topologies
    • Small Office/Home Office
    • Power over Ethernet (PoE)
    • Review All the Key Topics

    • Metro Ethernet
    • Multiprotocol Label Switching (MPLS)
    • Internet VPNs
    • Review All the Key Topics

    • Server Virtualization
    • Cloud Computing Services
    • WAN Traffic Paths to Reach Cloud Services
    • Review All the Key Topics

    • SDN and Controller-Based Networks
    • Examples of Network Programmability and SDN
    • Comparing Traditional Versus Controller-Based Networks
    • Review All the Key Topics

    • SDA Fabric, Underlay, and Overlay
    • DNA Center and SDA Operation
    • DNA Center as a Network Management Platform
    • Review All the Key Topics

    • REST-Based APIs
    • Data Serialization and JSON
    • Review All the Key Topics

    • Device Configuration Challenges and Solutions
    • Ansible, Puppet, and Chef Basics
    • Review All the Key Topics

    • Cisco Device Hardening
    • Implementing DHCP
    • Troubleshooting with IPv4 ACLs
    • Implementing HSRP
    • Gateway Load Balancing Protocol (GLBP)
    • Implementing Simple Network Management Protocol
    • Analyzing LAN Physical Standard Choices
    • Metro Ethernet
    • MPLS VPNs

    • CCNA 200-301 Exam Topic Order
    • Course Lessons, with Exam Topics Covered in Each

    • Managing Cisco IOS Images and Upgrades
    • Password Recovery
    • Managing Configuration Files
    • Command References
Hands-on Labs

  • Obtaining Hardware Information of a Network Adapter
  • Obtaining the IP Version of a Network Adapter
  • Obtaining Information about Different IP Versions
  • Obtaining Information about the Net Firewall Profile
  • Getting the TCP Settings
  • Getting Information about the Current Connection Statistics of TCP
  • Getting Information about the TCP Ports
  • Getting Information about the UDP Ports
  • Getting the UDP Settings
  • Getting Information about the Current Connection Statistics of UDP
  • Getting Information about DNS

  • Obtaining the ARP Cache
  • Obtaining the IP Route Information from the IP Routing Table

  • Demonstrating the Difference Between User and Enable (Privileged) Modes
  • Enabling Password Security for CLI Access from the Console
  • Using the show Command
  • Demonstrating the Difference Between CLI Configuration Mode and EXEC Mode
  • Configuring Submodes and Contexts

  • Listing the Status of the Interfaces in a Switch

  • Configuring Basic Passwords
  • Configuring SSH in a Router
  • Configuring IPv4 on a Switch
  • Configuring a Switch to Learn its IP Address with DHCP

  • Configuring and Displaying Speed, Duplex, and Description on a Switch
  • Removing Various Configuration Settings

  • Configuring VLAN
  • Enabling and Disabling VLANs on a Switch

  • Observing the STP Status

  • Configuring a Class A IP Address
  • Configuring a Class B IP Address
  • Configuring a Class C IP Address

  • Listing the Interfaces in a Router
  • Configuring a Router
  • Verifying IP Addresses on Cisco Routers

  • Using the show IP route Command
  • Displaying a Router’s IP ARP Table
  • Configuring Static Routing
  • Configuring Default Routing

  • Pinging a Host Using a Router
  • Pinging a Host Using a PC
  • Using the traceroute Command
  • Showing Telnet Login from R1 to R2 to View the Status of the Interface on R2

  • Adding an IPv6 Address

  • Configuring Static IPv6 Addresses on R1 and R2
  • Configuring And Verifying NetFlow and NetFlow Data Export and Top Talkers

  • Displaying IPv6 Routes
  • Rejecting the ipv6 route Command with Link-Local and No Outgoing Interface

  • Creating and Applying an ACL at the CLI Using Named Access List Configuration
  • Adding to and Displaying a Numbered ACL Configuration

  • Performing ARP Spoofing
  • Spoofing MAC Address
  • Performing a DDoS Attack Using cmd
  • Using dig for Passive Reconnaissance
  • Using nslookup for Passive Reconnaissance

  • Encrypting IOS Passwords with the service password-encryption Command
  • Encoding a Password as Type 5 (MD5)

  • Creating a New VLAN and Placing Switch Ports into that VLAN
  • Configuring Interfaces as Trunk Ports
  • Configuring Port Fast and Rapid Spanning Tree

  • Viewing the IP Address, Mask, and Default Router Settings on Windows
  • Viewing the IP Address, Mask, and Default Router Settings on Linux

  • Configuring DHCP Snooping

  • Disabling the Timestamp and Enabling a Sequence Number in Log Messages
  • Configuring Syslog and Viewing Settings on a Router
  • Seeing Severity 3 and 5 Messages at the Console and Severity 3 Only in the Buffer
  • Setting the Date, Time, Timezone, and Daylight Savings Time

  • Configuring a CIDR-Based IP Network
  • Configuring Network Address Translation

  • Showing Cisco IOS File Systems Configuration on a Router

  • Showing Small Output from a Switch Command

Frequently Asked Questions

Have questions? We’ve got answers.