Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 9
## Introduction to CCNA (200-301) with Jeremy
1. Introduction to CCNA (200-301) with Jeremy
## Introduction to CCNA (200-301) with Keith 2. Introduction to CCNA (200-301) with Keith ## Introduction to CCNA (200-301) with NetworkChuck 3. Introduction to CCNA (200-301) with NetworkChuck ## Build a Physical Cisco Lab Environment 4. Introduction to Build a Physical Cisco Lab Environment 5. Why Use a Physical Lab? 6. Understanding Common Switch Models 7. Understanding Common Router Models 8. Understanding Device Memory Requirements 9. Understanding Common Modules 10. Performing Password Recovery 11. Building a CCNA Lab Environment ## Set Up Packet Tracer for Hands-On Cisco Practice 12. Why You'll Benefit from Packet Tracer 13. Getting and Installing Packet Tracer 14. Configuring Your First PT Network 15. Getting Physical 16. Visualizing Network Traffic with Simple PDUs 17. Visualizing Network Traffic with Complex PDUs 18. Replicating a Physical Rack 19. Using Packet Tracer on your Tablet 20. Final Challenge and Review ## Describe Network Functions and Equipment 21. Introduction to Describe Network Functions and Equipment 22. Primary Switch Functions 23. Primary Wireless Access Point Functions 24. Primary Router Functions 25. Assembling the Network Pieces 26. Review of Describe Network Functions and Equipment ## Explain Network Communication Using the OSI and TCP/IP Model 27. Introduction to Explain Network Communication with the OSI Model 28. Why We Have Two Models 29. Application Layers 30. Transport Layer 31. Network Layer 32. Data Link and Physical Layer 33. Describing Network Communication Using the OSI and TCP/IP Models 34. Review of Explain Network Communication with the OSI Model ## Describe Common Network Architectures 35. Introduction to Describe Common Network Architectures 36. Two-Tier Architecture 37. Three-Tier Architecture 38. Spine-Leaf Architecture 39. WAN Architecture 40. SOHO Architecture 41. On-Premise vs. Cloud Architecture 42. Building a Network Architecture 43. Review of Describe Common Network Architectures ## Discern Copper and Fiber Optic Network Cable Characteristics 44. Introduction Connect Networks with Copper and Fiber Optic Cable 45. Copper Cable 46. Two Styles of Fiber 47. Fiber Port Types 48. Part 1: Connecting the CCNA Lab 49. Part 2: Connecting the CCNA Lab ## Connect and Navigate Cisco Internetwork Operating System (IOS) 50. Introduction to Connect and Navigate Cisco Internetwork Operating System (IOS) 51. Methods of Managing Cisco Devices 52. Configuring a Console Connection in Windows 53. Configuring a Console Connection in MacOS 54. Answering the Epic Post-Boot Question 55. Using Cisco IOS Navigation Commands 56. Modes that Made Cisco Famous 57. Interface Connections and Numbering 58. Preparing for the Initial Configuration 59. Review of Connect and Navigate Cisco Internetwork Operating System (IOS) ## Create a Base Configuration for Cisco Devices 60. Introduction to Create a Base Configuration for Cisco Devices 61. Configuring Device Identification (Hostname and Banner) 62. Configuring Foundation Security and Passwords (Console, VTY, Enable Sec) 63. Configuring IP Addresses and Enabling Interfaces 64. Initial Tuning and Configuration Management 65. Telnet and SSH Implementation 66. Ensuring Proper Base Configurations 67. Review of Create a Base Configuration for Cisco Devices ## Create a Base Configuration for Cisco Devices Hands-On Lab 68. Introduction to Your Virtual Hands-on Labs 69. Basic IOS Navigation Lab 70. Hostnames and MOTD Banners Lab 71. Configuring and Verifying Interfaces and IP Addresses Lab 72. Configure DNS and Router Interfaces 73. Cisco Router and Switch CLI Review Lab 74. Review of Hands-On Lab ## Wireshark Fundamentals: Capturing, Viewing, and Filtering Data 75. Introducing Wireshark Fundamentals 76. Performing an Initial Capture 77. The OSI Model in Wireshark 78. Learning from Idle Network Data 79. Practical Wireshark: ARP 80. Practical Wireshark: Rogue DHCP 81. Practical Wireshark: DNS 82. Practical Wireshark: Telnet 83. Reviewing Wireshark Fundamentals ## Describe and Analyze TCP and UDP Communication 84. Introduction to Describe and Analyze TCP and UDP Communication 85. How TCP Starts a Session 86. How TCP Sends Data (TCP Windowing) 87. How TCP Ends a Session 88. How UDP Communicates 89. Review of Describe and Analyze TCP and UDP Communication ## Configure Windows, MAC, or Linux for Network Access 90. Introduction to Configure Windows, MAC, or Linux for Network Access 91. Configuring and Testing Windows Network Access 92. Configuring and Testing MacOS Network Access 93. Configuring and Testing Ubuntu Linux Network Access 94. Review of Configure Windows, MAC, or Linux for Network Access ## Describe Network Switch Functions and How to Locate Network Devices 95. Introduction to Describe Network Switch Functions and How to Locate Network Devices 96. Connecting Devices to a Switch 97. Switches Learning MAC Addresses 98. Viewing and Filtering MAC Address Tables 99. Locating Devices on a Network Switch 100. Locating Devices Lab 101. Review of Describe Network Switch Functions and How to Locate Network Devices ## Diagnose Interface Status, Errors, and Cabling Issues on a Cisco Switch 102. Introduction to Diagnose Interface Status, Errors, and Cabling Issues on a Cisco Switch 103. Common Copper and Fiber Physical Issues 104. The Quick Way to See Interface Status 105. Examining Speed and Duplex Mismatches 106. Deep-Dive Into Interface Counters 107. Review of Diagnose Interface Status, Errors, and Cabling Issues on a Cisco Switch ## Describe Power over Ethernet (PoE) Capabilities and Standards 108. Introduction to Describe Power over Ethernet (PoE) Capabilities and Standards 109. How Power over Ethernet (PoE) Works 110. Exploring PoE Standards 111. PoE in Action on a Cisco Switch 112. Review of Describe Power over Ethernet (PoE) Capabilities and Standards ## Explain IP Addressing and Subnetting Concepts 113. Introduction to Explain IP Addressing and Subnetting Concepts 114. The Classes of Addresses from A to E 115. The Fundamentals of IP, Mask, and Gateway 116. Public and Private Address Ranges 117. Network Designs that Require Subnetting 118. Review of Explain IP Addressing and Subnetting Concepts ## Convert Decimal to Binary and Back 119. Introduction to Converting from Decimal to Binary and Back 120. Process of Binary Conversion 121. Practicing Decimal to Binary 122. Practicing Binary to Decimal ## Perform Subnetting Based on Network Requirements 123. Introduction to Perform Subnetting Based on Network Requirements 124. Subnetting Class C Networks Based on Network Requirements 125. Subnetting Class B Networks Based on Network Requirements 126. Subnetting Class A Networks Based on Network Requirements 127. Troublesome Networks 128. Review of Perform Subnetting Based on Network Requirements ## Perform Subnetting Based on Host Requirements 129. Introduction to Perform Subnetting Based on Host Requirements 130. Subnetting Class C Networks Based on Host Requirements 131. Subnetting Class B Networks Based on Host Requirements 132. Subnetting Class A Networks Based on Host Requirements 133. Troublesome Hosts 134. Additional Examples of Subnetting Based on Host Requirements ## Reverse Engineering Subnets and Using VLSM 135. Introduction to Reverse Engineering Subnets and VLSM 136. Doing Subnetting Backwards 137. Practical Reverse Engineering Examples 138. What is VLSM? 139. VLSM Scenario ## Describe IPv6 Core Addressing Concepts 140. Introduction to Describe IPv6 Core Addressing Concepts 141. Comparing IPv4 and IPv6 142. Binary, Decimal, and Hex 143. Making IPv6 Addresses Shorter 144. Types of IPv6 Addresses 145. Designing IPv6 Addressing 146. Configuring IPv6 Addressing 147. Configure IPv6 Addressing Lab 148. Review of Describe IPv6 Core Addressing Concepts ## Design a Basic Wireless Network 149. Introduction to Describe Wireless Frequency and Design Fundamentals 150. What is a Wireless Signal? 151. Battle of the Bands 152. Basic and Extended SSIDs and WAP Placement 153. Review of Describe Wireless Frequency and Design Fundamentals ## Explain VLANs and Configure VLANs on a Single Switch 154. Introduction to Explain VLAN Concepts and Configure VLANs on a Single Switch 155. How VLANs Changed the World 156. Routing Between VLANs 157. Configuring VLANs on a Single Switch 158. Configuring a Router on a Stick 159. Configuring VLANs on a Single Switch Lab 160. Review of Explain VLAN Concepts and Configure VLANs on a Single Switch ## Configure Trunking Between Switches, WAPs, and Servers 161. Introduction to Configure Trunking Between Switches, WAPs, Servers 162. Understanding DTP and the Native VLAN 163. Configuring Trunks the Right Way 164. Weird and Wacky World of VTP 165. Configuring VTP 166. Limiting or Adding VLANs to Trunks 167. Connecting Trunks to Servers, WAPs, and More 168. Deploying VLSM in a VLAN Network 169. Configuring VLANs, Trunking, and Routing Lab 170. Review of Configure Trunking Between Switches, WAPs, Servers, and More ## Create a Network Diagram with Cisco CDP and LLDP 171. Introduction to Create a Network Diagram with Cisco CDP and LLDP 172. What is CDP and LLDP? 173. Configuring and Tuning CDP and LLDP 174. Creating a Network Diagram using CDP and LLDP 175. Creating a Network Diagram with CDP Lab 176. Review of Create a Network Diagram with Cisco CDP and LLDP ## Design and Configure a Rapid Spanning Tree Protocol (STP) Network 177. Introduction to Design and Configure a Rapid Spanning Tree Protocol (STP) Network 178. What Does STP Do? 179. Understanding STP Standards 180. How the Root Bridge is Elected 181. How to Determine Your STP Topology 182. Configuring Basic STP and Verifying Results 183. Identifying and Configuring STP Ports and Root Bridge Lab 184. Review of Design and Configure a Rapid Spanning Tree Protocol (STP) Network ## Increase Network Capacity Using EtherChannel 185. Introduction to Increase Network Capacity Using EtherChannel 186. What is EtherChannel? 187. Configuring and Verifying EtherChannel 188. Modifying EtherChannel Load Distribution 189. Review of Increase Network Capacity Using EtherChannel ## Configure a Basic Cisco Wireless Network using the WLC GUI 190. Introduction to Configure a Basic Cisco Wireless Network using the WLC GUI 191. Cisco WLC Puzzle Pieces 192. Accessing a Cisco WLC for the First Time 193. Base Level WLC Configuration 194. Review of Configure a Basic Cisco Wireless Network using the WLC GUI ## Explain End-To-End IP Communications 195. Introducing End-To-End IP Communications 196. TCP/IP Protocol Stack Review 197. Routers and Multilayer Switches 198. Predicting the Correct L2 and L3 Addresses 199. Logical and Physical Topologies Lab 200. Identifying and Correcting a Layer 2 Path 201. Topology and Lab Strategy 202. Reviewing End-To-End IP Communications ## Configure and Verify Cisco IPv4 Static Routes 203. Introducing IPv4 Static Routing 204. How a Router Learns IP Routes 205. Adding Directly Connected IPv4 Routes 206. Planning Static Network Routes 207. Configuring Static IPv4 Network Routes 208. Adding Static Host Routes 209. Implementing Static Default Routes 210. Floating Static Routes Overview 211. Configuring and Verifying Static Floating Routes 212. Static Routes using an Outbound Interface 213. IPv4 Static Routes Review 214. IPv4 Static Route Case Study and Lab 215. Review of Configure and Verify Cisco IPv4 Static Routes ## Configure and Verify Cisco IPv6 Static Routes 216. Introducing IPv6 Static Routes 217. IPv6 Static Route Lab Topology 218. Adding IPv6 Directly Connected Routes 219. Planning Static IPv6 Network and Default Routes 220. Configuring Static IPv6 Default and Network Routes 221. Floating Static IPv6 Host Routes 222. IPv6 Static Routes Review 223. IPv6 Static Route Case Study and Lab 224. Review of Configure and Verify Cisco IPv6 Static Routes ## Describe Cisco Dynamic IPv4 Routing with OSPF 225. Introducing OSPF Concepts 226. Dynamic vs. Static Routing 227. OSPF Path Cost 228. OSPF Router ID (RID) 229. OSPF Areas 230. Wildcard Masks and Network Statements 231. OSPF Wildcards on Clean Octet Boundaries 232. OSPF Wildcards for Subnets 233. DR and BDRs on Broadcast Networks 234. Verifying OSPF Adjacencies 235. OSPF LSAs and DRs 236. OSPF and Point-to-Point Networks 237. Review of Describe Cisco Dynamic IPv4 Routing with OSPF 238. OSPF Concepts Wrap-Up ## Implement Cisco Dynamic IPv4 Routing with OSPF 239. Introduction to Implement Cisco Dynamic IPv4 Routing with OSPF 240. Lab Topology Introduction 241. Implementing Loopbacks for OSPF 242. Implementing OSPF with Exact Network Statements 243. Adding more OSPF Routers 244. OSPF Link Cost Calculation 245. OSPF Neighbor Adjacencies 246. Default Routes in OSPF Overview 247. Implementing a Default Route in OSPF 248. Real World OSPF Case Study and Lab 249. Review of Implement Cisco Dynamic IPv4 Routing with OSPF ## Configure and Verify First Hop Redundancy Protocols (FHRP) 250. Introducing First Hop Redundancy Protocols (FHRPs) 251. FHRP (First Hop Redundancy Protocols) Overview 252. Hot Standby Router Protocol (HSRP) 253. Virtual Router Redundancy Protocol (VRRP) 254. Gateway Load Balancing Protocol (GLBP) 255. Applying your FHRP Skills in a Production Network 256. Review of Configure and Verify First Hop Redundancy Protocols (FHRP) ## Interpret and Describe a Cisco IP Routing Table 257. Introduction to Interpret and Describe a Cisco IP Routing Table 258. Routing Protocol Codes 259. Network Prefix and Mask 260. Next Hop 261. Administrative Distance (AD) 262. The Routing Table Metric 263. Gateway of Last Resort 264. Using a Routing Table in a Production Network 265. Review of Interpret and Describe a Cisco IP Routing Table ## Predict a Cisco Router’s IP Forwarding Decisions 266. Introduction to Predict a Cisco Router’s IP Forwarding Decisions 267. Winning Routes of a Router's Table (Concepts) 268. Preferring a Better Route Due to AD Lab 269. Choosing a Route Based on the Metric or Cost 270. Concepts of Using the Longest Match in the Routing Table 271. Longest Match Routing Lab 272. Identifying Which Routes Include a Specific IP 273. Route or Drop: The Prediction Game 274. Case Study and Lab: Predicting the Router's Decisions 275. Review of Predict a Cisco Router’s IP Forwarding Decisions ## Configure and Verify Cisco’s Router on a Stick 276. Introducing a Router on a Stick 277. Router on a Stick Concepts 278. Implementing Router on a Stick 279. Using Router on a Stick in Production 280. Review of Configure and Verify Cisco’s Router on a Stick ## Troubleshoot an IP Network 281. Introducing the Troubleshooting Labs 282. Troubleshooting Tips 283. Troubleshooting Topology 284. Trouble Ticket 1 with Guest Jeff Kish 285. Trouble Ticket 2 with Guest Knox Hutchinson 286. Trouble Ticket 3 with Guest Bart Castle 287. Trouble Ticket 4 with Keith Barker ## Cisco NAT Concepts and Base Configurations: Static and Overload 288. Introducing Cisco NAT Concepts and Base Configurations 289. Using Different NAT Strategies 290. Defining NAT Terminology 291. Configuring NAT Overload 292. Configuring Static NAT 293. Configuring and Verifying Cisco NAT Lab 294. Reviewing Cisco NAT Concepts and Base Configurations ## Configure and Verify Cisco NTP 295. Introduction to Configure and Verify Cisco NTP 296. What is NTP? 297. Configuring an NTP Client 298. Configuring an NTP Server 299. Review of Configure and Verify Cisco NTP ## Configure DHCP Server and Relay Functions 300. Introduction to Configure DHCP Server and Relay Functions 301. DHCP Server, Client, and Relay 302. Configuring a Cisco DHCP Server 303. Configuring DHCP Relay in a Cisco Network 304. DHCP Lab 305. Review of Configure DHCP Server and Relay Functions ## Explain Common Network Services: SNMP, Syslog, QoS, and TFTP-FTP 306. Introducing Common Network Services 307. SNMP 308. Syslog 309. QoS 310. TFTP-FTP 311. Reviewing Common Network Services ## Define Key Concepts Regarding Network Security 312. Introduction to Define Key Concepts Regarding Network Security 313. Security Overview and CIA 314. Vulnerabilities 315. Exploits 316. Threats and Risk 317. Mitigation Techniques and Countermeasures 318. Review of Define Key Concepts Regarding Network Security ## Describe Security Program Elements 319. Introducing Security Program Elements 320. Polices as Part of a Security Program 321. User Awareness and Training 322. Physical Controls and Review ## Describe Elements of Secure Password Policies 323. Introduction to Describe Elements of Secure Password Policies 324. Password Policies 325. Password Managers 326. Multi-Factor Authentication (MFA) 327. Review of Describe Elements of Secure Password Policies ## Configure Cisco Device Access Control Using Local Passwords 328. Introducing Local Passwords 329. Default Behavior for Console Access 330. Default Behavior for Aux Access 331. Passwords for VTY Login 332. Storing Local Passwords 333. Type 9 Local Passwords 334. Local Usernames and Passwords 335. Configure Cisco Device Access Control Using Local Passwords Review ## Summarize and Differentiate AAA Concepts 336. Introducing AAA 337. AAA Overview 338. Building Blocks of AAA 339. AAA New-Model Framework 340. Commands to Implement AAA 341. Implementing and Verifying AAA 342. Summarize and Differentiate AAA Concepts Review ## Apply and Verify Cisco Access Control Lists 343. Introducing Access Control Lists (ACLs) for Packet Filtering 344. ACL Concepts 345. Standard ACLs Concepts 346. Standard ACLs Lab 347. Wildcard Masks Concepts 348. Wildcard Masks Lab 349. Wildcard Masks for Subnets Lab 350. Extended ACLs Concepts 351. Extended ACLs Lab 352. Using Named Extended ACLs 353. ACL Production Case Study and Lab 354. Review of Apply and Verify Cisco Access Control Lists ## Configure and Verify Cisco Port Security 355. Introducing Port Security 356. Understanding Port Security and Why we Need It 357. Port Security Defaults 358. Implementing Port Security on Layer 2 Interface 359. Customizing Port Security 360. Configuring Auto Errdisable Recovery 361. Applying Port Security Skills in Production 362. Review of Configure and Verify Cisco Port Security ## Configure and Verify Cisco DHCP Snooping 363. Introducing DHCP Snooping 364. Why is DHCP Snooping Needed 365. The Recipe for DHCP Snooping 366. Building and Implementing DHCP Snooping in PT 367. Adding Source Guard to a Switch 368. Applying DHCP Snooping in Production 369. Review of Configure and Verify Cisco DHCP Snooping ## Configure and Verify Cisco Dynamic ARP Inspection 370. Introducing Dynamic ARP Inspection (DAI) 371. Why is DAI Needed 372. The Recipe and Commands for DAI 373. Implementing DAI 374. ARP Access Lists for Non-DHCP Devices 375. Additional DAI Options and Features 376. Applying DAI to the Production Network 377. Review of Configure and Verify Cisco Dynamic ARP Inspection ## Describe Remote Access and Site-to-Site VPNs 378. Introducing VPNs 379. Virtual Private Network (VPN) Overview 380. Building Blocks for Cryptography 381. Site-To-Site VPN Concepts 382. Verifying Site-To-Site Encryption Lab 383. Remote-Access VPN Concepts 384. Remote-Access VPN Client Examples 385. Review of Describe Remote Access and Site-To-Site VPNs ## Describe, Configure, and Verify Wireless Security protocols 386. Introduction to Describe, Configure, and Verify Wireless Security protocols 387. Wireless Security Protocol Options 388. Options for Controlling Wi-Fi Networks 389. Implementing WPA2 PSK on a SOHO Network 390. Planning WPA2 on a Controller-Based Wi-Fi Network 391. Implementing WPA2 on a Controller-based Wi-Fi Network 392. Review of Describe, Configure, and Verify Wireless Security Protocols ## What is Network Automation? 393. Introducing Network Automation 394. What is Network Automation? 395. Automating Network Device Deployment 396. Automating Network Device Backup, Monitoring, and Data Collection 397. Automating Network Troubleshooting Lab 398. Let's Keep Automating ## Use REST APIs and JSON 399. You are a Network Developer 400. API vs. SNMP vs. CLI 401. What is a REST API? 402. Navigating a REST API 403. HTTP Verbs 404. Programming 101: Data 405. Programming Playground Lab 406. JSON, YAML, or XML? 407. Interpreting JSON 408. REST API Lab 409. Becoming a Network Developer ## Controller-Based Networking 410. Forget Everything You Know About Networking 411. Reviewing the Planes 412. What is Controller-Based Networking? 413. Why do we Need an SDN Controller? 414. SDN Architectures 415. Automating the Data Center with ACI 416. Magic of Software-Defined Access 417. DNA Center Overview 418. Using Postman with the DNA Center REST API 419. DNA Center Lab 420. Controller-Based Networks Review ## Network Automation Tools: Ansible, Puppet, and Chef 421. Introducing Ansible, Puppet, and Chef 422. Configuration Managament with DevOps Tools 423. Ansible 424. Puppet 425. Chef 426. Summing it All Up