Professional Documents
Culture Documents
CCNA 70Hrs
Session 1 Ch 1 Introducing LAN Different Computer Networks Computing Models and Network Development Network Elements Common Network Service Ch 2 Networking Technologies Introducing Transmission Media Topology Access Schemes Contention Polling Ethernet & ARCnet Ch 2 Networking Technologies ( Cont) Ethernet and the IEEE Specification Working with FDDI WAN Technologies Comparing WAN and LAN Communication Gigabit Ethernet Chapter 1 Internetworking Internetworking Basic Internetworking modules OSI Reference Models TCP/IP Reference Model OSI & TCP/IP Comparision Chapter 1 Internetworking ( Cont) Ethernet Networking and cabling Wireless Networking Data Encapsulation and Decapsulation Cisco Three-layer Hierarchical Model Chapter 2 Introduction to TCP/IP IP Addressing Broadcast Addresses
Session 2
Session 3
Session 4
Session 5
Session 6
SLA/SCNP/AT/2010
Sl.No.
Session 7
Session 8
Session 9
Session 10
Ch 3 OSI & Internetworking Devices Need for Rules OSI Model Practical Use of Models The Physical Layer The Data Link Layer The Network Layer Ch 3 OSI & Internetworking Devices (cont) The Transport Layer The Session Layer The Presentation Layer The Application Layer Repeater HUB Bridges Multiplexors Routers Brouters CSU/DSUs Ch 4 Network Protocols Introduction to Protocols Types of Protocols Protocols and Data Transmissions Routable/Non-Routable Protocols Types of Data Transmissions Transmission Control Protocol/Internet Protocol (TCP/IP) Ch 4 Network Protocols ( Cont) Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) NetBIOS Enhanced User Interface (NetBEUI) AppleTalk Other Communication Protocols Asynchronous Transfer Mode (ATM) Infrared Data Association (IrDA) Dial-up Protocols
SLA/SCNP/AT/2010
Sl.No.
Ch 5 Introduction to TCP/IP A Brief History of TCP/IP From the ARPANET to the Internet Locating Information on the Internet Request for comments (RFCs) Session 11 Ch 5 Introduction to TCP/IP (Cont) InterNIC Directory and Database Services The TCP/IP Protocol Suite and the DOD Networking Model Internet Layer Protocols Network Access Layer Protocols Ch 6 IP Addressing The Hierarchical IP Addressing Scheme Class A Networks Class B Networks Class C Networks Ch 6 IP Addressing ( Cont) Additional Classes of Networks Special IP Addresses Subnetting a Network Implementing Subnetting Subnet Masks IP Version 6 Ch 7 TCP/IP Applications Functions of several TCP/IP applications. Telnet File Transfer Protocol (FTP) TFTP (Trivial File Transfer Protocol) NFS (Network File System) SMTP (Simple Mail Transfer Protocol) SNMP (Simple Network Management Protocol) Transferring files between machines Copying files of other users
Session 12
Session 13
SLA/SCNP/AT/2010
Sl.No.
Session 14
Session 15
Session 16
Ch 8 Implementing the Network Plan the Network Install Network cabling Crimping an RJ-45 Plug Install and configure Network Interface Boards Choosing the Correct Board Ch 9 Security Network Security Models Share-Level Security Model User-Level Security Model Implementing a Password Implementing a User Account How Encryption Works How Firewalls Work How Proxy Server Work Ch 10 Implementing Remote Connectivity The Capabilities and Requirements for Remote Access Network Services Available Implementing Remote Access Determining Users and Services Data Transmission Technology Design a Secure Remote Access Solution Determining a Network Security Policy Isolating a Remote Access Server Demilitarized Zone Security Design Special Security Concerns
SLA/SCNP/AT/2010
Sl.No.
Ch 11 Maintaining the Network Choose a Backup Strategy Time Requirements for Completing a Backup Time Requirement for Restoring a Backup Assigning Backup Responsibility Explain RAID and Define Each of its Levels Session 17 Ch 11 Troubleshooting the Network Task Related to providing Service and Support on a Network The Six-Step Troubleshooting Model Troubleshoot Network and Workstation Problems Using Troubleshooting Tools Using Event Viewer Using Device Manager Chapter 3 Subnetting, Variable Length Subnet Masks (VLSMs), and Troubleshooting TCP/IP Subnetting Basics Subnetting Class C Addresses Subnetting Class B, A Addresses Variable length Subnet masks (VLSM) Supernetting (Route Summerisation) Chapter 4 Ciscos Internetworking Operating System (IOS) and Security Device Manager (SDM) The Cisco Router User Interface Cisco IOS Connecting to CISCO Devices Command line Interface Basic overview of Router Configuration Commands Ciscos Security Device Manager (SDM) Chapter 5 Managing a Cisco Internetwork Internal Component of a CISCO Router Router Boot Sequence Managing Configuring Registers
Session 18
Session 19
Session 20
SLA/SCNP/AT/2010
Sl.No.
Session 21
Session 22
Session 23
Session 24
Session 25
Session 26
Chapter 5 Managing a Cisco Internetwork ( Cont ) Using & Configuring the Cisco IOS File System (Cisco IFS) Backing and Restoring the CISCO IOS Using the SDM to Back Up/Restore,Edit & Manage the Flash Memory Backing and Restoring the Cisco Router Configurations Chapter 5 Managing a Cisco Internetwork ( Cont ) Using Cisco Discovery Protocol (CDP) Using Telnet Resolving Hostnames Using SDM to Telnet into Your Router Chapter 6 IP Routing Routing Basics Routing Protocols (Distance Vector, Link State & Hybrid) Solutions for Routing Loops RIP features and operation Chapter 6 IP Routing ( Cont) IGRP features and operation Configuring and verification of Static Routing Configuring and verification of default Routing Configuring and verification of RIP Configuring and verification of IGRP Chapter 7 Enhanced IGRP (EIGRP) and Open Shortest Path First (OSPF) EIGRP Features and Operation OSPF Features and Operation Configuring and verification of EIGRP Configuring and verification of OSPF OSPF DR and BDR Elections Chapter 8 Layer 2 Switching and Spanning Tree Protocol (STP) Switch functions at layer 2 STP Operation and Spanning-tree port states LAN switch types Configuration of 1900 Catalyst switches Configuration of 2950 Catalyst switches
SLA/SCNP/AT/2010
Sl.No.
Session 27
Session 28
Session 29
Session 30
Session 31
Session 32
Chapter 9 Virtual LANs (VLANs) Overview of VLANs Configuring and verifying VLANs Telephony: Configuring Voice VLANs Using the CNA to Configure VLANs and Chapter 10 Security Perimeter, Firewall, and Internal Routers Recognizing Security Threats Mitigating Security Threats Chapter 10 Security ( Cont) Introduction to Access Lists Standard Access List Extended Access List Named Access List Advanced Access Lists Configuring Access Lists Using SDM Chapter 11 Network Address Translation (NAT) Static NAT Configuration Dynamic NAT Configuration Testing and Troubleshooting NAT Configuring NAT Using SDM Chapter 11 Network Address Translation (NAT) Static NAT Configuration Dynamic NAT Configuration Testing and Troubleshooting NAT Configuring NAT Using SDM Chapter 12 Ciscos Wireless Technologies The 802.11 Standards Comparing 802.11 Split-MAC Architecture MESH and LWAPP AWPP Wireless Security Configuring Our Wireless Internetwork
SLA/SCNP/AT/2010
Sl.No.
Session 33
Session 34
Chapter 13 Internet Protocol Version 6 (IPv6) The Benefits and Uses of IPv6 Address Types Special Addresses How IPv6 Works in an Internetwork Configuring Cisco Routers with IPv6 IPv6 Routing Protocols RIPng EIGRPv6 OSPFv3 Migrating to IPv6 Configuring IPv6 on Our Internetwork Configuring RIPng Configuring OSPFv3 Chapter 14 Wide Area Networks Introduction to WAN Circuit Switching Packet Switching Cabling the WAN High-level Data-link Control (HDLC) Protocol Point-to-Point Protocol (PPP) PAP & CHAP authentication Module Exam
Session 35
SLA/SCNP/AT/2010