CCNA - 2020 (T360)
- CCNA overview
- Lesson 1 overview
- Introduction to Networks
- Characteristics of a Network
- Physical versus Logical Topologies
- Interpreting a Network Diagram
- Impact of User Applications on the Network
- Lesson 2 overview
- Host-To-Host Communications Overview
- ISO OSI Reference Model
- TCP/IP Protocol Suite
- Peer-To-Peer Communications
- Encapsulation and De-Encapsulation
- TCP/IP Stack versus OSI Reference Model
- Lesson 3 overview
- Cisco IOS Software Features and Functions
- Cisco IOS Software CLI Functions
- Cisco IOS Software Modes
- Lesson 4 overview
- Local Area Networks
- LAN Components
- Need for Switches
- Characteristics and Features of Switches
- Lesson 5 overview
- Ethernet LAN Connection Media
- Unshielded Twisted-Pair Cable
- Optical Fiber
- Ethernet Frame Structure
- MAC Addresses
- Duplex Options
- Lesson 6 overview
- Switch Installation
- Switch show interfaces Command
- Switch show version Command
- Switch show running-config Command
- Lesson 7 overview
- Internet Protocol
- Decimal and Binary Number Systems
- IPv4 Address Reoresentation
- IPv4 Address Classes
- Subnet Masks
- Subnets
- Implementing Subnetting
- Determining the Addressing Scheme
- Benefits of VLSM
- Implementing VLSM
- Public and Private IPv4 Addresses
- Broadcast Addresses
- Verifying the IPv4 Address of a Host
- Lesson 8 overview
- TCP/IP Transport Layer Functions
- Reliable versus Best-Effort Transport
- TCP and UDP Characteristics
- TCP/IP Application Layer
- Domain Name System
- Explaining DHCP for IPv4
- Configuring DHCP Roles on a Router
- IPv4 DHCP Settings on Windows Host
- Lesson 9 overview
- Role of a Router I.
- Role of a Router II.
- Router Components
- Router Functions
- Default Routes
- Path Determination
- Administrative Distance
- Lesson 10 overview
- Initial Router Setup
- Configuring IPv4 Adresses on Router Interfaces
- Exploring Connected Devices
- Using Discovery Protocols
- Lesson 11 overview
- Layer 2 Addressing
- Layer 3 Addressing
- Default Gateways
- Using ARP Protocol
- Host-To-Host Packet Delivery
- Role of a Switch in Packet Delivery
- Lesson 12 overview
- Troubleshooting Methods I.
- Troubleshooting Methods II.
- Logging
- Verifying of End-To-End IPv4 Connectivity
- Using Telnet and SSH
- Troubleshooting Media Issues
- Troubleshooting Connectivity and IPv4 Issues
- Lesson 13 overview
- IPv4 Address Exhaustion Workarounds
- IPv6 Features
- IPv6 Address Types
- IPv6 Address Scopes and Prefixes
- IPv6 Link-Local Unicast and IPv6 Multicast Addresses
- Comparison of IPv4 and IPv6 Headers
- Stateless Address Autoconfiguration
- Verification of End-To-End IPv6 Connectivity I.
- Verification of End-To-End IPv6 Connectivity II.
- Lesson 14 overview
- Routing Operation
- Static and Dynamic Routing Comparison
- IPv4 Static Route Configuration
- Verifying IPv4 Static Route Configuration
- Verifying IPv6 Static Route Configuration
- Lesson 15 overview
- VLAN Introduction
- Configuring VLANs
- Verifying VLANs
- Trunking with 802.1Q
- Configuring an 802.1Q Trunk
- VLAN Design Considerations
- Lesson 16 overview
- Purpose of Inter-VLAN Routing
- Inter-VLAN Routing Options
- Verifying VLAN Subinterfaces
- Lesson 17 overview
- Dynamic Routing Protocols
- Path Selection and Link-State Protocols Overview
- Link-State Routing Protocol Data Structures
- Introducing OSPF
- Establishing OSPF Neighbor Adjacencies
- OSPF Neighbor States
- SPF Algorithm
- Building LSDB and Routing for IPv6
- Lesson 18 overview
- Physical Redundancy in a LAN
- Spanning Tree Operation
- Spanning Tree Operation Example
- Types of Spanning Tree Protocols
- PortFast and BPDU Guard
- Rapid Spanning Tree Protocol
- Lesson 19 overview
- EtherChannel Overview I.
- EtherChannel Overview II.
- EtherChannel Configuration Options
- Configuring Laye 2 and Layer 3 EtherChannel
- Verifying EtherChannel Configuration
- Lesson 20 overview
- Need for Default Gateway Redundancy
- Understanding FHRP
- Understanding HSRP
- HSRP Advanced Features
- Lesson 21 overview
- Introduction to WAN Technologies
- WAN Devices and Demarcation Point
- WAN Topology Options
- Overview of WAN Connectivity Options I.
- Overview of WAN Connectivity Options II.
- Overview of WAN Connectivity Options III.
- Enterprise Internet Connectivity Options
- Enterprise-Managed VPNs I.
- Enterprise-Managed VPNs II.
- Provider-Managed VPNs
- Lesson 22 overview
- ACL Overview
- ACL Operation
- ACL Wildcard Masking
- Types of Basic ACLs
- Configuring IPv4 ACLs
- Verifying and Modifying IPv4 ACLs
- Applying IPv4 ACLs I.
- Applying IPv4 ACLs II.
- Lesson 23 overview
- Introducing Network Address Translation
- NAT Terminology and Translation Mechanisms
- Benefits and Drawbacks of NAT
- NAT Types
- Configuring and Verifying IPv4 NAT
- Configuring IPv4 PAT
- Configuring IPv4 PAT II.
- Lesson 24 overview
- Converged Networks
- Quality of Service Building Blocks
- QoS Mechanisms I.
- QoS Mechanisms II.
- QoS Mechanisms III.
- Tools for Managing Congestion
- Link Efficiency Mechanisms
- Deploying QoS Within the Enterprise
- Lesson 25 overview
- Wireless Technologies
- Wireless Architectures
- WLC and AP Configurations
- WiFi Channels
- Infrastructure Services
- Lesson 26 overview
- Introduction to Network Design
- Enterprise Three-Tier Hierarchical Network Design
- Spine-Leaf Network Design
- Cloud Computing Overview
- Network Device Architecture
- Virtualization Fundamentals
- Virtualization of Networking Functions
- Lesson 27 overview
- Introducing Syslog
- SNMP Overview
- Network Time Protocol
- Configuring and Verifying NTP
- Lesson 28 overview
- Cisco IOS Integrated File System and Devices
- Router Power-On Boot Sequence
- Locating Cisco IOS Image Files
- Loading Files
- Managing Files I.
- Managing Files II.
- Lesson 29 overview
- Security Threat Landscape Overview
- Types of Network Attacks I.
- Types of Network Attacks II.
- Types of Network Attacks III.
- Lesson 30 overview
- Information Security Overview
- Firewalls / Intrusion Prevention Systems
- Protection Against Data Loss and Phishing Attacks
- Hashing and Encryption Algorithms
- IPsec Overview
- Security Services
- SSL and TLS
- Wireless Security Protocols
- Lesson 31 overview
- Network Device Security Overview
- Securing Device Access I.
- Securing Device Access II.
- SSH Configuration
- Using ACLs / External Authentication Options
- Lesson 32 overview
- Securing Unused Ports
- Infrastructure ACL
- Port Security Overview
- Mitigating VLAN Attacks
- DHCP Protection
- Dynamic ARP Inspection
- Mitigating STP Attacks
Az oktatóról
Ország Tamás vagyok, egészen csekély gyermekkoromban kaptam el a számítógép-fertőzést, amiből szerencsére azóta sem gyógyultam ki. Fejlesztő, rendszerszervező és üzemeltető végzettségeim vannak, belekóstoltam mindegyikbe, végül az utóbbi ízlett/ízlik a legjobban, különös tekintettel a hálózatokra, szerverrendszerek fenntartására. Sok különböző környezetben megfordultam a mindenes IT SMB-től a nagybankokig, kutatóintézettől a saját vállalkozásig. Jelenleg a Training360 oktatóközpontot erősítem rendszermérnökként, vezető oktatóként. Nem zárom ki, hogy külső szemlélő számára kockának tűnhetek, mivel munkaidőn túl is körülvesznek a számítógépek. Mondhatjuk, szabadidőmben is mindenre kíváncsi vagyok.