Avoid scams by dealing locally! Always exchange items and money in person and Never pay in advance. More info
BEST ONLINE TRAINING FOR CCNA
CCNA (Cisco Certified Network Associate) Syllabus
Details of Topics
1. Internetworking Basics
2. The Layered Approach
3. Advantages of Reference Models
4. The OSI Reference Model
5. The Application Layer
6. The Presentation Layer
7. The Session Layer
8. The Transport Layer
9. The Network Layer
10. The Data Link Layer
11. The Physical Layer
12. Ethernet Networking
13. Ethernet Cabling
14. Data Encapsulation
15. The Cisco Three-Layer Hierarchical Model
16. The Core Layer
17. The Distribution Layer
18. The Access Layer
19. TCP/IP and the DoD Model
20. IP Addressing
21. Subnetting, Variable Length Subnet Masks (VLSMs), and TCP/IP
22. Subnet Masks
23. Classless Inter-Domain Routing (CIDR)
24. Variable Length Subnet Masks (VLSMs)
25. Summarization
26. Cisco’s Internetworking Operating System (IOS)
27. Security Device Manager (SDM)
28. Cisco Router IOS
29. Connecting to a Cisco Router
30. Command-Line Interface (CLI)
31. Overview of Router Modes
32. Hostnames
33. Banners
34. Setting Passwords
35. Encrypting Your Passwords
36. Descriptions
37. Cisco’s Security Device Manager (SDM)
38. Managing a Cisco Internetwork
39. The Internal Components of a Cisco Router
40. The Router Boot Sequence
41. Using Cisco Discovery Protocol (CDP)
42. Getting CDP Timers and Holdtime Information
43. Using Telnet
44. Using SDM to Telnet into Your Router
45. IP Routing
46. Routing Basics
47. Configuring IP Routing
48. Configuring IP Routing in Our Network
49. Static Routing
50. Default Routing
51. Dynamic Routing
52. Routing Protocol Basics
53. Distance-Vector Routing Protocols
54. Routing Loops
55. Routing Information Protocol (RIP)
56. RIP Timers
57. Configuring RIP Routing
58. Verifying the RIP Routing
59. RIP Version 2 (RIPv2)
60. Interior Gateway Routing Protocol (IGRP)
61. The show ip protocols
62. RIPv2 on Our Internetwork
63. Enhanced IGRP (EIGRP) and Open Shortest Path First (OSPF)
64. EIGRP Features and Operation
65. Protocol-Dependent Modules
66. Neighbor Discovery
67. Reliable Transport Protocol (RTP)
68. Diffusing Update Algorithm (DUAL)
69. Using EIGRP to Support Large Networks
70. Route Discovery and Maintenance
71. Configuring EIGRP
72. Redistributing
73. Load Balancing with EIGRP
74. Verifying EIGRP
75. Open Shortest Path First (OSPF) Basics
76. OSPF Terminology
77. SPF Tree Calculation
78. Configuring OSPF
79. Enabling OSPF
80. Configuring OSPF Areas
81. Configuring Our Network with OSPF
82. Verifying OSPF Configuration
83. OSPF DR and BDR Elections
84. Configuring Loopback Interfaces
85. Configuring EIGRP and OSPF Summary Routes
86. Switching and Spanning Tree Protocol (STP)
87. Spanning Tree Protocol (STP)
88. Spanning Tree Terms
89. Configuring Catalyst Switches
90. Catalyst Switch Configuration
91. Verifying Cisco Catalyst Switches
92. VLAN Basics
93. VLAN Memberships
94. Identifying VLANs
95. Frame Tagging
96. VLAN Identification Methods
97. VLAN Trunking Protocol (VTP)
98. VTP Modes of Operation
99. VTP Pruning
100. Routing between VLANs
101. Configuring VLANs
102. Assigning Switch Ports to VLANs
103. Configuring Trunk Ports
104. Configuring Inter-VLAN Routing
105. Configuring VTP
106. Introduction to Access Lists
107. Standard Access Lists
108. Wildcard Masking
109. Standard Access List Example
110. Controlling VTY (Telnet) Access
111. Extended Access Lists
112. Extended Access List Example 1
113. Configuring Access Lists Using SDM
114. Creating ACLs with SDM
115. Network Address Translation (NAT)
116. When Do We Use NAT?
117. Types of Network Address Translation
118. Static NAT Configuration
119. Dynamic NAT Configuration
120. PAT (Overloading) Configuration
121. Configuring NAT Using SDM
122. Introduction to Wireless Technology
123. The 802.11 Standards
124. Comparing 802.11
125. Cable and DSL
126. Data Terminal Equipment and Data Communication Equipment
127. High-Level Data-Link Control (HDLC) Protocol
128. Point-to-Point Protocol (PPP)
129. Configuring PPP on Cisco Routers
130. Verifying PPP Encapsulation
Should you require any further information please do not hesitate to contact us
Email id: trainings@keentechnologies.com
Respond to this adAd ID: 934331
Similar ads:Easy Learning Courses, is an organisation that conducts vocational training, computer courses and several other professional courses that help our students in either acquiring a ... H2kinfosys is a one of foremost online training institute that offers on demand courses on testing tools and other software technologies. We deliver comprehensive qa testing ... Business Analysts are subject matter experts that can perfectly bridge the gap between real businesses and their virtual counterparts. A good understanding of software systems, a ... Bigdata is simply data that is not of a specific form, typically large and unconventional. We are all familiar with data of this sort, but the recent conundrum that businesses ... We are mobile based growing IT company in noida, who provides client outsourcing services in mobile and web application development. Funki Orange technologies offer Industrial ... TIBCO ActiveMatrix BPM Overview:
TIBCO ActiveMatrix BPM is used to develop, deploy, execute and manage Business Process Management centric applications. TIBCO ActiveMatrix BPM ... What is JavaScript?
JavaScript is a dynamic computer programming language. It is most commonly used as part of web browsers, whose implementations allow client-side scripts to ...