Implementing and Administering Cisco Solutions – Extended (CCNA-EX) – Contenuti

Contenuti dettagliati del Corso

Building Redundant Switched Topologies
Explain how STP and RSTP work.

This lesson includes these topics:

  • Physical Redundancy in a LAN:
    Describe physical redundancy in LAN
  • Issues in Redundant Topologies:
    Describe problems that may arise in redundant switched topologies
  • Spanning Tree Operation:
    Describe STP operation in the sample topology
  • Types of Spanning Tree Protocols:
    Describe variants of STP and the differences between them
  • PortFast and BPDU Guard:
    Demonstrate why PortFast and BPDU guard are important technologies
  • Rapid Spanning Tree Protocol:
    Describe Rapid Spanning Tree Protocol
  • Summary Challenge

Exploring Layer 3 Redundancy
Describe the purpose of Layer 3 redundancy protocols.

This lesson includes these topics:

  • Need for Default Gateway Redundancy:
    Describe routing issues related to default gateway redundancy
  • Understanding FHRP:
    Describe the router redundancy process and what happens when a failover occurs
  • Understanding HSRP:
    Describe the concept of HSRP
  • Summary Challenge

Introducing WAN Technologies
Describe basic WAN and VPN concepts.

This lesson includes these topics:

  • Introduction to WAN Technologies:
    Explain WAN technologies characteristics
  • WAN Devices and Demarcation Point:
    Describe WAN devices and their functions in a WAN environment
  • WAN Topology Options:
    Describe WAN topology options
  • WAN Connectivity Options:
    Describe major WAN communication link options
  • Virtual Private Networks:
    Explain VPNs concepts
  • Enterprise-Managed VPNs:
    Describe the characteristics of enterprise-managed VPNs
  • Provider-Managed VPNs:
    Describe the characteristics of provider-managed VPNs
  • Summary Challenge

Introducing QoS
Describe the basic QoS concepts.

This lesson includes these topics:

  • Converged Networks:
    Describe quality impact of running different types of traffic over a single network
  • Quality of Service Defined:
    Define the goal of QoS
  • QoS Policy:
    Describe QoS policy basics and explain major steps QoS policy implementation
  • QoS Mechanisms:
    Identify and explain basic groups of QoS mechanisms
  • QoS Models:
    Introduce QoS models and describe DiffServ
  • Deploying End-to-End QoS:
    Describe best-practices for QoS implementation and configuration within the Enterprise Campus
  • Summary Challenge

Explaining Wireless Fundamentals
Describe the concepts of wireless networks, which types of wireless networks can be built and how to use WLC.

This lesson includes these topics:

  • Wireless Technologies:
    Discuss the various types of wireless topologies
  • WLAN Architectures:
    Discuss the various types of wireless architectures
  • WiFi Channels:
    Discuss the WiFi channels and the principle of non-overlapping WiFi channels
  • AP and WLC Management:
    Describe AP and WLC management access connections
  • Discovery 22: Log into the WLC:
    Log into the WLC
    Topology
    Task 1: Log into the WLC
  • Discovery 23: Monitor the WLC:
    Monitor the WLC
    Topology
    Task 1: Monitor the WLC
  • Discovery 24: Configure a Dynamic (VLAN) Interface:
    Configure a VLAN (dynamic) interface
    Topology
    Task 1: Configure a VLAN (Dynamic) Interface
  • Discovery 25: Configure a DHCP Scope:
    Configure a DHCP scope
    Topology
    Task 1: Configure a DHCP Scope
  • Discovery 26: Configure a WLAN:
    Configure a WLAN
    Topology
    Task 1: Configure a WLAN
  • Discovery 27: Define a RADIUS Server:
    Define a RADIUS server.
    Topology
    Task 1: Define a RADIUS Server
  • Discovery 28: Explore Management Options:
    Configure the SNMP location for the WLC
    Topology
    Task 1: Explore Management Options
  • Summary Challenge

Introducing Architectures and Virtualization
Describe network and device architectures and introduce virtualization.

This lesson includes these topics:

  • Introduction to Network Design:
    Describe the issues in poorly designed LANs
  • Enterprise Three-Tier Hierarchical Network Design:
    Describe enterprise network design concepts
  • Spine-Leaf Network Design:
    Describe characteristics of spine and leaf architectures
  • Cisco Enterprise Architecture Model:
    Describe enterprise architecture model
  • Cloud Computing Overview:
    Describe the effect of cloud computing on enterprise network
  • Network Device Architecture:
    Describe network device architecture
  • Virtualization Fundamentals:
    Explain the need for virtualization, the concept of a virtual machine, and its components
  • Summary Challenge

Examining the Security Threat Landscape
Describe the current security threat landscape.

This lesson includes these topics:

  • Security Threat Landscape Overview:
    Describe the current threat landscape, or threatscape basics
  • Malware:
    Describe malware
  • Hacking Tools:
    Describe hacking tools
  • Denial of Service and Distributed Denial of Service:
    Describe DoS and DDoS attacks
  • Spoofing:
    Describe spoofing
  • Reflection and Amplification Attacks:
    Describe reflection and amplification attacks
  • Social Engineering:
    Explain social engineering
  • Evolution of Phishing:
    Describe the evolution of phishing
  • Password Attacks:
    Examine password attacks
  • Reconnaissance Attacks:
    Examine reconnaissance attacks
  • Buffer Overflow Attacks:
    Explain buffer overflow attacks
  • Man-in-the-Middle Attacks:
    Explain man-in-the-middle attacks
  • Vectors of Data Loss and Exfiltration:
    Explain vectors of data loss and exfiltration
  • Other Considerations:
    Describe other considerations
  • Summary Challenge

Implementing Threat Defense Technologies
Describe threat defense technologies.

This lesson includes these topics:

  • Information Security Overview:
    Describe information security
  • Firewalls:
    Describe firewalls
  • Intrusion Prevention Systems:
    Describe intrusion prevention systems
  • Protection Against Data Loss and Phishing Attacks:
    Introduce protection against data loss and phishing attacks
  • Defending Against DoS and DDoS Attacks:
    Introduce protection against DoS and DDoS attacks
  • Introduction to Cryptographic Technologies:
    Describe cryptographic technologies
  • IPsec Security Services:
    Describe IPsec security services
    EAI_31-8_CCNAU_1-0-0_IPsec_Security_Services_Update_001.zip
  • Secure Sockets Layer and Transport Layer Security:
    Describe SSL and TLS protocols
  • Wireless Security Protocols:
    Describe wireless security protocols
  • Discovery 33: Configure WLAN Using WPA2 PSK Using the GUI:
    Configure WPA2 PSK
    Topology
    Task 1: Configure WLAN Using WPA2 PSK Using the GUI
  • Summary Challenge