Prerequisites
Students are required to have successfully completed both the Introduction to Networks (ITN) and the Switching, Routing and Wireless Essentials (SRWE) courses prior to beginning this course. Learners are also expected to have the following skills:
• High school reading level.
• Basic computer literacy
• Basic PC operating system navigation skills
• Basic internet usage skills
CCNAv7 Enterprise Networking, Security, and Automation (ENSA) Outline
The third course in the CCNAv7 curriculum describes the architectures and considerations related to designing, securing, operating, and troubleshooting enterprise networks. This course covers wide area network (WAN) technologies and quality of service (QoS) mechanisms used for secure remote access. ENSA also introduces software-defined networking, virtualization, and automation concepts that support the digitalization of networks. Students gain skills to configure and troubleshoot enterprise networks, and learn to identify and protect against cybersecurity threats. They are introduced to network management tools and learn key concepts of software-defined networking, including controller-based architectures and how application programming interfaces (APIs) enable network automation.
Listed below are the current set of modules and their associated competencies outlined for this course. Each module is an integrated unit of learning that consists of content, activities and assessments that target a specific set of competencies. The size of the module will depend on the depth of knowledge and skill needed to master the competency. Some modules are considered foundational, in that the artifacts presented, while not assessed, enable learning of concepts that are covered on the CCNA certification exam.
Course Outline
Module | Topic | Objective |
---|---|---|
01: Single-Area OSPFv2 Concepts | Explain how single-area OSPF operates in both point-to-point and broadcast multiaccess networks. | |
OSPF Features and Characteristics | Describe basic OSPF features and characteristics. | |
OSPF Packets | Describe the OSPF packet types used in single-area OSPF. | |
OSPF Operation | Explain how single-area OSPF operates. | |
02: Single-Area OSPFv2 Configuration | Implement single-area OSPFv2 in both point-to-point and broadcast multiaccess networks. | |
OSPF Router ID | Configure an OSPFv2 router ID. | |
Point-to-Point OSPF Networks | Configure single-area OSPFv2 in a point-to-point network. | |
Multiaccess OSPF Networks | Configure the OSPF interface priority to influence the DR/BDR election in a multiaccess network. | |
Modify Single-Area OSPFv2 | Implement modifications to change the operation of singlearea OSPFv2. | |
Default Route Propagation | Configure OSPF to propagate a default route. | |
Verify Single-Area OSPFv2 | Verify a single-area OSPFv2 implementation. | |
03: Network Security Concepts | Explain how vulnerabilities, threats, and exploits can be mitigated to enhance network security. | |
Current State of Cybersecurity | Describe the current state of cybersecurity and vectors of data loss. | |
Threat Actors | Describe the threat actors who exploit networks. | |
Threat Actor Tools | Describe tools used by threat actors to exploit networks. | |
Malware | Describe malware types. | |
Common Network Attacks | Describe common network attacks. | |
IP Vulnerabilities and Threats | Explain how IP vulnerabilities are exploited by threat actors. | |
TCP and UDP Vulnerabilities | Explain how TCP and UDP vulnerabilities are exploited by threat actors. | |
IP Services | Explain how IP services are exploited by threat actors. | |
Network Security Best Practices | Describe best practices for protecting a network. | |
Cryptography | Describe common cryptographic processes used to protect data in transit. | |
04: ACL Concepts | Explain how ACLs are used as part of a network security policy. | |
Purpose of ACLs | Explain how ACLs filter traffic. | |
Wildcard Masks in ACLs | Explain how ACLs use wildcard masks. | |
Guidelines for ACL Creation | Explain how to create ACLs. | |
Types of IPv4 ACLs | Compare standard and extended IPv4 ACLs. | |
05: ACLs for IPv4 Configuration | Implement IPv4 ACLs to filter traffic and secure administrative access. | |
Configure Standard IPv4 ACLs | Configure standard IPv4 ACLs to filter traffic to meet networking requirements. | |
Modify IPv4 ACLs | Use sequence numbers to edit existing standard IPv4 ACLs. | |
Secure VTY Ports with a Standard IPv4 ACL | Configure a standard ACL to secure vty access. | |
Configure Extended IPv4 ACLs | Configure extended IPv4 ACLs to filter traffic according to networking requirements. | |
06: NAT for IPv4 | Configure NAT services on the edge router to provide IPv4 address scalability. | |
NAT Characteristics | Explain the purpose and function of NAT. | |
Types of NAT | Explain the operation of different types of NAT. | |
NAT Advantages | Describe the advantages and disadvantages of NAT. | |
Configure Static NAT | Configure static NAT using the CLI. | |
Configure Dynamic NAT | Configure dynamic NAT using the CLI. | |
Configure PAT | Configure PAT using the CLI. | |
NAT64 | Describe NAT for IPv6. | |
07: WAN Concepts | Explain how WAN access technologies can be used to satisfy business requirements. | |
Purpose of WANs | Explain the purpose of a WAN. | |
WAN Operations | Explain how WANs operate. | |
Traditional WAN Connectivity | Compare traditional WAN connectivity options. | |
Modern WAN Connectivity | Compare modern WAN connectivity options. | |
Internet-Based Connectivity | Compare internet-based WAN connectivity options. | |
08: VPN and IPsec Concepts | Explain how VPNs and IPsec secure site-to-site and remote access connectivity. | |
VPN Technology | Describe benefits of VPN technology. | |
Types of VPNs | Describe different types of VPNs | |
IPsec | Explain how the IPsec framework is used to secure network traffic. | |
09: QoS Concepts | Explain how networking devices implement QoS. | |
Network Transmission Quality | Explain how network transmission characteristics impact quality. | |
Traffic Characteristics | Describe minimum network requirements for voice, video, and data traffic. | |
Queuing Algorithms | Describe the queuing algorithms used by networking devices. | |
QoS Models | Describe the different QoS models. | |
QoS Implementation Techniques | Explain how QoS uses mechanisms to ensure transmission quality. | |
10: Network Management | Implement protocols to manage the network. | |
Device Discovery with CDP | Use CDP to map a network topology. | |
Device Discovery with LLDP | Use LLDP to map a network topology. | |
NTP | Implement NTP between an NTP client and NTP server. | |
SNMP | Explain SNMP operation. | |
Syslog | Explain syslog operation. | |
Router and Switch File Maintenance | Router and Switch File Maintenance | |
IOS Image Management | Perform an upgrade of an IOS system image. | |
11: Network Design | Explain the characteristics of scalable network architectures. | |
Hierarchical Networks | Explain how data, voice, and video are converged in a switched network. | |
Scalable Networks | Explain considerations for designing a scalable network. | |
Switch Hardware | Explain how switch hardware features support network requirements. | |
Router Hardware | Describe the types of routers available for small to-mediumsized business networks. | |
12: Network Troubleshooting | Troubleshoot enterprise networks. | |
Network Documentation | Explain how network documentation is developed and used to troubleshoot network issues. | |
Troubleshooting Process | Compare troubleshooting methods that use a systematic, layered approach. | |
Troubleshooting Tools | Describe different networking troubleshooting tools. | |
Symptoms and Causes of Network Problems | Determine the symptoms and causes of network problems using a layered model. | |
Troubleshooting IP Connectivity | Troubleshoot a network using the layered model. | |
13: Network Virtualization | Explain the purpose and characteristics of network virtualization. | |
Cloud Computing | Explain the importance of cloud computing. | |
Virtualization | Explain the importance of virtualization. | |
Virtual Network Infrastructure | Describe the virtualization of network devices and services. | |
Software-Defined Networking | Describe software-defined networking. | |
Controllers | Describe controllers used in network programming. | |
14: Network Automation | Explain how network automation is enabled through RESTful APIs and configuration management tools. | |
Automation Overview | Describe automation. | |
Data Formats | Compare JSON, YAML, and XML data formats. | |
APIs | Explain how APIs enable computer to computer communications. | |
REST | Explain how REST enables computer to computer communications. | |
Configuration Management | Compare the configuration management tools Puppet, Chef, Ansible, and SaltStack | |
IBN and Cisco DNA Center | Explain how Cisco DNA center enables intent-based networking. |
BACK< Cisco CCNA2v7: Switching, Routing and Wireless Essentials