✆ (855)77/87-616102
delicious
facebook
email
  • Home
  • Courses
    • Upcoming Courses
  • Partners
  • Contact Us
    • Why with us?
    • About Us

Cisco CCNA3v7: Enterprise Networking, Security and Automation

January 18, 2022
by admin
CCNA, CCNA3, CCNAv7, Cisco
Comments are off

Prerequisites

Students are required to have successfully completed both the Introduction to Networks (ITN) and the Switching, Routing and Wireless Essentials (SRWE) courses prior to beginning this course. Learners are also expected to have the following skills:
• High school reading level.
• Basic computer literacy
• Basic PC operating system navigation skills
• Basic internet usage skills

CCNAv7 Enterprise Networking, Security, and Automation (ENSA) Outline

The third course in the CCNAv7 curriculum describes the architectures and considerations related to designing, securing, operating, and troubleshooting enterprise networks. This course covers wide area network (WAN) technologies and quality of service (QoS) mechanisms used for secure remote access. ENSA also introduces software-defined networking, virtualization, and automation concepts that support the digitalization of networks. Students gain skills to configure and troubleshoot enterprise networks, and learn to identify and protect against cybersecurity threats. They are introduced to network management tools and learn key concepts of software-defined networking, including controller-based architectures and how application programming interfaces (APIs) enable network automation.

Listed below are the current set of modules and their associated competencies outlined for this course. Each module is an integrated unit of learning that consists of content, activities and assessments that target a specific set of competencies. The size of the module will depend on the depth of knowledge and skill needed to master the competency. Some modules are considered foundational, in that the artifacts presented, while not assessed, enable learning of concepts that are covered on the CCNA certification exam.

Course Outline

ModuleTopic Objective
01: Single-Area OSPFv2 ConceptsExplain how single-area OSPF operates in both point-to-point and broadcast multiaccess networks.
OSPF Features and CharacteristicsDescribe basic OSPF features and characteristics.
OSPF PacketsDescribe the OSPF packet types used in single-area OSPF.
OSPF OperationExplain how single-area OSPF operates.
02: Single-Area OSPFv2
Configuration
Implement single-area OSPFv2 in both point-to-point and broadcast multiaccess networks.
OSPF Router IDConfigure an OSPFv2 router ID.
Point-to-Point OSPF NetworksConfigure single-area OSPFv2 in a point-to-point network.
Multiaccess OSPF NetworksConfigure the OSPF interface priority to influence the DR/BDR election in a multiaccess network.
Modify Single-Area OSPFv2Implement modifications to change the operation of singlearea OSPFv2.
Default Route PropagationConfigure OSPF to propagate a default route.
Verify Single-Area OSPFv2Verify a single-area OSPFv2 implementation.
03: Network Security
Concepts
Explain how vulnerabilities, threats, and exploits can be mitigated to enhance network security.
Current State of CybersecurityDescribe the current state of cybersecurity and vectors of data loss.
Threat ActorsDescribe the threat actors who exploit networks.
Threat Actor ToolsDescribe tools used by threat actors to exploit networks.
MalwareDescribe malware types.
Common Network AttacksDescribe common network attacks.
IP Vulnerabilities and ThreatsExplain how IP vulnerabilities are exploited by threat actors.
TCP and UDP VulnerabilitiesExplain how TCP and UDP vulnerabilities are exploited by threat actors.
IP ServicesExplain how IP services are exploited by threat actors.
Network Security Best
Practices
Describe best practices for protecting a network.
CryptographyDescribe common cryptographic processes used to protect data in transit.
04: ACL ConceptsExplain how ACLs are used as part of a network security
policy.
Purpose of ACLsExplain how ACLs filter traffic.
Wildcard Masks in ACLsExplain how ACLs use wildcard masks.
Guidelines for ACL CreationExplain how to create ACLs.
Types of IPv4 ACLsCompare standard and extended IPv4 ACLs.
05: ACLs for IPv4
Configuration
Implement IPv4 ACLs to filter traffic and secure administrative access.
Configure Standard IPv4 ACLsConfigure standard IPv4 ACLs to filter traffic to meet networking requirements.
Modify IPv4 ACLsUse sequence numbers to edit existing standard IPv4 ACLs.
Secure VTY Ports with a
Standard IPv4 ACL
Configure a standard ACL to secure vty access.
Configure Extended IPv4 ACLsConfigure extended IPv4 ACLs to filter traffic according to
networking requirements.
06: NAT for IPv4Configure NAT services on the edge router to provide IPv4
address scalability.
NAT CharacteristicsExplain the purpose and function of NAT.
Types of NATExplain the operation of different types of NAT.
NAT AdvantagesDescribe the advantages and disadvantages of NAT.
Configure Static NATConfigure static NAT using the CLI.
Configure Dynamic NATConfigure dynamic NAT using the CLI.
Configure PATConfigure PAT using the CLI.
NAT64Describe NAT for IPv6.
07: WAN ConceptsExplain how WAN access technologies can be used to
satisfy business requirements.
Purpose of WANsExplain the purpose of a WAN.
WAN OperationsExplain how WANs operate.
Traditional WAN ConnectivityCompare traditional WAN connectivity options.
Modern WAN ConnectivityCompare modern WAN connectivity options.
Internet-Based ConnectivityCompare internet-based WAN connectivity options.
08: VPN and IPsec
Concepts
Explain how VPNs and IPsec secure site-to-site and remote
access connectivity.
VPN TechnologyDescribe benefits of VPN technology.
Types of VPNsDescribe different types of VPNs
IPsecExplain how the IPsec framework is used to secure network
traffic.
09: QoS ConceptsExplain how networking devices implement QoS.
Network Transmission QualityExplain how network transmission characteristics impact quality.
Traffic CharacteristicsDescribe minimum network requirements for voice, video, and data traffic.
Queuing AlgorithmsDescribe the queuing algorithms used by networking devices.
QoS ModelsDescribe the different QoS models.
QoS Implementation TechniquesExplain how QoS uses mechanisms to ensure transmission quality.
10: Network
Management
Implement protocols to manage the network.
Device Discovery with CDPUse CDP to map a network topology.
Device Discovery with LLDPUse LLDP to map a network topology.
NTPImplement NTP between an NTP client and NTP server.
SNMPExplain SNMP operation.
SyslogExplain syslog operation.
Router and Switch File
Maintenance
Router and Switch File
Maintenance
IOS Image ManagementPerform an upgrade of an IOS system image.
11: Network DesignExplain the characteristics of scalable network
architectures.
Hierarchical NetworksExplain how data, voice, and video are converged in a
switched network.
Scalable NetworksExplain considerations for designing a scalable network.
Switch HardwareExplain how switch hardware features support network
requirements.
Router HardwareDescribe the types of routers available for small to-mediumsized
business networks.
12: Network
Troubleshooting
Troubleshoot enterprise networks.
Network DocumentationExplain how network documentation is developed and used
to troubleshoot network issues.
Troubleshooting ProcessCompare troubleshooting methods that use a systematic,
layered approach.
Troubleshooting ToolsDescribe different networking troubleshooting tools.
Symptoms and Causes of
Network Problems
Determine the symptoms and causes of network problems
using a layered model.
Troubleshooting IP ConnectivityTroubleshoot a network using the layered model.
13: Network
Virtualization
Explain the purpose and characteristics of network virtualization.
Cloud ComputingExplain the importance of cloud computing.
VirtualizationExplain the importance of virtualization.
Virtual Network
Infrastructure
Describe the virtualization of network devices and services.
Software-Defined
Networking
Describe software-defined networking.
ControllersDescribe controllers used in network programming.
14: Network
Automation
Explain how network automation is enabled through RESTful APIs and configuration management tools.
Automation OverviewDescribe automation.
Data FormatsCompare JSON, YAML, and XML data formats.
APIsExplain how APIs enable computer to computer communications.
RESTExplain how REST enables computer to computer communications.
Configuration
Management
Compare the configuration management tools Puppet, Chef, Ansible, and SaltStack
IBN and Cisco DNA
Center
Explain how Cisco DNA center enables intent-based networking.

BACK< Cisco CCNA2v7: Switching, Routing and Wireless Essentials

Social Share
Other Courses
  • Upcoming Courses
  • IT Essentials
  • Cisco CCNAv7
  • Cisco CCNA1v7
  • Cisco CCNA2v7
  • Cisco CCNA3v7
  • Introduction to Cybersecurity
  • Cybersecurity Essentials
  • CyberOps Associate
  • Network Security
  • Cloud Security
  • MikroTik MTCNA
  • INE
  • VoIP and PABX
  • CCNA Exam Preparation

PPIC is qualified IT Training Center that authorized to teach Cisco and MikroTik courses in Phnom Penh, Cambodia.

Address: #194D, Russian Federation Blvd, CPC, Toeuk Thlar, Sen Sok, Phnom Penh, Cambodia.

  • Why with us?
  • Upcoming Courses
  • Contact Us
Facebook Pagelike Widget
https://t.me/ppictraining Our Telegram Channel
✆ (855)77-616102 ✆ (855)87-616102 ✉ info@ppic-training.com
© Copyright 2022, PPIC