Cisco CCNA CCNP CCIE Training

Cisco CCNA CCNP CCIE Training The CCNA v3 certification training includes both Interconnecting Cisco Networking Devices, Part 1 (ICND1) and Interconnecting Cisco Networking Devices, Part 2 (ICND2) courses merged into one. Participants in this CCNA course will learn to install, configure, operate, and manage basic IPv4 / IPv6 networks. SMEClabs provide the best Cisco CCNA CCNP CCIE Training with the help of well experianced faculties.This CCNA bootcamp on Routing & Switching course also imparts skills to configure a LAN switch and IP router, connect to WAN, and find security threats. This CCNA training will cover in detail topics related to troubleshooting in enterprise networks and prepare candidates for the real world once they complete their CCNA certification Cisco CCNA CCNP CCIE Training


Cisco Certified Network Associate Routing & Switching

CCNA Security

Cisco Certified Network Associate Routing & Switching Security


Cisco Certified Network Professional Routing and Switching

CCNA (R&S) Training syllabus

Introduction to Networking

  • Introduction to Networking
  • Network types
  • Communication types , Modes & Devices
  • Network topology
  • Network Reference Model (OSI &DoD Model)

LAN Switching Technologies

  • Determine the technology and media access control method for Ethernet networks
  • Identify basic switching concepts and the operation of Cisco switches.
  • Verify network status and switch operation using basic utilities such as ping, telnet & ssh.
  • Identify enhanced switching technologies
  • Describe how VLANs create logically separate networks and the need for routing between Them.
  • Configure and verify trunking on Cisco switches
  • Configure and verify PVSTP operation

IP addressing (IPv4 / IPv6)

  • Describe the operation and necessity of using private and public IP addresses for IPv4addressing
  • Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment.
  • Identify the appropriate IPv4 addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment.
  • Describe the technological requirements for running IPv6 in conjunction with IPv4 such as dual stack
  • Describe IPv6 addresses

IP Routing Technologies

  • Describe basic routing concepts
  • Configure and verify operation status of a device interface, both serial and ethernet
  • Verify router configuration and network connectivity
  • Configure and verify routing configuration for a static or default route given specific routing requirements
  • Differentiate methods of routing and routing protocols
  • Configure and verify OSPF (single area)
  • Configure and verify EIGRP (single AS)
  • Configure and verify interVLAN routing (Router on a stick)

IP Services

  • Configure and verify DHCP (IOS Router)
  • Identify the basic operation of NAT
  • Configure and verify NAT for given network requirements
  • Configure and verify NTP as a client
  • Recognize High availability (FHRP)
  • Configure and verify Syslog
  • Describe SNMP v2 & v3

Network Device Security

  • Configure and verify network device security features such as
  • Configure and verify Switch Port Security features
  • Describe the types, features, and applications of ACLs
  • Configure and verify ACLs to filter network traffic


  • Identify and correct common network problems
  • Troubleshoot and correct common problems associated with IP addressing and host configurations.
  • Troubleshoot and Resolve VLAN problems
  • Troubleshoot and Resolve trunking problems on Cisco switches
  • Troubleshoot and Resolve OSPF problems
  • Troubleshoot and Resolve EIGRP problems
  • Troubleshoot and Resolve interVLAN routing problems
  • Troubleshoot and Resolve ACL issues
  • Troubleshoot and Resolve WAN implementation issues
  • Troubleshoot etherchannel problems

WAN Technologies

  • Identify different WAN Technologies
  • Metro Ethernet
  • VSAT
  • Cellular 3G / 4G
  • MPLS
  • ISDN
  • VPN
  • Configure and verify a basic WAN serial connection
  • Configure and verify a PPP connection between Cisco routers
  • Configure and verify Frame Relay on Cisco routers
  • Implement and troubleshoot PPPoE

Cisco Certified Network Associate Security (CCNA Security) Syllabus

Common security principles

  • Describe confidentiality, integrity, availability (CIA)
  • Describe SIEM technology
  • Identify common security terms
  • Identify common network security zones

Common security threats

  • Identify common network attacks
  • Describe social engineering
  • Identify malware
  • Classify the vectors of data loss/exfiltration

Cryptography concepts

  • Describe key exchange
  • Describe hash algorithm
  • Compare and contrast symmetric and asymmetric encryption
  • Describe digital signatures, certificates, and PKI

Describe network topologies

  • Campus area network (CAN)
  • Cloud, wide area network (WAN)
  • Data center
  • Small office/home office (SOHO)
  • Network security for a virtual environment

Secure management

  • Compare in-band and out-of band
  • Configure secure network management
  • Configure and verify secure access through SNMP v3 using an ACL
  • Configure and verify security for NTP
  • Use SCP for file transfer


  • Describe RADIUS and TACACS+ technologies
  • Configure administrative access on a Cisco router using TACACS+
  • Verify connectivity on a Cisco router to a TACACS+ server
  • Explain the integration of Active Directory with AAA
  • Describe authentication and authorization using ACS and ISE

802.1X authentication

  • Identify the functions 802.1X components


  • Describe the BYOD architecture framework
  • Describe the function of mobile device management (MDM)

VPN concepts

  • Describe IPsec protocols and delivery modes (IKE, ESP, AH, tunnel mode, transport mode)
  • Describe hairpinning, split tunneling, always-on, NAT traversal

Remote access VPN

  • Implement basic clientless SSL VPN using ASDM
  • Verify clientless connection
  • Implement basic AnyConnect SSL VPN using ASDM
  • Verify AnyConnect connection
  • Identify endpoint posture assessment

Site-to-site VPN

  • Implement an IPsec site-to-site VPN with pre-shared key authentication on Cisco routers and ASA firewalls
  • Verify an IPsec site-to-site VPN

Security on Cisco routers

  • Configure multiple privilege levels
  • Configure Cisco IOS role-based CLI access
  • Implement Cisco IOS resilient configuration

Securing routing protocols

  • Implement routing update authentication on OSPF
  • Securing the control plane
  • Explain the function of control plane policing
  • Common Layer 2 attacks

Describe STP attacks

  • Describe ARP spoofing
  • Describe MAC spoofing
  • Describe CAM table (MAC address table) overflows
  • Describe CDP/LLDP reconnaissance
  • Describe VLAN hopping
  • Describe DHCP spoofing

Mitigation procedures

  • Implement DHCP snooping
  • Implement Dynamic ARP Inspection
  • Implement port security
  • Describe BPDU guard, root guard, loop guard
  • Verify mitigation procedures

VLAN security

  • Describe the security implications of a PVLAN
  • Describe the security implications of a native VLAN

Compare stateful vs. stateless firewalls

  • Operations
  • Function of the state table
  • Implement NAT on Cisco ASA 9.x
  • Static
  • Dynamic
  • PAT
  • Policy NAT
  • Verify NAT operations

Implement zone-based firewall

  • Zone to zone
  • Self zone

Firewall features on the Cisco Adaptive Security Appliance (ASA) 9.x

  • Configure ASA access management
  • Configure security access policies
  • Configure Cisco ASA interface security levels
  • Configure default Cisco Modular Policy Framework (MPF)
  • Describe modes of deployment (routed firewall, transparent firewall)
  • Describe methods of implementing high availability
  • Describe security contexts
  • Describe firewall services

Describe IPS deployment considerations

  • Network-based IPS vs. host-based IPS
  • Modes of deployment (inline, promiscuous – SPAN, tap)
  • Placement (positioning of the IPS within the network)
  • False positives, false negatives, true positives, true negatives
  • Describe IPS technologies
  • Rules/signatures
  • Detection/signature engines
  • Trigger actions/responses (drop, reset, block, alert, monitor/log, shun)
  • Blacklist (static and dynamic)
  • Describe mitigation technology for email-based threats
  • SPAM filtering, anti-malware filtering, DLP, blacklisting, email encryption
  • Describe mitigation technology for web-based threats
  • Local and cloud-based web proxies
  • Blacklisting, URL filtering, malware scanning, URL categorization, web application filtering, TLS/SSL decryption
  • Describe mitigation technology for endpoint threats
  • Anti-virus/anti-malware
  • Personal firewall/HIPS
  • Hardware/software encryption of local data

Cisco Certified Network Professional (CCNP) Routing and Switching training syllabus

Network Fundamentals

  • Compare and contrast OSI and TCP/IP models
  • Compare and contrast TCP and UDP protocols
  • Describe the impact of infrastructure components in an enterprise network
  • Firewalls
  • Access points
  • Wireless controllers

Describe the effects of cloud resources on enterprise network architecture

  • Traffic path to internal and external cloud services
  • Virtual services
  • Basic virtual network infrastructure

Compare and contrast collapsed core and three-tier architectures

  • Compare and contrast network topologies
  • Star
  • Mesh
  • Hybrid

Select the appropriate cabling type based on implementation requirements

  • Apply troubleshooting methodologies to resolve problems
  • Perform and document fault isolation
  • Resolve or escalate
  • Verify and monitor resolution

Configure, verify, and troubleshoot IPv4 addressing and subnetting

  • Compare and contrast IPv4 address types
  • Unicast
  • Broadcast
  • Multicast

Describe the need for private IPv4 addressing

  • Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment
  • Configure, verify, and troubleshoot IPv6 addressing
  • Configure and verify IPv6 Stateless Address Auto Configuration
  • Compare and contrast IPv6 address types
  • Global unicast
  • Unique local
  • Link local
  • Multicast
  • Modified EUI 64
  • Autoconfiguration
  • Anycast

LAN Switching Technologies

  • Describe and verify switching concepts
  • MAC learning and aging
  • Frame switching
  • Frame flooding
  • MAC address table
  • Interpret Ethernet frame format
  • Troubleshoot interface and cable issues (collisions, errors, duplex, speed)
  • Configure, verify, and troubleshoot VLANs (normal/extended range) spanning multiple switches
  • Access ports (data and voice)
  • Default VLAN

Configure, verify, and troubleshoot interswitch connectivity

  • Trunk ports
  • Add and remove VLANs on a trunk
  • DTP, VTP (v1&v2), and 802.1Q
  • Native VLAN

Configure, verify, and troubleshoot STP protocols

  • STP mode (PVST+ and RPVST+)
  • STP root bridge selection

Configure and verify Layer 2 protocols

  • Cisco Discovery Protocol
  • LLDP

Configure, verify, and troubleshoot (Layer 2/Layer 3) EtherChannel

  • Static
  • PAGP
  • LACP
  • Describe the benefits of switch stacking and chassis aggregation

Routing Technologies

  • Describe the routing concepts
  • Packet handling along the path through a network
  • Forwarding decision based on route lookup
  • Frame rewrite

Interpret the components of a routing table

  • Prefix
  • Network mask
  • Next hop
  • Routing protocol code
  • Administrative distance
  • Metric
  • Gateway of last resort
  • Describe how a routing table is populated by different routing information sources
  • Admin distance

Configure, verify, and troubleshoot inter-VLAN routing

  • Router on a stick
  • SVI
  • Compare and contrast static routing and dynamic routing
  • Compare and contrast distance vector and link state routing protocols
  • Compare and contrast interior and exterior routing protocols

Configure, verify, and troubleshoot IPv4 and IPv6 static routing

  • Default route
  • Network route
  • Host route
  • Floating static

Configure, verify, and troubleshoot

  • Configure, verify, and troubleshoot single area and multi-area OSPFv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)
  • Configure, verify, and troubleshoot single area and multi-area OSPFv3 for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)
  • Configure, verify, and troubleshoot EIGRP for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub)
  • Configure, verify, and troubleshoot EIGRP for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub)
  • Configure, verify, and troubleshoot RIPv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution)
  • Troubleshoot basic Layer 3 end-to-end connectivity issues

WAN Technologies

  • Configure and verify PPP and MLPPP on WAN interfaces using local authentication
  • Configure, verify, and troubleshoot PPPoE client-side interfaces using local authentication
  • Configure, verify, and troubleshoot GRE tunnel connectivity
  • Describe WAN topology options
  • Point-to-point
  • Hub and spoke
  • Full mesh
  • Single vs dual-homed

Describe WAN access connectivity options

  • MPLS
  • Metro Ethernet
  • Broadband PPPoE
  • Internet VPN (DMVPN, site-to-site VPN, client VPN)
  • Configure and verify single-homed branch connectivity using eBGP IPv4 (limited to peering and route advertisement using Network command only)
  • Describe basic QoS concepts
  • Marking
  • Device trust
  • Prioritization
  • Voice
  • Video
  • Data
  • Shaping
  • Policing
  • Congestion management

Infrastructure Services

  • Describe DNS lookup operation
  • Troubleshoot client connectivity issues involving DNS
  • Configure and verify DHCP on a router (excluding static reservations)
  • Server
  • Relay
  • Client
  • TFTP, DNS, and gateway options

Troubleshoot client- and router-based DHCP connectivity issues

  • Configure, verify, and troubleshoot basic HSRP
  • Priority
  • Preemption
  • Version

Configure, verify, and troubleshoot inside source NAT

  • Static
  • Pool
  • PAT
  • Configure and verify NTP operating in a client/server mode

Infrastructure Security

  • Configure, verify, and troubleshoot port security
  • Static
  • Dynamic
  • Sticky
  • Max MAC addresses
  • Violation actions
  • Err-disable recovery

Describe common access layer threat mitigation techniques

  • 1x
  • DHCP snooping
  • Nondefault native VLAN
  • Configure, verify, and troubleshoot IPv4 and IPv6 access list for traffic filtering
  • Standard
  • Extended
  • Named
  • Verify ACLs using the APIC-EM Path Trace ACL analysis tool

Configure, verify, and troubleshoot basic device hardening

  • Local authentication
  • Secure password
  • Access to device
  • Source address
  • Telnet/SSH
  • Login banner
  • Describe device security using AAA with TACACS+ and RADIUS

Infrastructure Management

  • Configure and verify device-monitoring protocols
  • SNMPv2
  • SNMPv3
  • Syslog
  • Troubleshoot network connectivity issues using ICMP echo-based IP SLA
  • Configure and verify device management
  • Backup and restore device configuration
  • Using Cisco Discovery Protocol or LLDP for device discovery
  • Licensing
  • Logging
  • Timezone
  • Loopback

Configure and verify initial device configuration

  • Perform device maintenance
  • Cisco IOS upgrades and recovery (SCP, FTP, TFTP, and MD5 verify)
  • Password recovery and configuration register
  • File system management

Use Cisco IOS tools to troubleshoot and resolve problems

  • Ping and traceroute with extended option
  • Terminal monitor
  • Log events
  • Local SPAN

Describe network programmability in enterprise network architecture

  • Function of a controller
  • Separation of control plane and data plane
  • Northbound and southbound APIs
Are you a Jobseeker, Contact us via Whatsapp, Free Career & UpSkill Consultation.
Powered by