Exploring the Functions of NetworkingWhat is a Computer Network?
Common Usage of a Computer Network
Components of a Network
Characteristics of a Network
Physical vs. Logical Topologies
Interpreting a Network Diagram
Impact of User Applications on the Network
Introducing the Host-To-Host Communications Model
Host-To-Host Communications Overview
ISO OSI Reference Model
TCP/IP Protocol Suite
Peer-To-Peer Communications
Encapsulation and De-Encapsulation
TCP/IP Stack vs OSI Reference Model
Operating Cisco IOS Software
Introducing LANs
Exploring the TCP/IP Link Layer
Starting a Switch
Switch Installation
Connecting to a Console Port
Switch Components
Switch LED Indicators
Basic show Commands and Information
Implement the Initial Switch Configuration
Introducing the TCP/IP Internet Layer, IPv4 Addressing, and Subnets
Internet Protocol
Decimal and Binary Number Systems
Binary-to-Decimal Conversion
Decimal-to-Binary Conversion
IPv4 Address Representation
IPv4 Header Fields
IPv4 Address Classes
Subnet Masks
Subnets
Implementing Subnetting: Borrowing Bits
Implementing Subnetting: Determining the Addressing Scheme
Benefits of VLSM and Implementing VLSM
Private vs. Public IPv4 Addresses
Reserved IPv4 Addresses
Verifying IPv4 Address of a Host
Explaining the TCP/IP Transport Layer and Application Layer
Exploring the Functions of Routing
Configuring a Cisco Router
Initial Router Setup
Configuring Router Interfaces
Configuring IPv4 Addresses on Router Interfaces
Checking Interface Configuration and Status
Exploring Connected Devices
Using Cisco Discovery Protocol
Configure and Verify LLDP
Implement an Initial Router Configuration
Exploring the Packet Delivery Process
Troubleshooting a Simple Network
Troubleshooting Methods
Troubleshooting Tools
Troubleshooting Common Switch Media Issues
Troubleshooting Common Switch Port Issues
Troubleshooting Common Problems Associated with IPv4 Addressing
Introducing Basic IPv6
IPv4 Address Exhaustion Workarounds
IPv6 Features
IPv6 Addresses and Address Types
Comparison of IPv4 and IPv6 Headers
Internet Control Message Protocol Version 6
Neighbor Discovery
IPv6 Address Allocation
Verification of End-To-End IPv6 Connectivity
Configuring Static Routing
Routing Operation
Static and Dynamic Routing Comparison
When to Use Static Routing
IPv4 Static Route Configuration
Default Routes
Verifying Static and Default Route Configuration
IPv6 Static Route Configuration
Implement IPv4 Static Routing
Implement IPv6 Static Routing
Implementing VLANs and Trunks
VLAN Introduction
Creating a VLAN
Assigning a Port to a VLAN
Trunking with 802.1Q
Configuring an 802.1Q Trunk
VLAN Design Considerations
Troubleshoot VLANS and Trunks
Routing Between VLANs
Purpose of Inter-VLAN Routing
Options for Inter-VLAN Routing
Implement Multiple VLANS and Basic Routing Between the VLANs
Introducing OSPF
Dynamic Routing Protocols
Path Selection
Link-State Routing Protocol Overview
Link-State Routing Protocol Data Structures
Introducing OSPF
Establishing OSPF Neighbor Adjacencies
OSPF Neighbor States
SPF Algorithm
Building a Link-State Database
Routing for IPv6
Building Redundant Switched Topologies
Physical Redundancy in a LAN
Issues in Redundant Topologies
Spanning Tree Operation
Types of Spanning Tree Protocols
PortFast, BPDU Guard and BPDU Filter
Rapid Spanning Tree Protocol
STP Loop Guard
STP Root Guard
Improving Redundant Switched Topologies with EtherChannel
EtherChannel Overview
EtherChannel Configuration Options
Configuring and Verifying EtherChannel
Improve Redundant Switched Toplogies with EtherChannel
Explaining the Basics of ACL
ACL Overview
ACL Operation
ACL Wildcard Masking
Wildcard Mask Abbreviations
Types of Basic ACLs
Configuring Standard IPv4 ACLs
Configuring Extended IPv4 ACLs
Verifying and Modifying IPv4 ACLs
Applying IPv4 ACLs to Filter Network Traffic
Implement Numbered and Named IPv4 ACLs
Enabling Internet Connectivity
Introducing Network Address Translation
NAT Terminology and Translation Mechanisms
Benefits and Drawbacks of NAT
Static NAT and Port Forwarding
Dynamic NAT
Port Address Translation
Configuring and Verifying Inside IPv4 NAT
Implement PAT
Introducing AL and ML in Network Operations
Introducing System Monitoring
Managing Cisco Devices
Cisco IOS Integrated File System and Devices
Stages of the Router Power-On Boot Sequence
Loading and Managing System Images Files
Loading Cisco IOS Configuration Files
Validating Cisco IOS Images Using MD5/SHA512
Managing Cisco IOS Images and Device Configuration Files
Cisco IOS WebUI
Securing Administrative Access
Network Device Security Overview
Securing Access to Privileged EXEC Mode
Securing Console Access
Securing Remote Access
Configuring the Login Banner
Limiting Remote Access with ACLs
External Authentication Options
Secure Device Administrative Access
Implementing Device Hardening
Exploring Layer 3 Redundancy
Introducing WAN Technologies
Introducing QoS
Converged Networks
QoS Defined
QoS Policy
QoS Mechanisms
QoS Models
Deploying End-to-End QoS
Explaining Wireless Fundamentals
Introducing Architectures and Virtualization
Introduction to Network Design
Enterprise Three-Tier Hierarchical Network Design
Spine - Leaf Network Design
Cisco Enterprise Architecture Model
Underlay and Overlay Network Concepts
Cloud Computing Overview
Network Device Architecture
Virtualization Fundamentals
Explaining Software-Defined Networking
Software-Defined Networking
Traditional versus Software-Defined Networks
Software-Defined Network Layers
Introducing Cisco Catalyst Center
Cisco Catalyst Center Dashboard and Tools
Introducing Cisco SD-Access
Introducing Cisco Catalyst SD-WAN
Introducing Cisco Meraki
Introducing Network Programmability
Traditional Network Management
Network Automation and Programmability
Network Automation Use Cases
Model-Driven Programmability
Data Encoding Formats
JavaScript Object Notation
Extensible Markup Language
YAML Data Serialization Standard
Network Management Protocols
Configuration Management Tools Overview
Ansible
Terraform
Examining the Security Threat Landscape
Security Threat Landscape Overview
Malware
Hacking Tools
DoS and DDoS
Spoofing
Reflection and Amplification Attacks
Social Engineering
Evolution of Phishing
Password Attacks
Reconnaissance Attacks
Buffer Overflow Attacks
Man-in-the-Middle Attacks
Vectors of Data Loss and Exfiltration
Other Considerations
Implementing Threat Defense Technologies
Information Security Overview
Firewalls
Intrusion Preventions Systems
Protection Against Data Loss and Phishing Attacks
Defending against DoS and DDoS Attacks
Introduction to Cryptographic Technologies
IPsec Security Services
Secure Sockets Layer and Transport Layer Security
Wireless Security Protocols