Module 1:

➢Explaining the roles and functions of components like routers, switches,
access points, servers, endpoints, firewalls, IPS, and controllers

➢Describing the properties of network architecture including 2-tier, 3-tier,
spine-leaf, WAN, SOHO, cloud and on-premises topology

➢Comparing types of cables – copper, single-mode, fibre, multimode fibre,
etc. Physical interface comparison with respect to point-to-point and
ethernet shared media connections. PoE Concepts are also discussed in
this chapter

➢Identifying interface and cable problems such as errors, collisions, speed,
and mismatch duplex

➢Comparing UDP to TCP

➢ Configuring and verifying IPv4 addresses and subnetting

➢ Demonstrating the importance of private IPv4 address

➢ Configuring and verifying of IPv6 prefix and address

➢ Comparing IPv6 address types, including link local, unique local, global
unicast, anycast, multicast, modified EUI 64

➢ Describing wireless principles including WIFI channels (non-overlapping),
SSID, RF, and encryption

➢ Explaining virtual machines

➢ Describing switching concepts, frame switching, frame flooding, MAC
learning, ageing, and MAC address table

 

Module 2:

➢VLAN verification and configuration comprising multiple switches, including details on default VLAN, connectivity, and access ports

➢Verifying and configuring inter switch connectivity with respect to native VLAN, 802.1Q, and trunk ports

➢LLDP and Cisco Discovery Protocol’s configuration and verification

➢LACP and Layer2/3 configuration and verification

➢Explaining the requirement of Rapid PVST’s basic operations and spanning tree protocol, and understanding basic operations with respect to port states, root port, primary and secondary root bridge, and associated port names. The need for PortFast benefits and port states, i.e., forwarding and blocking is also explained

➢Comparing of AP modes and wireless architecture of Cisco

➢Explaining WLAN components LAG, AP, WLC, and trunk and access ports

➢Describing AP and access connections such as HTTPS, HTTP, Telnet, SSH, and console

➢Configuring WLAN access for client connectivity through WLAN creation, OoS profiles, advanced WLAN configuration, and security settings

 

Module 3:

➢Interpreting routing table components including prefix, network mask, routing protocol code, next hop, metric, administrative distance, gateway of last resort

➢Determining the forward decision of a router with respect to routing protocol metric, longest match, and administrative distance

➢Verifying and configuring iPv4 and iPv6 static routing including floating static, host route, network route, and default route

➢Verifying and configuring OSPFv2 with respect to point-to-point, router ID, broadcast, and neighbour adjectives

➢Explaining the need for first hop redundancy protocol

 

Module 4:

➢Configuring and verifying NAT through pools and static

➢Configuring and verifying NTP in a client and server setting

➢Explaining the function of DNS and DHCP

➢Syslog features such as levels and facilities description

➢Configuring and verifying relay and DHCP Client

➢PHB, i.e., per-hop behaviour forwarding for carrying out QoS-like marking, policing, congestion, queuing, classification, and shaping

➢SSH method for configuring network devices

➢Explaining TFTP/FTP capabilities and roles through SSH

 

Module 5:

➢Describing elements related to security programmes through user awareness, physical access control, and training

➢Defining essential security concepts including vulnerabilities, exploits, threats, and mitigation techniques

➢Utilising local passwords for configuring device access control

➢Explaining elements related to security password like management, password alternatives, and complexity

➢Explaining VPNs (site-to-site) and remote access

➢Verifying and configuring access control lists

➢Configuring security features related to layer-2

➢Differentiating concepts related to accounting, authorisation, and authentication

➢Describing WPA, WPA3, and WPA2 wireless security protocols

➢Utilising GUI for configuration of WLAN through WPA2 PSK

 

Module 6:

➢Describing the impact of automation on network management

➢Comparing networks using controller-based networking

➢Describing software defined architectures using underlay, overlay, and fabric and explaining controller-based architecture

➢Utilising Cisco DNA Centre enabled device management for comparing traditional campus device management

➢Explaining properties of Rest-based APIs such as data encoding, CRUD, and HTTP verbs

➢Recognizing the abilities of Ansible, Chef, and Puppet related to configuration management mechanisms

➢Interpreting ISON encoded data