Estimated Length: 42 seat hours
Achieving CCNA certification is the first step in preparing for a career in IT technologies. To earn CCNA certification, you pass one exam that covers a broad range of fundamentals for IT careers, based on the latest networking technologies, software development skills, and job roles.
Through NCTI and its training partner, Sunset Learning Institute, students have several options to prepare for, and/or take the CCNA certification Exam.
To order any of the following products or services, please contact NCTI Customer Care. All prices are listed in US Dollars.
** All prices subject to change **
Implementing and Administering Cisco Solutions (CCNA Preparatory Course-see curriculum details below)
- Individual (Combination of 5 days classroom, 3 days online): $4,195
- 8-Person Bundle (5 days classroom, 3 days online): Please call NCTI Customer Care for pricing
- Custom course experience available for groups, please contact NCTI Customer Care for details
CCNA Self-Paced Bundle (Includes training content, practice exam, Sunset neXT Platform subscription, and Exam Voucher)
- The training content is available for six months from the date you purchase the CCNA Self-Paced Bundle.
- The Sunset neXT Platform is a 12-month subscription which starts from the date you purchase the CCNA Self-Paced Bundle.
- Without Exam Voucher: $1,100
Please Note: You must provide your own laptop for both classroom and online activities.
Overview Of Implementing and Administering Cisco Solutions (CCNA):
The Implementing and Administering Cisco Solutions (CCNA) v1.0 course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture and hands-on labs, you will learn how to install, operate, configure and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network
programmability, automation and software-defined networking.
This class includes lecture sections and some self-study sections. In instructor-led classes, lectures are delivered in real-time, either in person or via video conferencing. In e-learning classes, the lectures are pre-recorded videos. For classroom/online hybrid course (5 days classroom, 3 days online):
- Please contact NCTI Customer Care for available dates, locations and times.
- You must provide your own laptop for both classroom and online activities.
The estimated completion time for this course is 42 hours
Upon completing this course, students will be able to:
- describe network fundamentals and build simple LANs
- identify the components of a computer network and describe their basic characteristics
- understand the model of host-to-host communication
- describe the features and functions of the Cisco Internetwork Operating System (IOS®) software
- describe LANs and the role of switches within LANs
- describe Ethernet as the network access layer of TCP/IP and describe the operation of switches
- install a switch and perform the initial configuration
- describe the TCP/IP Internet layer, IPv4, its addressing scheme and subnetting
- describe the TCP/IP Transport layer and Application layer
- explore functions of routing
- implement basic configuration on a Cisco router
- explain host-to-host communications across switches and routers
- identify and resolve common switched network issues and common problems associated with IPv4 addressing
- describe IPv6 main features and addresses and configure and verify basic IPv6 connectivity
- describe the operation, benefits and limitations of static routing
- describe, implement and verify virtual local area networks (VLANs) and trunks
- describe the application and configuration of inter-VLAN routing
- explain the basics of dynamic routing protocols and describe components and terms of Open Shortest Path First (OSPF)
- explain how Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP) work
- configure link aggregation using EtherChannel
- describe the purpose of Layer 3 redundancy protocols
- describe basic WAN and VPN concepts
- describe the operation of access control lists (ACLs) and their applications in the network
- configure Internet access using Dynamic Host Configuration Protocol (DHCP) clients and explain and configure network address translation (NAT) on Cisco routers
- describe basic quality of service (QoS) concepts
- describe the concepts of wireless networks, which types of wireless networks can be built and how to use Wireless LAN Controllers (WLCs)
- describe network and device architectures and introduce virtualization
- introduce the concept of network programmability and Software-Defined Networking (SDN) and describe smart network management solutions such as Cisco DNA Center™, Software-Defined Access (SD-Access) and Software- Defined Wide Area Network (SD-WAN)
- configure basic IOS system monitoring tools
- describe the management of Cisco devices
- describe the current security threat landscape
- describe threat defense technologies
- implement a basic security configuration of the device management plane
- implement basic steps to harden network devices
Exploring the functions of networking; Introducing the Host-to-Host Communications Model; Operating Cisco IOS Software; Introducing LANs; Exploring the TCP/IP Link Layer; Starting a Switch; Introducing the TCP/IP Internet Layer, IPv4 Addressing and Subnets; Explaining the TCP/IP Transport Layer and Application Layer; Exploring the Functions of Routing; Configuring a Cisco Router; Exploring the Packet Delivery Process; Troubleshooting a Simple Network; Introducing Basic IPv6; Configuring Static Routing; Implementing VLANs and Trunks; Routing Between VLANs; Introducing OSPF; Improving Redundant Switched Topologies with EtherChannel; Explaining Basics of ACL; Enabling Internet Connectivity; Explaining the Evolution of Intelligent Networks; Introducing System Monitoring; Managing Cisco Devices; Securing Administrative Access; Implementing Device Hardening
Building Redundant Switched Topologies; Exploring Layer 3 Redundancy; Introducing WAN Technologies; Introducing QoS; Explaining Wireless Fundamentals; Introducing Architectures and Virtualization; Examining the Security Threat Landscape; Implementing Threat Defense Technologies
Get Started with Cisco Command-Line Interface (CLI); Observe How a Switch Operates; Perform Basic Switch Configuration; Implement the Initial Switch Configuration; Inspect TCP/IP Applications; Configure an Interface on a Cisco Router; Configure and Verify Layer 2 Discovery Protocols; Implement an Initial Router Configuration; Configure Default Gateway; Explore Packet Forwarding; Troubleshoot Switch Media and Port Issues; Troubleshoot Port Duplex Issues; Configure Basic IPv6 Connectivity; Configure and Verify IPv4 Static Routes; Configure IPv6 Static Routes; Implement IPv4 Static Routing; Implement IPv6 Static Routing; Configure VLANs and Trunks; Troubleshoot VLANs and Trunks; Configure a Router on a Stick; Implement Multiple VLANs and Basic Routing Between the VLANs; Configure and Verify Single-Area OSPF; Configure and Verify EtherChannel; Improve Redundant Switched Topologies with EtherChannel; Configure and Verify IPv4 ACLs; Implement Numbered and Named IPv4 ACLs; Configure a Provider-Assigned IPv4 Address; Configure Static NAT; Configure Dynamic NAT and Port Address Translation (PAT); Implement PAT; Log into the WLC; Monitor the WLC; Configure a Dynamic (VLAN) Interface; Configure a DHCP Scope; Configure a WLAN; Define a Remote Access Dial-In User Service (RADIUS) Server; Explore Management Options; Explore the Cisco DNA™ Center; Configure and Verify NTP; Configure System Message Logging; Create the Cisco IOS Image Backup; Upgrade Cisco IOS Image; Configure WLAN Using Wi-Fi Protected Access 2 (WPA2) Pre-shared Key (PSK) Using the GUI; Secure Console and Remote Access; Enable and Limit Remote Access Connectivity; Secure Device Administrative Access; Configure and Verify Port Security; Implement Device Hardening; Examining the Security Threat Landscape; Implementing Threat Defense Technologies