Contenuti dettagliati del Corso
Building Redundant Switched Topologies
Explain how STP and RSTP work.
This lesson includes these topics:
- Physical Redundancy in a LAN:
Describe physical redundancy in LAN - Issues in Redundant Topologies:
Describe problems that may arise in redundant switched topologies - Spanning Tree Operation:
Describe STP operation in the sample topology - Types of Spanning Tree Protocols:
Describe variants of STP and the differences between them - PortFast and BPDU Guard:
Demonstrate why PortFast and BPDU guard are important technologies - Rapid Spanning Tree Protocol:
Describe Rapid Spanning Tree Protocol - Summary Challenge
Exploring Layer 3 Redundancy
Describe the purpose of Layer 3 redundancy protocols.
This lesson includes these topics:
- Need for Default Gateway Redundancy:
Describe routing issues related to default gateway redundancy - Understanding FHRP:
Describe the router redundancy process and what happens when a failover occurs - Understanding HSRP:
Describe the concept of HSRP - Summary Challenge
Introducing WAN Technologies
Describe basic WAN and VPN concepts.
This lesson includes these topics:
- Introduction to WAN Technologies:
Explain WAN technologies characteristics - WAN Devices and Demarcation Point:
Describe WAN devices and their functions in a WAN environment - WAN Topology Options:
Describe WAN topology options - WAN Connectivity Options:
Describe major WAN communication link options - Virtual Private Networks:
Explain VPNs concepts - Enterprise-Managed VPNs:
Describe the characteristics of enterprise-managed VPNs - Provider-Managed VPNs:
Describe the characteristics of provider-managed VPNs - Summary Challenge
Introducing QoS
Describe the basic QoS concepts.
This lesson includes these topics:
- Converged Networks:
Describe quality impact of running different types of traffic over a single network - Quality of Service Defined:
Define the goal of QoS - QoS Policy:
Describe QoS policy basics and explain major steps QoS policy implementation - QoS Mechanisms:
Identify and explain basic groups of QoS mechanisms - QoS Models:
Introduce QoS models and describe DiffServ - Deploying End-to-End QoS:
Describe best-practices for QoS implementation and configuration within the Enterprise Campus - Summary Challenge
Explaining Wireless Fundamentals
Describe the concepts of wireless networks, which types of wireless networks can be built and how to use WLC.
This lesson includes these topics:
- Wireless Technologies:
Discuss the various types of wireless topologies - WLAN Architectures:
Discuss the various types of wireless architectures - WiFi Channels:
Discuss the WiFi channels and the principle of non-overlapping WiFi channels - AP and WLC Management:
Describe AP and WLC management access connections - Discovery 22: Log into the WLC:
Log into the WLC
Topology
Task 1: Log into the WLC - Discovery 23: Monitor the WLC:
Monitor the WLC
Topology
Task 1: Monitor the WLC - Discovery 24: Configure a Dynamic (VLAN) Interface:
Configure a VLAN (dynamic) interface
Topology
Task 1: Configure a VLAN (Dynamic) Interface - Discovery 25: Configure a DHCP Scope:
Configure a DHCP scope
Topology
Task 1: Configure a DHCP Scope - Discovery 26: Configure a WLAN:
Configure a WLAN
Topology
Task 1: Configure a WLAN - Discovery 27: Define a RADIUS Server:
Define a RADIUS server.
Topology
Task 1: Define a RADIUS Server - Discovery 28: Explore Management Options:
Configure the SNMP location for the WLC
Topology
Task 1: Explore Management Options - Summary Challenge
Introducing Architectures and Virtualization
Describe network and device architectures and introduce virtualization.
This lesson includes these topics:
- Introduction to Network Design:
Describe the issues in poorly designed LANs - Enterprise Three-Tier Hierarchical Network Design:
Describe enterprise network design concepts - Spine-Leaf Network Design:
Describe characteristics of spine and leaf architectures - Cisco Enterprise Architecture Model:
Describe enterprise architecture model - Cloud Computing Overview:
Describe the effect of cloud computing on enterprise network - Network Device Architecture:
Describe network device architecture - Virtualization Fundamentals:
Explain the need for virtualization, the concept of a virtual machine, and its components - Summary Challenge
Examining the Security Threat Landscape
Describe the current security threat landscape.
This lesson includes these topics:
- Security Threat Landscape Overview:
Describe the current threat landscape, or threatscape basics - Malware:
Describe malware - Hacking Tools:
Describe hacking tools - Denial of Service and Distributed Denial of Service:
Describe DoS and DDoS attacks - Spoofing:
Describe spoofing - Reflection and Amplification Attacks:
Describe reflection and amplification attacks - Social Engineering:
Explain social engineering - Evolution of Phishing:
Describe the evolution of phishing - Password Attacks:
Examine password attacks - Reconnaissance Attacks:
Examine reconnaissance attacks - Buffer Overflow Attacks:
Explain buffer overflow attacks - Man-in-the-Middle Attacks:
Explain man-in-the-middle attacks - Vectors of Data Loss and Exfiltration:
Explain vectors of data loss and exfiltration - Other Considerations:
Describe other considerations - Summary Challenge
Implementing Threat Defense Technologies
Describe threat defense technologies.
This lesson includes these topics:
- Information Security Overview:
Describe information security - Firewalls:
Describe firewalls - Intrusion Prevention Systems:
Describe intrusion prevention systems - Protection Against Data Loss and Phishing Attacks:
Introduce protection against data loss and phishing attacks - Defending Against DoS and DDoS Attacks:
Introduce protection against DoS and DDoS attacks - Introduction to Cryptographic Technologies:
Describe cryptographic technologies - IPsec Security Services:
Describe IPsec security services
EAI_31-8_CCNAU_1-0-0_IPsec_Security_Services_Update_001.zip - Secure Sockets Layer and Transport Layer Security:
Describe SSL and TLS protocols - Wireless Security Protocols:
Describe wireless security protocols - Discovery 33: Configure WLAN Using WPA2 PSK Using the GUI:
Configure WPA2 PSK
Topology
Task 1: Configure WLAN Using WPA2 PSK Using the GUI - Summary Challenge