EC Council Training Center
Skill India Development
 Skill India
ISO
IAF
NSDC

Networking Course in Delhi

image
image
image
image
image
image
IICSEH

CCNA Course in Delhi

Section 1: Network Fundamentals

  • Explain the purpose and functions of various network devices.
  • Compare and contrast TCP/IP and OSI models.
  • Explain the impact of network topologies.
  • Identify Ethernet LAN components.
  • Compare and contrast collapsed and three-tier architectures.
  • Compare and contrast network topologies.
  • Select the appropriate cabling type based on implementation requirements.
  • Apply troubleshooting methodologies to resolve problems.

Section 2: Network Access

  • Configure and verify VLANs.
  • Configure and verify trunking on Cisco switches.
  • Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)
  • Configure and verify interVLAN routing.
  • Troubleshoot client connectivity issues involving VLANs, WLANs, and interVLAN routing.
  • Configure and verify wireless client access.
  • Compare Cisco Wireless Architectures and AP modes
  • Describe AP and WLC management access connections

Section 3: IP Connectivity

  • Interpret the components of routing table.
  • Determine how a router makes routing decisions.
  • Configure, verify, and troubleshoot IPv4 and IPv6 static routing.
  • Configure, verify, and troubleshoot RIP and OSPF.
  • Configure and verify EIGRP for IPv4 and IPv6.
  • Troubleshoot using ping, traceroute, and telnet.

Section 4: IP Services

  • Configure and verify DHCP (IOS Router).
  • Explain the role of DHCP and DNS within the network.
  • Describe the types, features, and applications of ACLs.
  • Configure and verify ACLs in a network environment.
  • Configure and verify NTP operating in a client and server mode.
  • Configure network devices for remote access using SSH.
  • Describe the capabilities and function of TFTP in the network.
  • Identify the basic operation of NAT and its types.

Section 5: Security Fundamentals

  • Define key security concepts.
  • Describe security program elements.
  • Explain the role of network components in network security.
  • Explain the functions of firewalls, intrusion prevention systems, and VPNs.
  • Describe endpoint security technologies.
  • Describe wireless security protocols (WPA, WPA2, and WPA3)
  • Configure WLAN using WPA2 PSK using the GUI

Section 6: Automation and Programmability

  • Explain how automation impacts network management.
  • Compare traditional networks with controller-based networking.
  • Describe controller-based and software-defined architectures.
  • Recognize the capabilities of configuration management mechanisms Puppet, Chef, and Ansible
  • Interpret JSON encoded data

About CCNA – Cisco Certified Network Associate 200-301

CCNA 200-301 is the combination of routing & switching, wireless, security and automation. CCNA is the most demanded subject via worldwide. If you want to become

Network engineer or network administrator or network specialist then you must have CCNA training and certification. This is the common platform for the industry, this is the

Study about router, switches, firewall, VPN, repeater, hub, patch panel, etc. Cisco has all the three level for training and certifications
1. Associate level of training and certifications
2. Professional level of training and certifications
3. Expert level of training and certifications

CCNA is the associate level of training and certifications: -

This is the first step of networking, this is about the routing configuration, switching configuration, and firewall configuration also need some basic concept of python programming 3.12

Recently MPLS – multi protocol level switching has been added with the syllabus, BGP – Border Gateway Protocol has added, how will be able to configurate wide area networking also called city to another city networking. CCNA Knowledge will help you a lot for the networking concept.

CCNP is the professional level of training as well as certifications: -

Cisco Certified Network Professional, CCNP Enterprise is the latest version from the cisco. This is something about advance level of networking training, if you want to become senior network engineer, senior network manager, senior network manager then you must have all the three papers training and certifications. Advance network configuration which is related to the router, switches, firewall, about IPv6 networking configuration with dual stack.

CCIE is the Expert Level of Training and Certifications: -

Cisco Certified Internetwork expert, this is the expert level of training and certifications, this is the most respected training and certifications from the industry, there are 9 hours of lab exam also there is one online exam too. If you want to crack the lab exam then you must have the advance level of practical experience for router and switches, there are other training and certifications too like in wireless, security and enterprise.

There are some combination courses via industry, networking and cyber security is the good combination for the industry, networking and cloud is again good options too, if you want to become cloud analyst, cloud administrator, cloud manager, cloud specialist then must have the strong background about networking concept. Amazon, Microsoft and google has Cloud Options which is related to the server as well as the cloud. DNS, DHCP, FTP, Telnet, Active Directory, Domain Services, are some important server to mange entire infrastructure via cloud. There are three levels again with the cloud like associate, professional and expert level too. If you want to move to IT security then you must have the CCIE or CCNP Security Training and Certification, this is something about the network security, web security, bug bunting, penetration testing, VAPT, etc.

There are some security topics which is related to VLAN security, Access list security and other security. VLAN need to configure with switches also about the port security, etc. need to create the VLAN configuration also one VLAN will be not able to communicate to other VLAN. If we are connecting router with the switches also called inter-VLAN configuration. Need to study some concept of networking basic, advance networking. About the ISO-OSI model, in networking infrastructure there are seven layer of OSI model with layer1 to layer7. If you want to become L1 engineer or L2 Engineer then there are many options from the industry.

Access list security is the part of Router Security, there are some kind of access list which use to provide router and routing security.
1. Standard Access List
2. Extended Access List
3. Named Access List

There are some range of access list to implement security for incoming, outgoing also for incoming and outgoing too. If you have very basic concept clear then can also work as a security engineer to protect about the networking device such as router, switch, firewall, etc. if will discuss about the wireless router security then there are some concept of SSID and security key too. There is port security chapter to configure all the security which is related to the port security and the port security can link with the mac-address of machine.

Networking integrated with the ChatGPT-AI tools, ChatGPT has very advance features to run any command. If you want to configure ip address may be ip will be belong to ipv4 or can be ipv6, need to configure router, switches, firewall with the help of ChatGPT. Can use following commands to configure cisco router.

Configuring Cisco router with EIGRP Protocol

Configuring Router1

Router Configuration: -
Enable
Configure terminal
Interface s0/0/0
Ip address 10.0.0.1 255.0.0.0
No shut
Clock rate 9600
Interface fa0/0
Ip address 20.0.0.1 255.0.0.0
Router eigrp 100
Network 10.0.0.0
Network 20.0.0.0
No auto-summary

Configuring Router2: -

Enable
Configure T
Interface S0/0/1
Ip add 10.0.0.2 255.0.0.0
No shutdown
Int fa0/1
Ip add 30.0.0.1 255.0.0.0
No shutdown
Router eigrp 100
Network 20.0.0.0
Network 30.0.0.0
No auto-summary

So, Guy’s if you are using small network which is less than 15 routers then better use RIP-routing information protocol. There are three version of rip
1. RIPv1
2. RIPv2
3. RIPng

Rip version 2 will support dissentious network also can support VLSM, CIDR network. VLSM stands for variable length subnet mask, classless interdomain routing.

If will talk about the new version of RIPng so its next generation of RIP. RIPng is use to support ipv6 routing. If you have more than 15 routers then can use EIGRP

EIGRP - enhanced interior gateway routing protocol will support up to 255 router. If you have other company router like cisco router and Motorola router then better use OSPF routing protocol. OSPF can support any vendor router, also if one router can belong to cisco or other company and other router belong to different company with maximum limit of router then can use OSPF routing protocol. There is a concept of autonomous system, all the routers can present in autonomous system, group of router is called autonomous system also autonomous system can be divided in area in case of OSPF network. One area will be not able to communicate to other area because both are belonging to the different area. If one autonomous system want to communicate to other autonomous system then can use ASBR – autonomous system border router. BGP is the world largest protocol in wide area network. BGP has very high capacity to share all the information via one city to other city also can share the information between one country to the other country. If you want to manage ios-internetworking operating system then must have the TFTP server, TFTP server will be able to install, configure, manage, monitor, maintain and troubleshoot any kind of the networking devices. Networking devices must have the operating system such as firewall, router, switch, etc. there are some compatibility issues too for the networking device.

There is a concept of connection oriented and connection less which is provided by the TCP and UDP protocol. TCP stands for transmission control protocol also UDP stands for user datagram protocol. Connection oriented means first step will be establish the connection, second steps will be transfer the data between the devices also last steps will be release the connections. All application layer protocol use by the TCP also may be used by the UDP. If will talk about the socket number then this is the combination of IP address which works at network layer of OSI model also port number is 16 bit address which works at application layer of OSI model. Normally we are using two models in networking scenario, first is ISO-OSI model also second we are using like TCP/IP model.

Network Fundamentals (1st Month)

(Day1) - Explaining the roles and functions of components like routers, switches, access points, servers, endpoints, firewalls, IPS, and controllers
(Day2) - Describing the properties of network architecture including 2-tier, 3-tier, spine-leaf, WAN, SOHO, cloud and on-premises topology
(Day3) - Comparing types of cables - copper, single-mode, fibre, multimode fibre, etc. Physical interface comparison with respect to point-to-point and Ethernet shared media connections. PoE Concepts are also discussed in this chapter
(Day4) - Identifying interface and cable problems such as errors, collisions, speed, and mismatch duplex
(Day5) - Comparing UDP to TCP
(Day6) - Configuring and verifying IPv4 addresses and subnetting
(Day7) - Demonstrating the importance of private IPv4 address
(Day8) - Configuring and verifying of IPv6 prefix and address
(Day9) - Comparing IPv6 address types, including link local, unique local, global unicast, anycast, multicast, modified EUI 64
(Day10) - Describing wireless principles including Wi-Fi channels (non-overlapping), SSID, RF, and encryption
(Day11) - Explaining virtual machines
(Day12) - Describing switching concepts, frame switching, frame flooding, MAC learning, ageing, and MAC address table

Network Access (1st Month)

(Day1) - VLAN verification and configuration comprising multiple switches, including details on default VLAN, connectivity, and access ports
(Day2) - Verifying and configuring interswitch connectivity with respect to native VLAN, 802.1Q, and trunk ports
(Day3) - LLDP and Cisco Discovery Protocol’s configuration and verification
(Day4) - LACP and Layer2/3 configuration and verification
(Day5) - Explaining the requirement of Rapid PVST’s basic operations and spanning tree protocol, and understanding basic operations with respect to port states, root port, primary and secondary root bridge, and associated port names. The need for PortFast benefits and port states, i.e., forwarding and blocking is also explained
(Day6) - Comparing of AP modes and wireless architecture of Cisco
(Day7) - Explaining WLAN components LAG, AP, WLC, and trunk and access ports
(Day8) - Describing AP and access connections such as HTTPS, HTTP, Telnet, SSH, and console, Radius/TACACS+
(Day9) - Configuring WLAN access for client connectivity through WLAN creation, QoS profiles, advanced WLAN configuration, and security settings

IP Connectivity (2nd Month)

(Day1) - Interpreting routing table components including prefix, network mask, routing protocol code, next hop, metric, administrative distance, gateway of last resort
(Day2) - Determining the forward decision of a router with respect to routing protocol metric, longest match, and administrative distance
(Day3) - Verifying and configuring iPv4 and iPv6 static routing including floating static, host route, network route, and default route
(Day4) - Verifying and configuring OSPFv2 with respect to point-to-point, router ID, broadcast, and neighbour adjectives
(Day5) - Explaining the need for first hop redundancy protocol

IP Services (2nd Month)

(Day1) - Configuring and verifying NAT through pools and static (Day2) - Configuring and verifying NTP in a client and server setting (Day3) - Explaining the function of DNS and DHCP (Day4) - Syslog features such as levels and facilities description (Day5) - Configuring and verifying relay and DHCP Client (Day6) - PHB, i.e., per-hop behaviour forwarding for carrying out QoS-like marking, policing, congestion, queuing, classification, and shaping (Day7) - SSH method for configuring network devices (Day8) - Explaining TFTP/FTP capabilities and roles through SSH

Security Fundamentals (2nd Month)

(Day1) - Describing elements related to security programmes through user awareness, physical access control, and training
(Day2) - Defining essential security concepts including vulnerabilities, exploits, threats, and mitigation techniques
(Day3) - Utilising local passwords for configuring device access control
(Day4) - Explaining elements related to security password like management, password alternatives, and complexity
(Day5) - Explaining VPNs (site-to-site) and remote access
(Day6) - Verifying and configuring access control lists
(Day7) - Configuring security features related to layer-2
(Day8) - Differentiating concepts related to accounting, authorisation, and authentication
(Day9) - Describing WPA, WPA3, and WPA2 wireless security protocols
(Day10) - Utilising GUI for configuration of WLAN through WPA2 PSK

Automation and Programmability (3rd Month)

(Day1) - Describing the impact of automation on network management
(Day2) - Comparing networks using controller-based networking
(Day3) - Describing software defined architectures using underlay, overlay, and fabric and explaining controller-based architecture
(Day4) - Utilising Cisco DNA Centre enabled device management for comparing traditional campus device management
(Day5) - Explaining properties of Rest-based APIs such as data encoding, CRUD, and HTTP verbs
(Day6) - Recognizing the abilities of Ansible, Chef, and Puppet related to configuration management mechanisms
Interpreting ISON encoded data

Section 1: Network Fundamentals

Explain the purpose and functions of various network devices

The primary function of various network devices is to transmit and receive data quickly and safely. Network devices are a broad term that facilitates the users' data transmission and establishes communication between the devices. It includes communication equipment like hubs, switches, routers, bridges, gateways, load balancers, modems, repeaters, and more. These are the required components for interaction and communication between the devices. Network devices are critical for any modern business as they promote simplicity and efficiency in communication between users within the network infrastructure.


Compare and contrast TCP/IP and OSI models

TCP/IP and OSI both are logical models that have some similarities. Both the TCP/IP and OSI models describe how effectively information is transmitted between the devices across a network infrastructure. However, both models describe a set of layers for data transmission and each layer has a specific function for the transmission of data.

TCP/IP Model

Transmission Control Protocol/Internet protocol designed by Vint Cerf and Bob Kahn has 4 different layers namely the application layer, transport layer, internet layer, and network access layer. It is used to establish communication in a private computer network. The model is highly scalable and supports many routing protocols. However, the TCP/IP model is a little difficult to set up and possesses many synchronisation attacks.

OSI Model

Open system interconnection was developed in 1984 by the International Organisation for Standardisation (ISO). The model has a set of 7 different layers to make communication quite flexible. The layers include the application layer, presentation layer, session layer, transport layer, network layer, data link layer, and physical layer. The interesting thing about the OSI model is all the layers work independently and are quite flexible as compared to the TCP/IP Model. Apart from this, setting up the OSI model is a challenging task as it involves a new protocol.


Explain the impact of network topologies

Network topology is an arrangement of different network components like devices, nodes, and connections. It represents the position rules of how a component can be arranged to each other. The network topology has a significant impact on its functionality. Network topology ensures the communication between the two devices is secure and long enough for data transmission. There are 2 different categories of network topology: Physical and logical. The physical network only represents the physical elements of a network like cable and connections while logical network topology deals with the virtual representation of network arrangement. However, there are various network topologies based on performance, scalability, and cost. The topology includes a start network, mesh network, bus network, ring network, tree network, and hybrid topology. It is crucial to choose the right network topology for attaining the required performance and scalability. 

Identify Ethernet LAN components

Ethernet is a traditional technology for transmitting data between devices in a wired local area network or wide network area. The primary function of Ethernet LAN is to receive and transmit data using two or more two cables. This is one of the noting, and dominant technologies used in the LAN because Ethernet LAN Is easy to install and manage. Being cost-effective LAN technology is flexible and scalable. The working of Ethernet involves various components. The physical layer comprises the Ethernet Cables and devices like computers, printers, and any other device while the second layer is described into two parts- Logical Link Control(LLC) and Media Access Control(MAC). LLC creates a path for the data transmission whereas MAC transmits data using a hardware address.

Compare and contrast collapsed and three-tier architectures

Collapsed core architecture combines the core and distribution layers in a single layer which delivers high-speed connection and distribution functions including routing, filtering, NAT, etc. Collapsed core architecture limits scalability as it is only suitable for small and medium-sized networks.

On the other hand, three-tier architectures combine 3 layers where core and distribution layers perform separate functions. It is designed for the large campus network with high fault tolerance. However, being more expensive the third-tier architecture holds complex designs which require technical knowledge for easy maintenance.


Compare and contrast network topologies

Network topology represents the layout or structure of the computer network. It defines different components in a network like links, nodes, and connecting devices. All these components are arranged based on how they communicate with each other. The topology of a network also represents its performance, cost, reliability, and scalability. There are five different types of network topology. It includes bus topology, ring topology, mesh topology, star topology, and hybrid topology. Among all these topology Hybrid topology stands out and offers outstanding efficiency, flexibility, and fault tolerance. However, hybrid topology involves complex processes where execution and problem-solving might be challenging due to a lack of information.

Select the appropriate cabling type based on the implementation requirements

It is necessary to understand the cabling types based on the implementation requirement because different cables are used for different situations and using the wrong cables might not work. These days, modern network devices are equipped with the autodetect function which understands the behaviour of cross cable and adjusts accordingly. But still, it is advised to know the right ways to do the cabling properly. Furthermore, one can do it by switching to switch, router to router, router to PC, and much more.

Apply troubleshooting methodologies to resolve problems

In network terms, troubleshooting refers to the systematic approach to problem-solving. Troubleshooting methodologies help in isolating and identifying the root cause of problems. It is very helpful in diagnosing and solving computer and network-related problems. Here’s a detailed explanation of troubleshooting methodologies.

  • Identify the problem
  • Represent the root cause of the problem
  • Gather information on the problem
  • Analyze the gathered information
  • Establish a plan to resolve the problem
  • Verify the functionality
  • Solve problems and document solutions

However, this is just a guide to troubleshooting network problems and the same does not apply to all network environments because every network follows a unique approach to troubleshooting problems.

CCNA Certificate