4.8

Description

  Tekslate is the best institute for CCNA Certification Training. We provide training with expert trainers using innovative training methodologies. Our training helps you stay ahead of the competition curve and also offers you complete course material. We are aware of industry needs and are offering CCNA training in a more practical way. We offer training at your flexible timings considering all your requirements.

Key Features

  • 30 hours of Instructor Led CCNA Training
  • Lifetime Access to Recorded Sessions
  • Practical Approach
  • 24/7 Support
  • Expert & Certified Trainers
  • Real World use cases and Scenarios
Trusted By Companies Worldwide

Course Overview

After the completion of CCNA training at Tekslate, our course participants will be able to:

  • Develop insights into the technologies like Site-to-Site VPN, DMVPN, and Client VPN

  • Gain knowledge on IPv6 routing protocols, configuration and its insights

  • Develop an understanding of cloud resources deployed in Enterprise Network Architectures

  • Gain Expertise in QoS concepts

  • Many top Multinationals are using CCNA.

  • Due to the high demand for CCNA professionals, there are numerous job opportunities available around the world.

  • A certified CCNA professional earns USD 127,560 on average per year.

  • CCNA professionals are getting high salaries compared to professionals working on other technologies.

  • Network Administrator

  • Network Designer

  • Support Engineer

  • Network Engineer

  • Network Technician

  • Network Consultants

  • Network Specialists

  • System Engineers

There are no specific prerequisites to learn CCNA course. Anyone who is interested in taking Cisco certifications can learn this course.

We will provide two real-time projects under the guidance of a professional trainer who will explain to you how to acquire in-depth knowledge on all the concepts involved in these projects.

Course Curriculum

  • Recognize the purpose and functions of various network devices such as routers, switches, bridges and hubs

  • Describe the purpose and basic operation of the protocols in the OSI and TCP/IP models

  • Identify the appropriate media, cables, ports, and connectors to connect Cisco network devices to other network devices and hosts in a LAN

  • Determine the technology and media access control method for Ethernet networks

  • Identify basic switching concepts and the operation of Cisco switches

  • Configure and verify initial switch configuration including remote access management

  • Basic Networking

  • 2.a hostname

  • 2.b mgmt IP address

  • 2.c IP default-gateway

  • 2.d local user and password

  • 2.e enable secret password

  • 2.f console and VTY logins

  • 2.g exec-timeout

  • 2.h service password encryption

  • 2.i copy run start

  • 2.6 Configure and verify VLANs

  • 2.8 Identify enhanced switching technologies

  • 2.8.a RSTP

  • 2.8.b PVSTP

  • 2.8.c Etherchannels

  • 2.9 Configure and verify PVSTP operation

  • 2.9.a Describe root bridge election

  • 2.9.b Spanning-tree mode

  • 3.1 Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment

  • 3.2 Identify the appropriate IPv4 addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment.

  • 3.3 Describe the technological requirements for running IPv6 in conjunction with IPv4

  • 3.4.a dual stack

  • 3.5 Describe IPv6 addresses

  • 3.5.a global unicast

  • 3.5.b multicast

  • 3.5.c link-local

  • 3.5.d unique local

  • 3.5.e eui 64

  • 3.5.f auto-configuration

  • 4.1.a packet forwarding
  • The 4.1.b router lookup process

  • 4.1.c Process Switching/Fast Switching/CEF

  • 4.2 Configure and verify utilizing the CLI to set basic Router configuration

  • 4.2.a hostname

  • 4.2.b local user and password

  • 4.2.c enable secret password

  • 4.2.d console and VTY logins

  • 4.2.e exec-timeout

  • 4.2.f service password encryption

  • 4.2.g Interface IP Address      

    • 4.2.g [i] loopback

  • 4.2.h banner

  • 4.2.i motd

  • 4.2.j copy run start

  • 4.3 Configure and verify operation status of a device interface

  • 4.3.a Serial

  • 4.3.b Ethernet

  • 4.4 Verify router configuration and network connectivity using

  • 4.4.a ping     ?

  • -4.4.a [i] extended

  • 4.4.b traceroute

  • 4.4.c telnet

  • 4.4.d SSH

  • 4.4.e sh CDP neighbours

  • 4.5 Configure and verify routing configuration for a static or default route given specific routing requirements

  • 4.6 Differentiate methods of routing and routing protocols

  • 4.6.a Static versus Dynamic

  • 4.6.b Link state versus Distance Vector

  • 4.6.c next hop

  • The 4.6.d IP routing table

  • 4.6.e Passive Interfaces (how they work)

  • 4.6.f Admin Distance

  • 4.6.g split horizon

  • 4.6.h metric

  • 4.7 Configure and verify OSPF

  • 4.7.a Benefit of a single area

  • 4.7.b Configure OSPv2

  • 4.7.c Configure OSPv3

  • 4.7.d Router ID

  • 4.7.e Passive Interface

  • 4.7.f Discuss multi-area OSPF

  • 4.7.g Understand LSA types and purpose

  • 4.8 Configure and verify inter-VLAN routing (Router on a stick)

  • 4.8.a subinterfaces

  • 4.8.b upstream routing

  • 4.8.c encapsulation

  • 4.9 Configure SVI interfaces

  • 4.10 Manage Cisco IOS Files

  • 4.10.a Boot Preferences

  • 4.10.b Cisco IOS Images (15)

  • 4.10.c Licensing    

  • 4.10.c [i] Show license

  • 4.10.c [ii] Change license

  • 4.11 Configure and verify EIGRP (single AS)

  • 4.11.a Feasible Distance/Feasible Successors/Administrative distance

  • 4.11.b Feasibility condition

  • 4.11.c Metric composition

  • 4.11.d Router ID

  • 4.11.e auto summary

  • 4.11.f Path Selection

  • 4.11.g Load Balancing    

  • 4.11.g [i] Unequal

  • 4.11.g [ii] Equal

  • 5.1.a packet forwarding
  • 5.1.b router lookup process

  • 5.1.c Process Switching/Fast Switching/CEF

  • 5.2 Configure and verify utilizing the CLI to set basic Router configuration

  • 5.2.a hostname

  • 5.2.b local user and password

  • 5.2.c enable secret password

  • 5.2.d console and VTY logins

  • 5.2.e exec-timeout

  • 5.2.f service password encryption

  • 5.2.g Interface IP Address      

  • 5.2.g [i] loopback

  • 5.2.h banner

  • 5.2.i motd

  • 5.2.j copy run start

  • 5.3 Configure and verify operation status of a device interface

  • 5.3.a Serial

  • 5.3.b Ethernet

  • 5.4 Verify router configuration and network connectivity using

  • 5.4.a ping    

  • 5.4.b traceroute

  • 5.4.c telnet

  • 5.4.d SSH

  • 5.4.e sh CDP neighbours

  • 5.5 Configure and verify routing configuration for a static or default route given specific routing requirements

  • 5.6 Differentiate methods of routing and routing protocols

  • 5.6.a Static versus Dynamic

  • 5.6.b Link state versus Distance Vector

  • 5.6.c next hop

  • 5.6.d IP routing table

  • 5.6.e Passive Interfaces (how they work)

  • 5.6.f Admin Distance

  • 5.6.g split horizon

  • 5.6.h metric

  • 5.7 Configure and verify OSPF

  • 5.7.a Benefit of a single area

  • 5.7.b Configure OSPv2

  • 5.7.c Configure OSPv3

  • 5.7.d Router ID

  • 5.7.e Passive Interface

  • 5.7.f Discuss multi-area OSPF

  • 5.7.g Understand LSA types and purpose

  • 5.8 Configure and verify inter-VLAN routing (Router on a stick)

  • 5.8.a subinterfaces

  • 5.8.b upstream routing

  • 5.8.c encapsulation

  • 5.9 Configure SVI interfaces

  • 5.10 Manage Cisco IOS Files

  • 5.10.a Boot Preferences

  • 5.10.b Cisco IOS Images (15)

  • 5.10.c Licensing     ?4.10.c [i] Show license

  • 5.10.c [ii] Change license

  • 5.11 Configure and verify EIGRP (single AS)

  • 5.11.a Feasible Distance/Feasible Successors/Administrative distance

  • 5.11.b Feasibility condition

  • 5.11.c Metric composition

  • 5.11.d Router ID

  • 5.11.e auto summary

  • 5.11.f Path Selection

  • 5.11.g Load Balancing

  • 6.1 Configure and verify DHCP (IOS Router)

  • 6.1.a Configuring router interfaces to use DHCP

  • 6.1.b DHCP options (basic overview and functionality)

  • 6.1.c Excluded addresses

  • 6.1.d Lease time

  • 6.2 Describe the types, features, and applications of ACLs

  • 6.2.a standard (editing and sequence numbers)

  • 6.2.b extended

  • 6.2.c named

  • 6.2.d numbered

  • 6.2.e Log option

  • 6.3 Configure and verify ACLs in a network environment

  • 6.3.a named

  • 6.3.b numbered

  • 6.3.c Log option

  • 6.4 Identify the basic operation of NAT

  • 6.4.a purpose

  • 6.4.b pool

  • 6.4.c static

  • 6.4.d 1 to 1

  • 6.4.e overloading

  • 6.4.f source addressing

  • 6.4.g one way NAT

  • 6.5 Configure and verify NAT for given network requirements

  • 6.6 Configure and verify NTP as a client.

  • 7.1.a Device password security
  • 7.1.b enable secret versus enable

  • 7.1.c Transport

  • 7.1.c.1 disable telnet

  • 7.1.c.2 SSH

  • 7.1.d VTYs

  • 7.1.e physical security

  • 7.1.f service password

  • 7.1.g Describe external authentication methods

  • 7.2 Configure and verify Switch Port Security

  • 7.2.a Sticky mac

  • 7.2.b MAC address limitation

  • 7.2.c static/dynamic

  • 7.2.d violation modes    

  • 7.2.d [i] err-disable

  • 7.2.d [ii] shutdown

  • 7.2.d [iii] protect restrict

  • 7.2.e shutdown unused ports

  • 7.2.f errdisable recovery

  • 7.2.g assign unused ports in unused VLANs

  • 7.2.h putting Native VLAN to other than VLAN 1

  • 7.3 Configure and verify ACLs to filter network traffic

  • 8.1.a Metro Ethernet

  • 8.1.b VSAT

  • 8.1.c Cellular 3g/4g

  • 8.1.d MPLS

  • 8.1.e T1/E1

  • 8.1.f ISDN

  • 8.1.g DSL

  • 8.1.h Frame relay

  • 8.1.i Cable

  • 8.1.j VPN

  • 8.2 Configure and verify a basic WAN serial connection

  • 8.3 Configure and verify a PPP connection between Cisco routers

  • 8.4 Configure and verify Frame Relay on Cisco routers

  • 8.5 Implement and troubleshoot PPPoE

FAQ's

Our trainers are well experienced professionals and certified in working with front-end development technologies.

We will record all the Live sessions you go through, and we will send the recording of the class you missed.

For practical execution, our trainer will provide server access to the student. 

All our training classes are live. This is to solve all the student queries directly with the trainer.

Live online training means, our trainer will be in online with you to solve your issues.
Pre-recorded training means, there will be no trainer available to solve your issues.

You can contact our Tekslate support team, or you can send an email to info@tekslate.com for your queries.

Yes, you can access the course material after completing course by the recorded training videos we shared with you during training.

To avail all discounts offered by Tekslate, you need to visit the website regularly. However, there will be a group discount for 2 or more participants.

Yes, you will get your refund by cancelling some administration fee from the course. But, you should cancel your enrolment within 48 hours of registration, and then the refund will be retained within 30 days of a request.

Certifications

Tekslate helps you with proper guidance, required training material, and will make you work on real-time industry based projects to clear your CCNA Certification Exam in your first submit itself.

Click here to get certified.