CCNA Training

  • (4.9)
  • 2456 Ratings
  • Learners : 2481
Try Live Demo

Trusted By Companies Worldwide & 3,50,850+ Learners

CCNA Course Overview

  Tekslate is the best institute for CCNA Certification Training. We provide training with expert trainers using innovative training methodologies. Our training helps you stay ahead of the competition curve and also offers you complete course material. We are aware of industry needs and are offering CCNA training in a more practical way. We offer training at your flexible timings considering all your requirements.
Course Duration 30 hrs
Live Projects 2
Next Batch 28 Nov, 2019
01 Dec, 2019
05 Dec, 2019

CCNA Course Curriculum

  • Recognize the purpose and functions of various network devices such as routers, switches, bridges and hubs

  • Describe the purpose and basic operation of the protocols in the OSI and TCP/IP models

  • Identify the appropriate media, cables, ports, and connectors to connect Cisco network devices to other network devices and hosts in a LAN

  • Determine the technology and media access control method for Ethernet networks

  • Identify basic switching concepts and the operation of Cisco switches

  • Configure and verify initial switch configuration including remote access management

  • Basic Networking

  • 2.a hostname

  • 2.b mgmt IP address

  • 2.c IP default-gateway

  • 2.d local user and password

  • 2.e enable secret password

  • 2.f console and VTY logins

  • 2.g exec-timeout

  • 2.h service password encryption

  • 2.i copy run start

  • 2.6 Configure and verify VLANs

  • 2.8 Identify enhanced switching technologies

  • 2.8.a RSTP

  • 2.8.b PVSTP

  • 2.8.c Etherchannels

  • 2.9 Configure and verify PVSTP operation

  • 2.9.a Describe root bridge election

  • 2.9.b Spanning-tree mode

  • 3.1 Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment

  • 3.2 Identify the appropriate IPv4 addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment.

  • 3.3 Describe the technological requirements for running IPv6 in conjunction with IPv4

  • 3.4.a dual stack

  • 3.5 Describe IPv6 addresses

  • 3.5.a global unicast

  • 3.5.b multicast

  • 3.5.c link-local

  • 3.5.d unique local

  • 3.5.e eui 64

  • 3.5.f auto-configuration

  • 4.1.a packet forwarding
  • The 4.1.b router lookup process

  • 4.1.c Process Switching/Fast Switching/CEF

  • 4.2 Configure and verify utilizing the CLI to set basic Router configuration

  • 4.2.a hostname

  • 4.2.b local user and password

  • 4.2.c enable secret password

  • 4.2.d console and VTY logins

  • 4.2.e exec-timeout

  • 4.2.f service password encryption

  • 4.2.g Interface IP Address      

    • 4.2.g [i] loopback

  • 4.2.h banner

  • 4.2.i motd

  • 4.2.j copy run start

  • 4.3 Configure and verify operation status of a device interface

  • 4.3.a Serial

  • 4.3.b Ethernet

  • 4.4 Verify router configuration and network connectivity using

  • 4.4.a ping     ?

  • -4.4.a [i] extended

  • 4.4.b traceroute

  • 4.4.c telnet

  • 4.4.d SSH

  • 4.4.e sh CDP neighbours

  • 4.5 Configure and verify routing configuration for a static or default route given specific routing requirements

  • 4.6 Differentiate methods of routing and routing protocols

  • 4.6.a Static versus Dynamic

  • 4.6.b Link state versus Distance Vector

  • 4.6.c next hop

  • The 4.6.d IP routing table

  • 4.6.e Passive Interfaces (how they work)

  • 4.6.f Admin Distance

  • 4.6.g split horizon

  • 4.6.h metric

  • 4.7 Configure and verify OSPF

  • 4.7.a Benefit of a single area

  • 4.7.b Configure OSPv2

  • 4.7.c Configure OSPv3

  • 4.7.d Router ID

  • 4.7.e Passive Interface

  • 4.7.f Discuss multi-area OSPF

  • 4.7.g Understand LSA types and purpose

  • 4.8 Configure and verify inter-VLAN routing (Router on a stick)

  • 4.8.a subinterfaces

  • 4.8.b upstream routing

  • 4.8.c encapsulation

  • 4.9 Configure SVI interfaces

  • 4.10 Manage Cisco IOS Files

  • 4.10.a Boot Preferences

  • 4.10.b Cisco IOS Images (15)

  • 4.10.c Licensing    

  • 4.10.c [i] Show license

  • 4.10.c [ii] Change license

  • 4.11 Configure and verify EIGRP (single AS)

  • 4.11.a Feasible Distance/Feasible Successors/Administrative distance

  • 4.11.b Feasibility condition

  • 4.11.c Metric composition

  • 4.11.d Router ID

  • 4.11.e auto summary

  • 4.11.f Path Selection

  • 4.11.g Load Balancing    

  • 4.11.g [i] Unequal

  • 4.11.g [ii] Equal

  • 5.1.a packet forwarding
  • 5.1.b router lookup process

  • 5.1.c Process Switching/Fast Switching/CEF

  • 5.2 Configure and verify utilizing the CLI to set basic Router configuration

  • 5.2.a hostname

  • 5.2.b local user and password

  • 5.2.c enable secret password

  • 5.2.d console and VTY logins

  • 5.2.e exec-timeout

  • 5.2.f service password encryption

  • 5.2.g Interface IP Address      

  • 5.2.g [i] loopback

  • 5.2.h banner

  • 5.2.i motd

  • 5.2.j copy run start

  • 5.3 Configure and verify operation status of a device interface

  • 5.3.a Serial

  • 5.3.b Ethernet

  • 5.4 Verify router configuration and network connectivity using

  • 5.4.a ping    

  • 5.4.b traceroute

  • 5.4.c telnet

  • 5.4.d SSH

  • 5.4.e sh CDP neighbours

  • 5.5 Configure and verify routing configuration for a static or default route given specific routing requirements

  • 5.6 Differentiate methods of routing and routing protocols

  • 5.6.a Static versus Dynamic

  • 5.6.b Link state versus Distance Vector

  • 5.6.c next hop

  • 5.6.d IP routing table

  • 5.6.e Passive Interfaces (how they work)

  • 5.6.f Admin Distance

  • 5.6.g split horizon

  • 5.6.h metric

  • 5.7 Configure and verify OSPF

  • 5.7.a Benefit of a single area

  • 5.7.b Configure OSPv2

  • 5.7.c Configure OSPv3

  • 5.7.d Router ID

  • 5.7.e Passive Interface

  • 5.7.f Discuss multi-area OSPF

  • 5.7.g Understand LSA types and purpose

  • 5.8 Configure and verify inter-VLAN routing (Router on a stick)

  • 5.8.a subinterfaces

  • 5.8.b upstream routing

  • 5.8.c encapsulation

  • 5.9 Configure SVI interfaces

  • 5.10 Manage Cisco IOS Files

  • 5.10.a Boot Preferences

  • 5.10.b Cisco IOS Images (15)

  • 5.10.c Licensing     ?4.10.c [i] Show license

  • 5.10.c [ii] Change license

  • 5.11 Configure and verify EIGRP (single AS)

  • 5.11.a Feasible Distance/Feasible Successors/Administrative distance

  • 5.11.b Feasibility condition

  • 5.11.c Metric composition

  • 5.11.d Router ID

  • 5.11.e auto summary

  • 5.11.f Path Selection

  • 5.11.g Load Balancing

  • 6.1 Configure and verify DHCP (IOS Router)

  • 6.1.a Configuring router interfaces to use DHCP

  • 6.1.b DHCP options (basic overview and functionality)

  • 6.1.c Excluded addresses

  • 6.1.d Lease time

  • 6.2 Describe the types, features, and applications of ACLs

  • 6.2.a standard (editing and sequence numbers)

  • 6.2.b extended

  • 6.2.c named

  • 6.2.d numbered

  • 6.2.e Log option

  • 6.3 Configure and verify ACLs in a network environment

  • 6.3.a named

  • 6.3.b numbered

  • 6.3.c Log option

  • 6.4 Identify the basic operation of NAT

  • 6.4.a purpose

  • 6.4.b pool

  • 6.4.c static

  • 6.4.d 1 to 1

  • 6.4.e overloading

  • 6.4.f source addressing

  • 6.4.g one way NAT

  • 6.5 Configure and verify NAT for given network requirements

  • 6.6 Configure and verify NTP as a client.

  • 7.1.a Device password security
  • 7.1.b enable secret versus enable

  • 7.1.c Transport

  • 7.1.c.1 disable telnet

  • 7.1.c.2 SSH

  • 7.1.d VTYs

  • 7.1.e physical security

  • 7.1.f service password

  • 7.1.g Describe external authentication methods

  • 7.2 Configure and verify Switch Port Security

  • 7.2.a Sticky mac

  • 7.2.b MAC address limitation

  • 7.2.c static/dynamic

  • 7.2.d violation modes    

  • 7.2.d [i] err-disable

  • 7.2.d [ii] shutdown

  • 7.2.d [iii] protect restrict

  • 7.2.e shutdown unused ports

  • 7.2.f errdisable recovery

  • 7.2.g assign unused ports in unused VLANs

  • 7.2.h putting Native VLAN to other than VLAN 1

  • 7.3 Configure and verify ACLs to filter network traffic

  • 8.1.a Metro Ethernet

  • 8.1.b VSAT

  • 8.1.c Cellular 3g/4g

  • 8.1.d MPLS

  • 8.1.e T1/E1

  • 8.1.f ISDN

  • 8.1.g DSL

  • 8.1.h Frame relay

  • 8.1.i Cable

  • 8.1.j VPN

  • 8.2 Configure and verify a basic WAN serial connection

  • 8.3 Configure and verify a PPP connection between Cisco routers

  • 8.4 Configure and verify Frame Relay on Cisco routers

  • 8.5 Implement and troubleshoot PPPoE

For Individuals
For Corporates

CCNA Upcoming Batches

  • Weekday

    5 Dec - 04 Jan

    7:00 AM IST
  • Weekend

    8 Dec - 07 Jan

    7:00 AM IST
  • Weekday

    12 Dec - 11 Jan

    7:00 AM IST
  • Weekend

    15 Dec - 14 Jan

    7:00 AM IST
  • Weekday

    17 Dec - 16 Jan

    7:00 AM IST
  • Weekend

    21 Dec - 20 Jan

    12:00 AM IST
  • Schedules Doesn't Suit You ?

    Our Team can set up a batch at your convinient time.

    Let us know

    CCNA Course Objectives

    After the completion of CCNA training at Tekslate, our course participants will be able to:

    • Develop insights into the technologies like Site-to-Site VPN, DMVPN, and Client VPN

    • Gain knowledge on IPv6 routing protocols, configuration and its insights

    • Develop an understanding of cloud resources deployed in Enterprise Network Architectures

    • Gain Expertise in QoS concepts

    • Many top Multinationals are using CCNA.

    • Due to the high demand for CCNA professionals, there are numerous job opportunities available around the world.

    • A certified CCNA professional earns USD 127,560 on average per year.

    • CCNA professionals are getting high salaries compared to professionals working on other technologies.

    • Network Administrator

    • Network Designer

    • Support Engineer

    • Network Engineer

    • Network Technician

    • Network Consultants

    • Network Specialists

    • System Engineers

    There are no specific prerequisites to learn CCNA course. Anyone who is interested in taking Cisco certifications can learn this course.

    We will provide two real-time projects under the guidance of a professional trainer who will explain to you how to acquire in-depth knowledge on all the concepts involved in these projects.

    Have More Questions

    Contact us

    CCNA Course FAQ's

    Have questions? We’ve got the answers. Get the details on how you can grow in this course.

    Our trainers are well experienced professionals and certified in working with front-end development technologies.

    We will record all the Live sessions you go through, and we will send the recording of the class you missed.

    For practical execution, our trainer will provide server access to the student. 

    All our training classes are live. This is to solve all the student queries directly with the trainer.

    Live online training means, our trainer will be in online with you to solve your issues.
    Pre-recorded training means, there will be no trainer available to solve your issues.

    You can contact our Tekslate support team, or you can send an email to info@tekslate.com for your queries.

    Yes, you can access the course material after completing course by the recorded training videos we shared with you during training.

    To avail all discounts offered by Tekslate, you need to visit the website regularly. However, there will be a group discount for 2 or more participants.

    Yes, you will get your refund by cancelling some administration fee from the course. But, you should cancel your enrolment within 48 hours of registration, and then the refund will be retained within 30 days of a request.

    Have More Questions. Reach our Support Team

    Contact us

    Join a Free CCNA Demo Session

    See if this course is a fit for you by joining us for an online info session. You’ll meet our team, get an overview of the curriculum and course objectives, and learn about the benefits of being a student at Tekslate

    Attend a Demo Session | Meet the Expert Who Can Kickstart Your Career in CCNA

    By providing us with your details, We wont spam your inbox.