CCNA Networking Syllabus
CCNA Networking Syllabus
CCNA Networking Syllabus
DOS COMMANDS
O FILE
O DIRECTORY
O ATTRIBUTE COMMANDS
O PRACTICE
O BOOT PROCESS
E-MAIL CONFIGURATION
NT BACKUP
HIRENBOOT OPIONS
VIRUS
ANTIVIRUS
PRACTICE
NETWORK INTRODUCTION
TYPES OF NETWORK
HOW DO WE NETWORK ?
DIFF OS FAMILY
IP CONFIGURATION
O USER CREATION
O USER LEVEL FILES ACCESS PERMISSION
O PRACTICE
REMOTE DESKTOP
REMOTE ASSISTANCE
NET MEETING
PRACTICE
TERMINAL SERVER
IIS SERVER
2008 SERVER OS
O ADS CONFIGURATION
O DHCP CONFIGURATION
O CLIENT CONFIGURATION
USER MANAGEMENT
PROFILES
PRACTICE
GROUP POLICY
CLIENT CONFIGURATION
USER CONFIGURATION
O LOGON HOURS
O LOG ON TO
O PASSWORD RESET
O PASSWORD UNLOCK
GROUP CONFIGURATION
O TYPES OF GROUPS
O DIFFERENCE BETWEEN LOCAL, GLOBAL AND UNIVERSAL GROUPS
USER MANAGEMENT
LOCAL PROFILE
ROAMING PROFILE
HOME FOLDER
DISK QUOTA
SHADOW COPY
GROUP POLICY
O OU CREATION
O OU LEVEL POLICY
O DOMAIN LEVEL POLICY
O CHANGING DEFAUL PASSWORD POLICY
O ENABLING PASSWORD LOCK OUT POLICY / COMPLICITY POLICY
O CHANGING ALLOW LOGON LOCALLY POLICY
O DELEGATING CONTROL
O SOFTWARE DEPLOYMENT POLICY
O SCRIPT POLICY
O WALL PAPER POLICY
CONFIGURING ADC
CONFIGURING RODC
DNS
IIS
FTP
RARS
RDP
RAID SIMULATION
Q&A
PRACTICE
O COMPAQ MOTHERBOARD
O HP MOTHERBOARD
O ACER MOTHERBOARD
O DELL MOTHERBOARD
O IBM LENOVO MOTHERBOARD
O SONY MOTHERBOARD
O TOSHIBA MOTHERBOARD
O APPLE MOTHERBOARD
O FUJITSU MOTHERBOARD
O SAMSUNG MOTHERBOARD
Network Fundamentals
○ 1.1.a Routers
○ 1.1.b L2 and L3 switches
○ 1.1.c Next-generation firewalls and IPS
○ 1.1.d Access points
○ 1.1.e Controllers (Cisco DNA Center and WLC)
○ 1.1.f Endpoints
○ 1.1.g Servers
Network Access
● 2.1 Configure and verify VLANs (normal range) spanning multiple switches
o Describe the need for and basic operations of Rapid PVST+ Spanning
Tree Protocol and identify basic operations
2.5.a Root port, root bridge (primary/secondary), and other port names
2.5.b Port states (forwarding/blocking)
2.5.c PortFast benefits
IP Services
● 4.1 Configure and verify inside source NAT using static and pools
Security Fundamentals
● 5.1 key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)