CCNA7: Introduction to Networks
This first course in the CCNA curriculum introduces the architectures, models, protocols, and networking elements that connect users, devices, applications and data through the Internet and across modern computer networks - including IP addressing and Ethernet fundamentals. Learning Components Comprise: 17 modules 24 hands-on labs 31 Cisco Packet Tracer activities 36 videos 10 syntax checkers 13 interactive activities 64 CYU quizzes 17 module exams 6 module group exams 1 final exam
There are no prerequisites for this offering. Learners are expected to have the following skills: • High school reading level • Basic computer literacy • Basic PC operating system navigation skills • Basic internet usage skills
Cisco Certificate of course completion.
Required number of optional units
  • Network Layer Characteristics:  Explain how the network layer uses IP protocols for reliable communications.
  • IPv4 Packet:  Explain the role of the major header fields in the IPv4 packet.
  • IPv6 Packet:  Explain the role of the major header fields in the IPv6 packet.
  • How a Host Routes:  Explain how network devices use routing tables to direct packets to a destination network. ã 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 6 of 8
  • Router Routing Tables:  Explain the function of fields in the routing table of a router.
  • MAC and IP:  Compare the roles of the MAC address and the IP address.
  • ARP:  Describe the purpose of ARP.
  • Neighbor Discovery:  Describe the operation of IPv6 neighbor discovery.
  • Configure Initial Router Settings:  Configure initial settings on a Cisco IOS router.
  • Configure Interfaces:  Configure two active interfaces on a Cisco IOS router.
  • Configure the Default Gateway:  Configure devices to use the default gateway.
  • Networks Affect Our Lives:  Explain how networks affect our daily lives.
  • Network Components:  Explain how host and network devices are used.
  • Network Representations and Topologies: Explain network representations and how they are used in network topologies.
  • Common Types of Networks:  Compare the characteristics of common types of networks.
  • Internet Connections:  Explain how LANs and WANs interconnect to the internet.
  • Reliable Networks:  Describe the four basic requirements of a reliable network.
  • Network Trends:  Explain how trends such as BYOD, online collaboration, video, and cloud computing are changing the way we interact.
  • Network Security:  Identify some basic security threats and solutions for all networks.
  • The IT Professional Explain employment opportunities in the networking field. 
  • Cisco IOS Access:  Explain how to access a Cisco IOS device for configuration purposes. ã 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 4 of 8
  • IOS Navigation:  Explain how to navigate Cisco IOS to configure network devices.
  • The Command Structure:  Describe the command structure of Cisco IOS software.
  • Basic Device Configuration:  Configure a Cisco IOS device using CLI.
  • Save Configurations:  Use IOS commands to save the running configuration.
  • Ports and Addresses:  Explain how devices communicate across network media.
  • Configure IP Addressing:  Configure a host device with an IP address.
  • Verify Connectivity:  Verify connectivity between two end devices
  • The Rules:  Describe the types of rules that are necessary to successfully communicate.
  • Protocols:  Explain why protocols are necessary in network communication.
  • Protocol Suites:  Explain the purpose of adhering to a protocol suite.
  • Standards Organizations:  Explain the role of standards organizations in establishing protocols for network interoperability.
  • Reference Models:  Explain how the TCP/IP model and the OSI model are used to facilitate standardization in the communication process.
  • Data Encapsulation:  Explain how data encapsulation allows data to be transported across the network.
  • Data Access:  Explain how local hosts access local resources on a network.
  • Purpose of the Physical Layer:  Describe the purpose and functions of the physical layer in the network.
  • Physical Layer Characteristics:  Describe characteristics of the physical layer.
  • Copper Cabling:  Identify the basic characteristics of copper cabling.
  • UTP Cabling:  Explain how UTP cable is used in Ethernet networks.
  • Fiber-Optic Cabling:  Describe fiber-optic cabling and its main advantages over other media. ã 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 5 of 8
  • Wireless Media:  Connect devices using wired and wireless media. 
  • IPv4 Address Structure: Describe the structure of an IPv4 address including the network portion, the host portion, and the subnet mask.
  • IPv4 Unicast, Broadcast, and Multicast:  Compare the characteristics and uses of the unicast, broadcast and multicast IPv4 addresses.
  • Types of IPv4 Addresses:  Explain public, private, and reserved IPv4 addresses.
  • Network Segmentation:  Explain how subnetting segments a network to enable better communication.
  • Subnet an IPv4 Network:  Calculate IPv4 subnets for a /24 prefix.
  • Subnet a /16 and /8 Prefix{  Calculate IPv4 subnets for a /16 and /8 prefix.
  • Subnet to Meet Requirements:  Given a set of requirements for subnetting, implement an IPv4 addressing scheme.
  • Variable Length Subnet Masking:  Explain how to create a flexible addressing scheme using variable length subnet masking (VLSM).
  • Structured Design:  Implement a VLSM addressing scheme.
  • IPv4 Issues:  Explain the need for IPv6 addressing. ã 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 7 of 8
  • IPv6 Addressing:  Explain how IPv6 addresses are represented. IPv6 Address Types Compare types of IPv6 network addresses.
  • GUA and LLA Static Configuration:  Explain how to configure static global unicast and linklocal IPv6 network addresses.
  • Dynamic Addressing for IPv6 GUAs:  Explain how to configure global unicast addresses dynamically. Dynamic Addressing for IPv6 LLAs Configure link-local addresses dynamically.
  • IPv6 Multicast Addresses:  Identify IPv6 addresses.
  • Subnet an IPv6 Network:  Implement a subnetted IPv6 addressing scheme.
  • ICMP Messages:  Explain how ICMP is used to test network connectivity.
  • Ping and Traceroute Testing:  Use ping and traceroute utilities to test network connectivity.
  • Transportation of Data:  Explain the purpose of the transport layer in managing the transportation of data in end-to-end communication.
  • TCP Overview:  Explain characteristics of the TCP.
  • UDP Overview:  Explain characteristics of the UDP.
  • Port Numbers:  Explain how TCP and UDP use port numbers.
  • TCP Communication Process:  Explain how TCP session establishment and termination processes facilitate reliable communication.
  • Reliability and Flow Control:  Explain how TCP protocol data units are transmitted and acknowledged to guarantee delivery.
  • UDP Communication:  Describe the UDP client processes to establish communication with a server. 
  • Application, Presentation, and Session:  Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end user applications. ã 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 8 of 8
  • Peer-to-Peer:  Explain how end user applications operate in a peer-topeer network.
  • Web and Email Protocols:  Explain how web and email protocols operate.
  • IP Addressing Services:  Explain how DNS and DHCP operate.
  • File Sharing Services:  Explain how file transfer protocols operate.
  • Security Threats and Vulnerabilities:  Explain why basic security measures are necessary on network devices.
  • Network Attacks:  Identify security vulnerabilities.
  • Network Attack Mitigation:  Identify general mitigation techniques.
  • Device Security:  Configure network devices with device hardening features to mitigate security threats. 
  • Devices in a Small Network:  Identify the devices used in a small network.
  • Small Network Applications and Protocols:  Identify the protocols and applications used in a small network.
  • Scale to Larger Networks:  Explain how a small network serves as the basis of larger networks.
  • Verify Connectivity:  Use the output of the ping and tracert commands to verify connectivity and establish relative network performance.
  • Host and IOS Commands:  Use host and IOS commands to acquire information about the devices in a network.Troubleshooting Methodologies Describe common network troubleshooting methodologies.
  • Troubleshooting Scenarios:  Troubleshoot issues with devices in the network.
Self study by E-learning
Students study at their convenience remotely without instructor classroom face-to face support. They do practical exercises, take assessments also and end-of-chapter assessments online as well.
At least 70 hours
Description Amount
Fee for course delivery by Self-paced e-learning XAF 60,000
Current Sessions
Title Start date Status
Self-paced e-learning is available at all times Opened Apply
Blended E-learning and Classroom studies
Trainees have access to online course materials, and also have face-to-face classroom training sessions to boost their e-learning
At least 40 hours e-learning plus 2 months classroom training
Description Amount
Fees covering the e-learning facility and face-to-face classroom tutor support. XAF 100,000
IMIT Registration fee XAF 25,000
Current Sessions
Title Start date Status
Admissions are done all the time. The e-learning resources are made available to the trainee upon payment of the training fee. Face-to-face classroom tutor support starts every 3rd Week of FEBRUARY, JUNE and OCTOBER. Admitted students choose to start in the month convenient to them. Opened Apply