banner
CCNA 7: Enterprise Networking, Security, and Automation
This third CCNA course describes the architectures and considerations related to designing, securing, operating, and troubleshooting enterprise networks – including wide area network (WAN) technologies & quality of service (QoS) mechanisms for secure remote access, along with software-defined networking, virtualization, & automation concepts supporting network digitization. Learning components comprise: 14 modules 12 hands-on labs 29 Cisco Packet Tracer activities 32 videos 13 syntax checkers 2 interactive activities 53 CYU quizzes 14 module exams 5 module group exams 1 final exam 1 practice exam for CCNA certification exam
Prerequisites
CCNAv7 Introduction to Networks (ITN) and CCNAv7 Switching, Routing, and Wireless Essentials (SRWE) or equivalent experience
Qualifications
.Cisco Certificate of course completion. / Cisco Certified Network Associate (CCNA)
Required number of optional units
0
Units
  • OSPF Features and Characteristics:  Describe basic OSPF features and characteristics.
  • OSPF Packets:  Describe the OSPF packet types used in single-area OSPF.
  • OSPF Operation:  Explain how single-area OSPF operates.
  • OSPF Router ID:  Configure an OSPFv2 router ID.
  • Point-to-Point OSPF Networks:  Configure single-area OSPFv2 in a point-to-point network.
  • Multiaccess OSPF Networks:  Configure the OSPF interface priority to influence the DR/BDR election in a multiaccess network.
  • Modify Single-Area OSPFv2:  Implement modifications to change the operation of singlearea OSPFv2.
  • Default Route Propagation:  Configure OSPF to propagate a default route.
  • Verify Single-Area OSPFv2 Verify a single-area OSPFv2 implementation
  • Current State of Cybersecurity:  Describe the current state of cybersecurity and vectors of data loss.
  • Threat Actors:  Describe the threat actors who exploit networks.
  • Threat Actor Tools:  Describe tools used by threat actors to exploit networks.
  • Malware:  Describe malware types.
  • Common Network Attacks:  Describe common network attacks.
  • IP Vulnerabilities and Threats:  Explain how IP vulnerabilities are exploited by threat actors.
  • TCP and UDP Vulnerabilities:  Explain how TCP and UDP vulnerabilities are exploited by threat actors.
  • IP Services:  Explain how IP services are exploited by threat actors.
  • Network Security Best Practices:  Describe best practices for protecting a network.
  • Cryptography:  Describe common cryptographic processes used to protect data in transit.
  • Purpose of ACLs:  Explain how ACLs filter traffic.
  • Wildcard Masks in ACLs:  Explain how ACLs use wildcard masks.
  • Guidelines for ACL Creation:  Explain how to create ACLs.
  • Types of IPv4 ACLs:  Compare standard and extended IPv4 ACLs.
  • Configure Standard IPv4 ACLs:  Configure standard IPv4 ACLs to filter traffic to meet networking requirements.
  • Modify IPv4 ACLs:  Use sequence numbers to edit existing standard IPv4 ACLs.
  • Secure VTY Ports with a Standard IPv4 ACL: Configure a standard ACL to secure vty access.
  • Configure Extended IPv4 ACLs:  Configure extended IPv4 ACLs to filter traffic according to networking requirements.
  • NAT Characteristics:  Explain the purpose and function of NAT.
  • Types of NAT:  Explain the operation of different types of NAT.
  • NAT Advantages:  Describe the advantages and disadvantages of NAT.
  • Configure Static NAT:  Configure static NAT using the CLI.
  • Configure Dynamic NAT:  Configure dynamic NAT using the CLI.
  • Configure PAT:  Configure PAT using the CLI.
  • NAT64:  Describe NAT for IPv6.
  • Purpose of WANs:  Explain the purpose of a WAN.
  • WAN Operations:  Explain how WANs operate.
  • Traditional WAN Connectivity:  Compare traditional WAN connectivity options.
  • Modern WAN Connectivity:  Compare modern WAN connectivity options.
  • Internet-Based Connectivity Compare internet-based WAN connectivity options.
  • VPN Technology Describe benefits of VPN technology.
  • Types of VPNs:  Describe different types of VPNs
  • IPsec:  Explain how the IPsec framework is used to secure network traffic.
  • Network Transmission Quality:  Explain how network transmission characteristics impact quality.
  • Traffic Characteristics:  Describe minimum network requirements for voice, video, and data traffic.
  • Queuing Algorithms:  Describe the queuing algorithms used by networking devices.
  • QoS Models:  Describe the different QoS models. ã 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 6 of 7 www.netacad.com
  • QoS Implementation Techniques Explain how QoS uses mechanisms to ensure transmission quality.
  • Device Discovery with CDP:  Use CDP to map a network topology.
  • Device Discovery with LLDP:  Use LLDP to map a network topology.
  • NTP:  Implement NTP between an NTP client and NTP server.
  • SNMP: Explain SNMP operation.
  • Syslog:  Explain syslog operation.
  • Router and Switch File Maintenance:  Use commands to back up and restore an IOS configuration file.
  • IOS Image Management:  Perform an upgrade of an IOS system image. 
  • Hierarchical Networks:  Explain how data, voice, and video are converged in a switched network.
  • Scalable Networks:  Explain considerations for designing a scalable network.
  • Switch Hardware:  Explain how switch hardware features support network requirements.
  • Router Hardware:  Describe the types of routers available for small to-mediumsized business networks.
  • Network Documentation:  Explain how network documentation is developed and used to troubleshoot network issues.
  • Troubleshooting Process:  Compare troubleshooting methods that use a systematic, layered approach.
  • Troubleshooting Tools:  Describe different networking troubleshooting tools.
  • Symptoms and Causes of Network Problems:  Determine the symptoms and causes of network problems using a layered model.
  • Troubleshooting IP Connectivity Troubleshoot a network using the layered model.
  • Cloud Computing Explain the importance of cloud computing.
  • Virtualization:  Explain the importance of virtualization.
  • Virtual Network Infrastructure:  Describe the virtualization of network devices and services.
  • Software-Defined Networking:  Describe software-defined networking. Controllers Describe controllers used in network programming.
  • Automation Overview Describe automation. Data Formats Compare JSON, YAML, and XML data formats.
  • APIs:  Explain how APIs enable computer to computer communications.
  • REST:  Explain how REST enables computer to computer communications.
  • Configuration Management:  Compare the configuration management tools Puppet, Chef, Ansible, and SaltStack
  • IBN and Cisco DNA Center Explain how Cisco DNA center enables intent-based networking.
Plans
Self study by E-learning
Students study at their convenience remotely without instructor classroom face-to face support. They do practical exercises, take assessments also and end-of-chapter assessments online as well.
Duration
At least 70 hours
Fees
Description Amount
Fee for course delivery by Self-paced e-learning XAF 60,000
Current Sessions
Title Start date Status
Self-paced e-learning access is available on demand Opened Apply
Blended E-learning and Classroom studies
Trainees have access to online course materials, and also have face-to-face classroom training sessions to boost their e-learning
Duration
At least 40 hours e-learning plus 2 months classroom training
Fees
Description Amount
IMIT Registration fee XAF 25,000
Fees covering the e-learning facility and face-to-face classroom tutor support. XAF 100,000
Current Sessions
Title Start date Status
E-learning courses are available all the time. Upon payment of the tuition fee, the potential learner is given a login that gives access to all the e-learning resources. Admitted students can choose to start Face-to face, tutor-led classroom training in FEBRUARY, JUNE, or OCTOBER according to their convenience. Opened Apply