Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CCNA 200-301 Certification Course
Workbooks / Software Download
Download Links
Network Basics
What is Network (1:55)
SOHO-Wide Networks (4:57)
Network Devices
Network Switch (2:09)
Routers (2:12)
What is Firewall (7:42)
Firewall (6:39)
VOIP Devices (4:19)
Wireless Access Point (1:17)
What is Intrusion (1:53)
Intrusion Prention System - IPS (2:38)
Broadband Wirleess Routers (6:35)
Cisco Certifications
About Cisco (1:29)
Cisco Certification Tracks (12:37)
Cisco Certification Updates (11:15)
CCNP Certifications (0:55)
CCIE Certifications (1:55)
Cisco Certification Migration Options (5:55)
Certification Programs - CCT-CCNA (6:10)
CCNA200-301 Contents (1:46)
TCP-IP Addressing
TCP-IP Addressing (4:23)
TCP-IP (5:38)
IPV4 address (4:15)
Assigning IPv4 address to a Windows 10 Host (2:23)
Range Of IPv4 Address (1:55)
IPv4 Address - Classification (6:20)
Unicast-Multicast-Broadcast (4:44)
Network -Host portions (9:53)
Rules to Assign IP Ranges - CLass ABC (11:23)
Number of Host Addresses – Class A,B,C (3:12)
Network Address (7:39)
Broadcast Address (3:44)
Subnet Mask (5:51)
CCNA - PACKET TRACER overview (7:23)
IP Addrees - Verification (11:26)
IP Addressing Advance
Ping Command (9:43)
Verify IP address (2:58)
Ping Messages (11:03)
Reserved Addresses - Loopback (5:16)
Private - Public IP (14:29)
Private-Public IP Range (5:51)
IANA- IP address Space (8:53)
Subnetting
Subnetting (7:14)
FLSM - VLSM (4:25)
What we do in Subnetting (4:47)
why Subnetting is Important (9:05)
FLSM - Examples
FLSM - C Class - REQ-40 Hosts (13:05)
FLSM- C class- REQ - 30 Hosts (5:23)
FLSM- C class- REQ - 100 Hosts (3:57)
Understanding Subnets (14:05)
B Clsss - REQ- 1000 Hosts (11:39)
B Class - REQ- 4000 Hosts (4:37)
A Clsss - REQ- 32000 Hosts (11:37)
FLSM more Examples (0:35)
Slash Notation - Value (9:30)
same -different SUBNETS (11:10)
VLSM _ Examples
VLSM- C class (12:46)
VLSM - Overview (5:45)
VLSM- -Class - Shortcut (7:56)
VLSM- B -class (11:17)
VLSM - A - CLass (9:56)
VLSM more Examples (0:30)
VLSM - Design Scenarios
VLSM Design Example 2 (2:48)
VLSM Design Example-1 (12:12)
VLSM- FLSM Design Example (8:47)
Subnetting Questions
Subnetting Quetions - 1 (9:38)
Subnetting Quetions - 2 (4:35)
Subnetting Quetions - 3 (3:51)
Subnetting Quetions - 4 (4:24)
Practice Quetions (0:40)
Sample Subnetting Exam Questions (9:34)
Basic Switching
Ethernet (6:51)
Local Area Network (3:09)
SOHO LANs (8:01)
Enterprise LAN (5:10)
Transmission Media - UTP cables (13:31)
Fiber Cables - Wireless (2:22)
Cisco Packet Traer Software (13:20)
Basic LAN Setup (9:36)
Address Resolution Protocol - ARP (6:30)
Cisco Switch -Models
Cisco Switches - Features (27:35)
Managable vs Unmanageable switches (6:56)
Cisco Switches – Compare Models (16:09)
Cisco Switch- Components (24:17)
IOS Basic Commands
Telnet - How it Works (11:10)
Accessubg CLI - Cisco Router - Switch (3:31)
Console Connection – Switch -Router (8:08)
Login with Username Passwords (9:54)
Console – Switch Router - Packet Tracer (2:28)
Saving Configurations (4:00)
Command Modes on Cisco IOS (3:07)
User Mode (7:38)
Privilege Mode (15:11)
IOS Commands - HELP -TAB-SHORTCUTS (7:46)
Global Configuration Mode (5:32)
Console Password (10:04)
VTY Line Password (13:49)
Assigning IP Address - Routers (10:50)
Default Gateway Configuration (8:45)
Career paths with CCNA (14:55)
VIRTUAL LAN - VLANs
What is Broadcast Domain (7:43)
What is VLAN (13:50)
VLAN Types (13:25)
VLAN Ranges (2:33)
Creating VLANs (5:22)
VLANs- Assigning Ports (12:05)
VLAN-Design (7:00)
Voice VLAN (9:27)
Management VLAN (8:47)
TRUNKING
VLANs- Multiple Switches (6:43)
Trunk Links (4:06)
Access- Trunk LInks (5:24)
802.3 Ethernet Frame Format (10:08)
Frame Tragging - on Trunk Links (12:09)
Trunking Protocols - ISL-DOT1Q (4:33)
Trunk Link - Configuration (10:24)
INTER-VLAN ROUTING
Inter VLAN Routing - SVI - LAB 3 (16:11)
Accessubg CLI - Cisco Router - Switch (3:31)
Forward Packets beween VLANs (3:50)
VLAN Routing - Methods (1:35)
VLAN Routing- Physical Gateways (5:58)
VLAN Rouiting -Physical Gateway - Configuration (12:12)
VLAN Routing Physical Gateway- Limitations (1:45)
VLAN Routing - Subinterfaces (4:08)
VLAN Routing - Subinterfaces - Configuration - PART 1 (10:00)
VLANRouting- Subinterfaces -PART 2 (15:59)
VLAN Routing SubInterfaces - Advantages - DisAdvantages (4:36)
VLAN Routing – SVI – L3 Switch (7:53)
SVI- Configurations (10:20)
SVI - Multiple Switches (14:52)
L3 Routed Ports (7:25)
VLAN Routing – Router Physical Gateways (12:49)
VLAN Routing –Sub-Interfaces - LAB 2 (19:15)
Spanning Tree Protocol - STP
Bridging Loops - STP (5:53)
Bridging loops with Redundant links (10:33)
How STP Works (2:49)
Selecting Root Bridge (9:55)
Root Bridge - Verfication (4:19)
Root Port Selection- PART 1 (11:45)
Root Port Selection- PART 2 (11:19)
STP Till now - Review (7:11)
Selecting Designated Ports (16:46)
STP Terminology
Root Port -VS- Designated Ports (4:42)
STP – Hello BPDUs (2:41)
STP Convergence (13:08)
STP Timers (3:08)
STP Interfaces States (5:09)
STP Optimization
Spaning Tree PortFast (7:02)
Ether channel - PortChannels (16:24)
RSTP
STP Convergence (13:08)
Rapid STP - RSTP (9:54)
RSTP Port Roles (17:57)
RSTP BPDU (2:26)
WAN Connectivity
WAN Connectivity (14:14)
Ethernet WAN (22:19)
LAN -WAN - Connectivity - Packettracer Lab (19:40)
Rules to Assign IP Addresses (13:45)
IP Address - Configuration (17:09)
WAN Connectivity (12:49)
Rules to Assign IP address (7:55)
IP addresss Configuration (24:35)
Troubleshooting Connectivity (10:43)
ROUTING - Static Routing
Types of Routing (5:20)
What is ROUTING (12:00)
Static Routing
Static Routing (3:20)
Static Routing - Configuration Example 1 (9:19)
Static Routing - Configuration Example 2 (9:26)
Static Routing - Next Hop or Exit interface (5:34)
Routing - How it Works (6:11)
Static Routing - Multiple Paths (4:44)
Floating Static Routes (8:27)
Dynamic Routing
Dynamic Routing (12:05)
Classfull vs Classless Protocols (6:04)
IGP - EGP Routing Protocols (3:30)
BGP Autonomous system Number (8:10)
OSPF Basics
OSPF - Overview (6:12)
Knowledge - Prerequisite (2:01)
OSPF - How it Works (3:28)
OSPF – Becoming Neighbors (11:04)
Router-ID (12:40)
OSPF - LSDB- Database (5:18)
Exchanging the LSDB (6:26)
Synchornize LSDB- Best Route (4:57)
Maintaining Neighbors - LSDB (7:36)
OSPF -Tables (2:31)
OSPF Configuration
OSPF - Wild Card Mask (9:14)
OSPF Configuration Syntax (8:15)
OSPF Single Area - Pre-Requiste (2:30)
OSPF Single Area-Configuration (7:00)
OSPF - Single Area- Verification (8:52)
OSPF - Advertisement Example (4:07)
OSPF Metric - Cost
Calculate Best Routes - OSPF (5:48)
OSPFMetric Cost (5:59)
Changing Interface Bandwidth (5:49)
Default Reference BW- LImitiations (1:25)
Manual Cost (3:49)
Auto-Cost Reference BW (6:04)
OSPF Areas
OSPF Single Area - Limitations (7:13)
MUltiple Areas (7:05)
MUlti-Ares -Design Rules (14:31)
Multi-Area - Configurations (5:05)
LAB - Mutl-Area- Configuration (11:51)
OSPFv2 Interface SubCommands (9:33)
OSPF Network Types
OSPF Broadcast Networks- DR-BDR (9:40)
OSPF Network Types (7:29)
DR-BDR - ELections (9:12)
OSPF DR-BDR - Lab (12:48)
OSPF Point to Point LInks (8:52)
IPv6
IPv6 Addressing (6:35)
IPV6- Introduction (8:47)
IPV6 Address types (17:09)
IPV6 Static Addressing (10:43)
IPv6 Static-Default Routing (13:21)
OSPFv3 (13:43)
First Hop Redundancy Protocols - HSRP VRRP GLBP
First Hop Redundancy _ introduction (16:23)
FHRP protocols differences (10:09)
Access Control LIsts - ACL
Access Control LIsts (12:02)
ACL Types (2:38)
Standard - Extended ACL (9:34)
ACL Logic- How Match Rules (8:38)
Standard ACL
Standard ACL Lab (4:42)
Standard ACL lab - PreRequisite (6:03)
ACL - Wild Card Mask (11:21)
ACL Statements- Things to Know (8:45)
STandard ACL - Configuration (10:54)
Apply ACL - Select Right Interface (10:17)
Standard ACL- IN- OUT (10:45)
Standard ACL - Verification (6:22)
Standard ACL- Wrong Direction (5:33)
Standard ACL - Practice Examples (8:03)
STandard ACL- Find IP-Ranges (10:33)
Extended ACL
Extended ACL (3:59)
Extended ACL- Lab Pre-REquisite (8:24)
Extended ACL - Config Example (1:50)
Similarities- Extended - Standard ACL (3:28)
Extended ACL- Things to Know (8:31)
Extended ACL- Syntax (11:00)
Extended ACL- Configuration (10:30)
Extended ACL-Apply - Verify (13:13)
Extended ACl - Examples (13:23)
Named ACL
Named ACLs (10:42)
Named ACL- Syntax (5:35)
Named Standard ACL - Configuration (2:04)
Named Extended ACL - Configuration (1:25)
Editing Named ACLs (8:55)
Network Address Translation - NAT
NAT- What we Cover (0:51)
Why do we need NAT (6:33)
What is NAT (7:55)
NAT Types (11:39)
NAT - Lab Setup (15:19)
Static NAT - LAB (11:48)
Dynamic NAT- LAB (10:11)
PAT- LAB (11:01)
PAT with Exit Interface (7:42)
Network Security Concepts
Goals of Network Security (9:30)
Network Security Terminology (6:07)
Understanding Threat Types -Mitigation (8:55)
Assets - Classification of Assets (6:15)
Classify CounterMeasures (3:56)
Classify Vulnerabilities (2:27)
Network Security - Design Principles (10:24)
Threat Defense Technologies
AAA- Network Security (10:37)
Cisco Traffic Telemetry methods (3:39)
What is Firewall (7:42)
Intrusion Prention System - IPS (4:22)
Virtual Private Networks (4:12)
Next Generation Firewalls (5:30)
AAA
AAA- Network Security (10:37)
AAA - Components (3:50)
AAA - External Servers (3:19)
AAA - Protocols -TACACS- RADIUS (7:35)
AAA - Cisco Authentication Servers (3:51)
AAA Authentication - Device Access (2:55)
Authenticaiton - Local Database (9:55)
LAB- Authentication - TACACS (11:34)
Layer 2 Security
Disable Unused Ports (1:27)
Switch Security - Overview (2:09)
MAC Flooding Attack - Port Security (11:57)
MAC Spoofing Attack - Port Security (7:26)
Port Security - Configuration (11:04)
What is Native VLAN (8:10)
CDP Overview (17:42)
LLDP Overview (2:34)
CDP-LLDP- Vulnerabilities - Mitigation (2:12)
DHCP Spoofing Attack- DHCP Snooping (8:13)
DHCP Snooping - Configuration (16:06)
DHCP Starvation Attack - Mitigation (1:50)
ARP Spoofing Attack - DAI (12:18)
Dynamic ARP Inspection - Configuration (11:36)
IP Services
Inband vs OutBand (7:02)
Cisco Traffic Telemetry methods (3:39)
Remote Access - Telnet (5:55)
Remote Access - SSH (9:18)
DHCP-Overview (7:05)
Router as DHCP server (10:59)
Device-Network Events Logging (9:39)
Syslog - Terminal Logging (6:48)
Network Time Protocol (7:01)
NTP -Stratum Value (3:40)
LAB - NTP - Configuration (8:46)
Dynamic Host Configuration Protocol ( DHCP)
DORA Process - DHCP (6:04)
Dynamic Host Configuration Protocol - DHCP (10:10)
DHCP – Supported Devices (4:46)
Configuring a Router as a DHCP Server (7:18)
Router as DHCP Client (15:20)
L3 Switch – as DHCP Server (16:51)
DHCP Relay Agent (16:51)
TroubleShooting DHCP (14:03)
DHCP Troubleshoooting (14:05)
DHCP Trouble Ticket 1 (12:58)
DHCP Trouble Ticket 2 (5:42)
WAN Technologies
Metro-Ethernet- WAN (7:32)
Leased Lines (11:55)
VPN-Introduction (5:09)
Virtual Private Network (8:12)
VPN Types (3:49)
VPN over Internet (4:37)
Generic Routing encapsulation (7:33)
Default Lab setup (6:34)
LAB- GRE point to point Configuration (7:11)
Drawbacks of GRE (4:38)
DMVPN - Introduction (7:15)
Dynamic Multipoint VPN (14:36)
DMVPN-Protocols (4:07)
Multi Protocol label Switching (10:39)
IPsec VPN Introduction (9:17)
Qos
Qos Mechanisms (6:47)
Qos- Introduction (10:39)
Network Management
What is Network Management (8:04)
Past-Present Methods of Network Management - PART 1 (13:54)
Past-Present Methods of Network Management - PART 2 (7:08)
SNMP (18:05)
Network Automation
Challenges - Traditional Management (11:12)
Network Automation- Goals (15:39)
Types of Network Automation (6:19)
What can be Automated- PART 1 (11:59)
What can be Automated - PART 2 (8:33)
Impact of Network Automation (8:19)
SDN and Controllers
SDN- Software Defined Networking (14:30)
Automation Origination Points (8:20)
SDN Controllers (8:43)
Networks Managed by SDN Controllers (12:56)
SDN-Control-Mgmt-Data Plane
Identify Network Device Planes (2:44)
Identify Network Device Planes (1:40)
Data Plane (6:09)
Control Plane (3:27)
Management Plane (2:31)
SDN- mangement Plane (7:08)
SDN - Control Plane- Data Plane (5:58)
SDN Models-Architecture
SDN - Imperative Model (4:50)
SDN - Declarative Model (7:25)
SDN-Network Design Requirments (8:40)
Underlay Networks (7:18)
Overlay Networks (6:40)
SDN Fabric (6:05)
API-Applicaion Programming Interface
API - Application Programming Interface (11:17)
API - Types (4:05)
API - with SDN Networks (8:43)
NorthBound API (8:49)
SounthBOund API (7:56)
Cisco Devnet-Sandbox
DevNET Certifications (4:40)
Cisco DEVNET (4:39)
DevNET SandBox (6:14)
Sandbox LABS (8:03)
Sandabox Lab Access-Reservations (3:19)
Cisco DNA Center
Cisco DNA Center (15:57)
DNA Center Applicance (4:06)
DNA Cnter- What can do - PART 1 (11:28)
DNA Cnter- What can do - PART 2 (13:06)
Web Service API - Rest API
Web Service API - Commonly Used (7:44)
Web Service API (7:52)
REST API (8:14)
Network Automation Tools
Config MGMT Tools (6:24)
Conig MGMT Tools - Capabilities (8:53)
Config-MGMT tools - Similarities (5:53)
Master - Agent (5:30)
Agentbased- Agentless (6:57)
Push-Pull Model (10:19)
Configuration Files (5:29)
PUPPET Config MGMT Tool
PUPPET-Tool (2:51)
Puppet Master-Agent-Database (3:28)
Puppet-Manifest (4:51)
Puppet-Module-Forge (5:57)
Puppet Agent-Agrentless (3:07)
Puppet- PULL Model Steps (4:06)
CHEF Config MGMT Tool
CHEF- Config MGMT Tool (6:10)
CHEF-Termonology (7:29)
Anisble Config MGMT Tool
ANSIBLE-Control Station (3:10)
ANSIBLE-Tool (7:38)
ANSIBLE -PLayBook-Inventory (5:10)
ANISBLE - Templates-Variables (6:31)
JSON DATA Encoding
API Data Formats (7:43)
JSON Overview (7:33)
JSON Data Types (6:40)
JSON Syntax Rules (2:48)
JSON Data Interpretation (6:53)
WLAN Basics
Wired vs Wireless Networks (13:27)
Types of Wireless Networks (8:32)
WLAN Devices - AP-WLC (6:18)
Ad-HOC vs Infrastructure Mode (6:11)
Service Sets- SSID-BSS-ESS
Service Sets - Types (4:11)
SSID-Service Set Identifier (3:06)
Independent Basic Service Set - IBSS (1:47)
Basic Service Set -BSS (4:01)
Extended Service Set- ESS (4:27)
Distribution System (5:28)
RF-WLAN Standards
Frequency - Ranges (5:30)
Wireless Signal Basics (8:43)
IEEE- 802 Standards (4:02)
802.11 - Wireless LAN Standards (4:29)
802.11 - a - b - g (5:36)
802.11 n (3:07)
802.11 ac (5:30)
802.11 ax (2:53)
Wireless Architecture-WLC Deployments
Automonomous AP - Architecture (10:10)
Wireless Architectures (4:51)
utonomous AP - Challenges (9:31)
plit-MAC Architecture- Lightweight AP (13:16)
LAP-WLC Binding (4:50)
CAPWAP Tunnels (6:41)
CAPWAP Messages (3:14)
WLC Deployments Methods (12:31)
CCNA Exam Overview
CCNA Exam (6:00)
CCNA 200-301 Exam Content (1:01)
Cisco Certification Status (2:42)
Exam Quetions Types (7:43)
Exam Prepare PLAN (8:30)
TCP-IP - IPv6- SUbnetting Quetions
IP addressing (0:53)
IP addressing (1:43)
IPV6 1 (2:57)
IPv6 (6:17)
IPv6 (2:30)
IPv6 (2:25)
Subnetting Quetion1 (4:23)
Subnetting (4:31)
Subnetting (2:50)
Subnetting (1:58)
Subnetting (2:27)
SUbnetting (2:08)
Switching Quetions
SWitching 1 (2:11)
Ethernet (1:13)
Basic Switching (1:47)
STP (3:26)
STP (0:49)
STP222 (5:46)
Subnetting VLANs (6:31)
INTER VLAN 1 (1:23)
Collision and broadcast domain (1:20)
ACL-NAT-Services - Quetions
Wireless Quetion 1 (2:39)
Qos 1 (3:10)
Security1 (1:40)
BSIC COMMANDS (1:22)
Logging (2:15)
ACLs (0:58)
ACLs (4:32)
GRE (3:50)
PPP (2:59)
TCP - UDP (3:29)
Exam Simulations - Quetions
SWITCH Simulations (10:36)
NAT Simulation (9:48)
EIGRP Simulations (16:22)
Basic Confiiguration- (9:10)
IPv6 OSPF Simulation (7:52)
ACL Simulation (10:06)
LABS- VIRTUAL-GNS3
About GNS3 (3:44)
Cisco Lab Options (7:35)
Installing GNS3 on Windows (6:39)
GNS3 - Adding IOS Images (5:57)
Default Topology- IOS Routers -Initial Configurations (5:13)
IOS Default Topology (9:19)
Connecting GNS3 Topology to Host Computer (6:02)
GNS3- VMWARE Integration (9:16)
GNS3 - IOSv L2-L3 Configuration Steps (5:54)
GNS3 - ASAv Setup (4:17)
GNS3- IOU- L2-L3 Configuation Steps (2:38)
Teach online with
DevNET Certifications
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock