Learn CCNA from a Triple CCIE (R&S, Security, SP) certified instructor in just 28+ Hours. The instructor has 15 years of extensive experience in the network industry. It is an engaging course which include animations on several important topics, infographic slides and extensive lab practice.
The course is divided into six different chapters as follows:
1. Network Fundamentals
2. Network Access
3. IP Connectivity
4. IP Services
5. Security Fundamentals
6. Automation and Programmability
Learn CCNA from a Triple CCIE (R&S, Security, SP) certified instructor in just 28+ Hours. The instructor has 15 years of extensive experience in the network industry. It is an engaging course which include animations on several important topics, infographic slides and extensive lab practice.
The course is divided into six different chapters as follows:
1. Network Fundamentals
2. Network Access
3. IP Connectivity
4. IP Services
5. Security Fundamentals
6. Automation and Programmability
In “Network fundamentals” chapter, we have covered History of Networking Standards,TCP/
In “Network Access” chapter, we have covered Switching technology, Wireless technology, and Cisco WLAN deployments.
In “IP Connectivity” chapter, we have covered IP routing process, static and dynamic routing, and FHRP protocols.
In “IP Services” chapter, we have covered
“Security fundaments” chapter is composed of security terminologies, different types of attacks & vulnerabilities
“Automation & programmability” chapter is comprised of Types of planes, controllers
So, are you ready to Jumpstart your career in networking?
Introduction Part 1
Introduction Part 2
Introduction Part 3
Introduction Part 4
In this lecture you are going to learn about history of Networking Models
In this lecture you are going to Learn about TCP/IP in more detail
In this lecture, we are going to compare OSI & TCP/IP reference model including Layer Names and Numbers
In this lecture you are going to learn about Transport layer in more detail
In this lecture, we will compare TCP protocol with UDP protocol in detail
In this lecture you are going to learn in detail how multiple applications between two computers communicate and exchange data with each other.
In this lecture we are going to learn how TCP connection is established and terminated between two computers
In this lecture you will learn about Server Virtualization, Virtual Machines, and How to connect Virtual Machines with real world network
In this lecture you are going to learn about the definition of cloud computing service, private and public cloud, and most commonly used cloud services today
In this lecture you are going to learn about different types of Ethernet cables and fiber optic cables
In this lecture you are going to learn about Binary, Decimal, and Hexa-Decimal numbers. You are also going to learn that how to convert a Binary number into Decimal and Hexa-Decimal number
In this lecture you are going to learn about IP address, its terminology, and how IP addresses are used for identification
Understand Network Addressing and its different types of classes
In this lecture you are going to learn about Private IP addressing(RFC 1918), Layer 2 & 3 broadcast, subnet Mask, and CIDR
In this lecture you are going to learn about IPv4 Subnetting Rules and apply it on Class C network address example
Understanding IPv4 subnetting using Class B Addresses
Understanding IPv4 subnetting using Class A addresses
In this lecture you are going to learn about IPv4 subnetting using Class A addresses
In this lecture you are going to learn about IPv6 address in detail
In this section, you will learn about IPv6 global unicast prefix and how to perform IPv6 subnetting
In this lecture you are going to learn about three different ways to assign an IPv6 Address:
1. Manual Address Assignment
2. Stateless auto-configuration (EUI-64)
3. Stateful auto-configuration
In this lecture, you are going to learn about Any cast address and how it functions
In this lecture you are going to learn what values are required for a client PC to work in a network such as IP address, Subnet Mask, Default Gateway, DNS Server IP Address.
We are going to cover DNS topic in Chapter 4: IP Services
Learn to verify IP parameters on Windows, Macintosh, and Linux OS
NOTE: Download Chapter 1 Slides PDF file from below "Downloadable Materials"
Introduction video of Chapter 2
This section explains collision domain and broadcast domain concepts based on which network devices operates
This lecture gives you a brief about different types of network devices
This lecture explains the functionality of HUB device
This lecture explains the basic functionality of a Network Switch, Layer 2 Switch and unknown unicast flooding mechanism
This lecture explains the basic functionality of a Bridge device
This lecture explains the functionality of Hald Duplex Ethernet connection and full duplex ethernet connection
This lecture explains the basic functionality of VLANs
This lecture explains different types of switch ports and their functionality
This lecture explains the functionality and operation of a Trunk port
This lecture explains the concepts of Native VLAN, Untagged frames, VLAN Tagging protocols such as ISL & 802.1Q, and VTP
In this lecture explains the concept of Inter-VLAN routing with three different scenarios
Learn about Cisco Packet Tracer tool and how to set it up on your PC
Please download LAB 1 manual to perform this lab
Please download LAB 2 manual to perform this lab
Please download LAB 3 manual to perform this lab
Please download LAB 4 manual to perform this lab
Please download LAB 5 LAB manual to perform this lab
Please download LAB 5a LAB manual to perform this lab
Please download LAB5-B lab manual for this lab
Please download LAB5C Lab manual to perform this lab
This lecture explains the basic concept of Spanning Tree Protocol (STP)
This lecture explains the Spanning tree terminologies:
1. Root Bridge
2. Non-Root Bridge
3. BPDU
4. Bridge ID
5. Port cost
6. Path cost
This lecture explains the STP Port roles such as:
1. Root Port
2. Designated Port
3. NON-Designated Port
4. Forwarding port
5. Blocking port
6. Alternate Port
7. Backup Port
When Spanning tree protocol is enabled in a switch, the switch port goes through the following stages:
1. Disabled
2. Blocking,
3. Listening
4. Learning
5. Forwarding
This lecture explains the concept of network convergence
This lecture explains the concept of Spanning Tree Link Cost
This lecture explains the operation of spanning tree protocol
This lecture helps you understand the detailed operation of STP protocol with help of Animation
This lecture explains about different type of Spanning tree protocols
Please download LAB6 lab manual
This lecture explains the concept of EtherChannel
Please download Lab 8 Manual
This lecture explains the POE technology, Terminology and operation
This lecture explains the Campus LAN topologies such as:
1. Two Tier campus design
2. Three Tier Campus design),
It also explains the topology design terminologies such as:
1. Star
2. Full mesh
3. partial mesh
4. hybrid
This lecture explains the Wireless Technology, how Wireless Communicaiton takes place, half & full duplex wireless communication
This lecture explains about wireless access point (AP), Basic Service Set (BSS), Basic Service Area (BSA), BSSID, SSID, Distribution system (DS), ESS, and IBSS
Understanding Other Wireless Topologies in Non infrastructure mode such as:
1. Repeater
2. Workgroup bridge
3. outdoor bridge
4. mesh network
This lecture explains the RF Overview, how to measure it, Wireless Band and Channels.
This lecture explains the Access point and Wireless Standards such as 802.11,802.11b,802.11g,802.11a,802.11n,802.11ac,802.11ax)
This lecture explains how to secure a Wireless Connection by using:
1. Authentication
2. Encryption
3. Integrity
This lecture explains the Wireless Authentication methods such as
1. open
2. WEP
3. 802.1x
4. EAP
This lecture explains about EAP and its authentication methods such as:
1. Leap
2. EAP-Fast
3. PEAP
4. EAP-TLS
This lecture explains about TKIP (Temporal Key Integrity Protocol)
This lecture explains about CCMP & GCMP
This lecture explains about WPA, WPA2, and WPA3 wireless certifications
This lecture explains about different AP Types:
1. Autonomous
2.light Weight
3. Cloud Based AP
Understanding Light Weight AP(Access-point), WLC (Wireless LAN Controller), Control Plane and Data Plane
This lecture explains the Cloud Based AP Architecture and Securing WLAN
This lecture explains the Scaling of AP (Access Point) and WLC (Wireless LAN controller)
This lecture explains the Cisco WLAN Deployments options such as:
1. unified
2. cloud
3. embedded
4. Mobility express
5. Autonomous
This lecture explains Cisco LWAP AP Modes such as:
1. light weight
2. local
3. monitor
4. flexconnect
5. sniffer
6. rogue detector
7. bridge
8. flex+bridge
9. SE-connect
NOTE: Download Chapter 2 Slides PDF file from below "Downloadable Materials"
Understanding Router functionality
Understanding Longest Matching rule
Understanding IP routing process
Understanding Cisco Router Internal Process
Understanding Routing Table
Understanding Routing Protocol Basics
Understanding static and dynamic routing
Understanding static Routing
Understanding Default Route
Learn how to download and install GNS3 Software
Understand how to setup Lab topology and Download the IOS software from the "Resources" of this video file
Setup IPv4 Network Topology
Learn to configure static and default routing
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.