RIA

Best CCNA Training in Marathahalli

Best CCNA Training in Marathahalli

The fastest-growing job sector in the world – IT is demanding more CCNA professionals in its platform. Getting the best CCNA training in Marathahalli unbolts real valuable skills that enable you to lock exciting career openings. If you are bewildered about where to start, then our comprehensive course is designed to give you the best concepts that you can apply in the job locale. Even though this is an entry-level course, it is difficult to manage it without expert guidance. We provide best hardware and networking training in Marathahalli

Best CCNA Training in Marathahalli

Why Get CCNA Training in Marathahalli

CCNA certification will give you an instant vacation boost even if you are an experienced professional in the field. This networking profession is one of the most relevant courses to study in this current IT scenario.

  • CCNA certificate is accepted all around the world, hence getting the best CCNA training in Marathahalli will improve your chances of getting high pay and more opportunities.
  • It validates your knowledge in networking and makes you unavoidable competent. It becomes the first stepping stone to learn the rest of the networking programs.
  • In CCNA training in Marathahalli, we utilize the latest networking with automation and digitalization that permits you to overcome the challenges. It has remarkable features that make you stand out in the job market.
  • CCNA profession helps you to achieve more impressive rewards and top positions in IT companies. This in-depth course gives you obligatory computer skills that make it the best IT course to master.
  • After the course, you can land on positions like network engineer, network administrator, etc.

Why choose RIA CCNA training in Marathahalli ?

In our institute of CCNA training in Marathahalli, we aid you with flexible timings to accommodate both professionals and freshers who need real-time experience in the subject. We have flexible batches and classes that will be provided on all weekdays and weekends. Corresponding to your schedule you can choose and even enroll in our Fast track course that allows you to complete the course within a short period of time. In our CCNA training in Marathahalli, there will be an open platform for you to engage with our instructors and peers freely.

We are strong advocates of applied learning and nourish a platform where you can exercise the theories that you study in the classroom. We employ advanced tools to explore more into the field of CCNA and we attend to enhance your decision-making capabilities. In our CCNA training in Marathahalli, we have the best-certified professionals who will aid you throughout the course. We have trained more than 100+ students over the course of a decade and efforts to give you a novel experience of learning. Furthermore, if you need project assistance, that also will be provided by our experts. RIA’s best CCNA training in Marathahalli covers all the vital concepts of the framework.

Course Summary

We provide you a comprehensive course that covers the fundamentals of networking, Subnetting, advanced technologies that makes you capable of accessing networks, IP connectivity technologies, infrastructure security, and so on. In RIA CCNA training in Marathahalli, our teachers teach you the complex WAN technologies, troubleshooting, and many more. 

SYLLABUS
  • Recognize the purpose and functions of various network devices such as routers, switches, bridges and hubs
  • Describe the purpose and basic operation of the protocols in the OSI and TCP/IP models
  • Identify the appropriate media, cables, ports, and connectors to connect Cisco network devices to other network devices and hosts in a LAN
  • Determine the technology and media access control method for Ethernet networks
  • Identify basic switching concepts and the operation of Cisco switches
  • Configure and verify initial switch configuration including remote access management 
  • 2.a hostname
  • 2.b mgmt IP address
  • 2.c IP default-gateway
  • 2.d local user and password
  • 2.e enable secret password
  • 2.f console and VTY logins
  • 2.g exec-timeout
  • 2.h service password encryption
  • 2.i copy run start
  • 2.6 Configure and verify VLANs
  • 2.8 Identify enhanced switching technologies
  • 2.8.a RSTP
  • 2.8.b PVSTP
  • 2.8.c Etherchannels
  • 2.9 Configure and verify PVSTP operation
  • 2.9.a Describe root bridge election
  • 2.9.b Spanning tree mode
  • 3.1 Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment
  • 3.2 Identify the appropriate IPv4 addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment.
  • 3.3 Describe the technological requirements for running IPv6 in conjunction with IPv4
  • 3.4.a dual stack
  • 3.5 Describe IPv6 addresses
  • 3.5.a global unicast
  • 3.5.b multicast
  • 3.5.c link local
  • 3.5.d unique local
  • 3.5.e eui 64
  • 3.5.f auto-configuration
  • 4.1.a packet forwarding
  • 4.1.b router lookup process
  • 4.1.c Process Switching/Fast Switching/CEF
  • 4.2 Configure and verify utilizing the CLI to set basic Router configuration
  • 4.2.a hostname
  • 4.2.b local user and password
  • 4.2.c enable secret password
  • 4.2.d console and VTY logins
  • 4.2.e exec-timeout
  • 4.2.f service password-encryption
    • 4.2.g Interface IP Address      
      4.2.g [i] loopback
  • 4.2.h banner
  • 4.2.i motd
  • 4.2.j copy run start
  • 4.3 Configure and verify operation status of a device interface
  • 4.3.a Serial
  • 4.3.b Ethernet
  • 4.4 Verify router configuration and network connectivity using
    • 4.4.a ping   
      4.4.a [i] extended
  • 4.4.b traceroute
  • 4.4.c telnet
  • 4.4.d SSH
  • 4.4.e sh cdp neighbors
  • 4.5 Configure and verify routing configuration for a static or default route given specific routing requirements
  • 4.6 Differentiate methods of routing and routing protocols
  • 4.6.a Static versus Dynamic
  • 4.6.b Link state versus Distance Vector
  • 4.6.c next hop
  • 4.6.d ip routing table
  • 4.6.e Passive Interfaces (how they work)
  • 4.6.f Admin Distance
  • 4.6.g split-horizon
  • 4.6.h metric
  •  4.7 Configure and verify OSPF
  • 4.7.a Benefit of a single area
  • 4.7.b Configure OSPv2
  • 4.7.c Configure OSPv3
  • 4.7.d Router ID
  • 4.7.e Passive Interface
  • 4.7.f Discuss multi-area OSPF
  • 4.7.g Understand LSA types and purpose
  • 4.8 Configure and verify interVLAN routing (Router on a stick)
  • 4.8.a sub interfaces
  • 4.8.b upstream routing
  • 4.8.c encapsulation
  • 4.9 Configure SVI interfaces
  • 4.10 Manage Cisco IOS Files
  • 4.10.a Boot Preferences
  • 4.10.b Cisco IOS Images (15)
  • 4.10.c Licensing    
    • 4.10.c [i] Show license
    • 4.10.c [ii] Change license
  • 4.11 Configure and verify EIGRP (single AS)
  • 4.11.a Feasible Distance/Feasible Successors/Administrative distance
  • 4.11.b Feasibility condition
  • 4.11.c Metric composition
  • 4.11.d Router ID
  • 4.11.e auto-summary
  • 4.11.f Path Selection
  • 4.11.g Load Balancing    
    •  4.11.g [i] Unequal
    • 4.11.g [ii] Equal
  • 5.1.a packet forwarding
  • 5.1.b router lookup process
  • 5.1.c Process Switching/Fast Switching/CEF
  • 5.2 Configure and verify utilizing the CLI to set basic Router configuration
  • 5.2.a hostname
  • 5.2.b local user and password
  • 5.2.c enable secret password
  • 5.2.d console and VTY logins
  • 5.2.e exec-timeout
  • 5.2.f service password-encryption
  • 5.2.g Interface IP Address      
    • 5.2.g [i] loopback
  • 5.2.h banner
  • 5.2.i motd
  • 5.2.j copy run start
  • 5.3 Configure and verify operation status of a device interface
  • 5.3.a Serial
  • 5.3.b Ethernet
  • 5.4 Verify router configuration and network connectivity using
  • 5.4.a ping    
    • 4.4.a [i] extended
  • 5.4.b traceroute
  • 5.4.c telnet
  • 5.4.d SSH
  • 5.4.e sh cdp neighbors
  • 5.5 Configure and verify routing configuration for a static or default route given specific routing requirements
  • 5.6 Differentiate methods of routing and routing protocols
  • 5.6.a Static versus Dynamic
  • 5.6.b Link state versus Distance Vector
  • 5.6.c next hop
  • 5.6.d ip routing table
  • 5.6.e Passive Interfaces (how they work)
  • 5.6.f Admin Distance
  • 5.6.g split horizon
  • 5.6.h metric
  • 5.7 Configure and verify OSPF
  • 5.7.a Benefit of single area
  • 5.7.b Configure OSPv2
  • 5.7.c Configure OSPv3
  • 5.7.d Router ID
  • 5.7.e Passive Interface
  • 5.7.f Discuss multi-area OSPF
  • 5.7.g Understand LSA types and purpose
  • 5.8 Configure and verify interVLAN routing (Router on a stick)
  • 5.8.a sub interfaces
  • 5.8.b upstream routing
  • 5.8.c encapsulation
  • 5.9 Configure SVI interfaces
  • 5.10 Manage Cisco IOS Files
  • 5.10.a Boot Preferences
  • 5.10.b Cisco IOS Images (15)
  • 5.10.c Licensing 
    • 4.10.c [i] Show license
  • 5.10.c [ii] Change license
  • 5.11 Configure and verify EIGRP (single AS)
  • 5.11.a Feasible Distance/Feasible Successors/Administrative distance
  • 5.11.b Feasibility condition
  • 5.11.c Metric composition
  • 5.11.d Router ID
  • 5.11.e auto-summary
  • 5.11.f Path Selection
  • 5.11.g Load Balancing
    • 4.11.g [i] Unequal
    • 4.11.g [ii] Equal
  • 5.1.a packet forwarding
  • 5.1.b router lookup process
  • 5.1.c Process Switching/Fast Switching/CEF
  • 5.2 Configure and verify utilizing the CLI to set basic Router configuration
  • 5.2.a hostname
  • 5.2.b local user and password
  • 5.2.c enable secret password
  • 5.2.d console and VTY logins
  • 5.2.e exec-timeout
  • 5.2.f service password-encryption
  • 5.2.g Interface IP Address      
    • 5.2.g [i] loopback
  • 5.2.h banner
  • 5.2.i motd
  • 5.2.j copy run start
  • 5.3 Configure and verify operation status of a device interface
  • 5.3.a Serial
  • 5.3.b Ethernet
  • 5.4 Verify router configuration and network connectivity using
  • 5.4.a ping    
    • 4.4.a [i] extended
  • 5.4.b traceroute
  • 5.4.c telnet
  • 5.4.d SSH
  • 5.4.e sh cdp neighbors
  • 5.5 Configure and verify routing configuration for a static or default route given specific routing requirements
  • 5.6 Differentiate methods of routing and routing protocols
  • 5.6.a Static versus Dynamic
  • 5.6.b Link state versus Distance Vector
  • 5.6.c next hop
  • 5.6.d ip routing table
  • 5.6.e Passive Interfaces (how they work)
  • 5.6.f Admin Distance
  • 5.6.g split horizon
  • 5.6.h metric
  • 5.7 Configure and verify OSPF
  • 5.7.a Benefit of single area
  • 5.7.b Configure OSPv2
  • 5.7.c Configure OSPv3
  • 5.7.d Router ID
  • 5.7.e Passive Interface
  • 5.7.f Discuss multi-area OSPF
  • 5.7.g Understand LSA types and purpose
  • 5.8 Configure and verify interVLAN routing (Router on a stick)
  • 5.8.a sub interfaces
  • 5.8.b upstream routing
  • 5.8.c encapsulation
  • 5.9 Configure SVI interfaces
  • 5.10 Manage Cisco IOS Files
  • 5.10.a Boot Preferences
  • 5.10.b Cisco IOS Images (15)
  • 5.10.c Licensing 
    • 4.10.c [i] Show license
  • 5.10.c [ii] Change license
  • 5.11 Configure and verify EIGRP (single AS)
  • 5.11.a Feasible Distance/Feasible Successors/Administrative distance
  • 5.11.b Feasibility condition
  • 5.11.c Metric composition
  • 5.11.d Router ID
  • 5.11.e auto-summary
  • 5.11.f Path Selection
  • 5.11.g Load Balancing
    • 4.11.g [i] Unequal
    • 4.11.g [ii] Equal
  • 6.1 Configure and verify DHCP (IOS Router)
  • 6.1.a Configuring router interfaces to use DHCP
  • 6.1.b DHCP options (Basic overview and functionality)
  • 6.1.c Excluded addresses
  • 6.1.d Lease time
  • 6.2 Describe the types, features, and applications of ACLs
  • 6.2.a standard (editing and sequence numbers)
  • 6.2.b extended
  • 6.2.c named
  • 6.2.d numbered
  • 6.2.e Log option
  • 6.3 Configure and verify ACLs in a network environment
  • 6.3.a named
  • 6.3.b numbered
  • 6.3.c Log option
  • 6.4 Identify the basic operation of NAT
  • 6.4.a purpose
  • 6.4.b pool
  • 6.4.c static
  • 6.4.d 1 to 1
  • 6.4.e overloading
  • 6.4.f source addressing
  • 6.4.g one way NAT
  • 6.5 Configure and verify NAT for given network requirements
  • 6.6 Configure and verify NTP as a client.
  • 7.1.a Device password security
  • 7.1.b enable secret versus enable
  • 7.1.c Transport
  • 7.1.c.1 disable telnet
  • 7.1.c.2 SSH
  • 7.1.d VTYs
  • 7.1.e physical security
  • 7.1.f service password
  • 7.1.g Describe external authentication methods
  • 7.2 Configure and verify Switch Port Security
  • 7.2.a Sticky mac
  • 7.2.b MAC address limitation
  • 7.2.c static/dynamic
  • 7.2.d violation modes    
    • 7.2.d [i] err disable
    • 7.2.d [ii] shutdown
    • 7.2.d [iii] protect restrict
  • 7.2.e shutdown unused ports
  • 7.2.f err disable recovery
  • 7.2.g assign unused ports in unused VLANs
  • 7.2.h putting Native VLAN to other than VLAN 1
  • 7.3 Configure and verify ACLs to filter network traffic
  • 8.1.a Metro ethernet
  • 8.1.b VSAT
  • 8.1.c Cellular 3g/4g
  • 8.1.d MPLS
  • 8.1.e T1/E1
  • 8.1.f ISDN
  • 8.1.g DSL
  • 8.1.h Frame relay
  • 8.1.i Cable
  • 8.1.j VPN
  • 8.2 Configure and verify a basic WAN serial connection
  • 8.3 Configure and verify a PPP connection between Cisco routers
  • 8.4 Configure and verify Frame Relay on Cisco routers 
  • 8.5 Implement and troubleshoot PPPoE
×