IT Networking for Cisco: (CCNA 200-120, 640-554, 640-721)

Learn to manage & troubleshoot the fundamentals of Cisco network from the ground up: networking, security, and wireless.
4.2 (49 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
1,275 students enrolled
$19
$120
84% off
Take This Course
  • Lectures 401
  • Length 13.5 hours
  • Skill Level All Levels
  • Languages English, captions
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 3/2015 English Closed captions available

Course Description

Welcome to IT Networking for Cisco: (CCNA 200-120, 640-554, 640-721) from LearnSmart.

Looking to become a Cisco Certified Network Associate and CCNA Certified in Routing & Switching, Security, Wireless?

This is the full Cisco training package that will prepare you to take the following exams: Cisco Exam 200-120? Cisco Exam 640-554? Cisco Exam 640-721?

By the end of the course you'll demonstrate your proficiency in the principles, techniques, and tools involved in install, configure, operate, and troubleshoot networks. Ultimately this training will establish your understanding of all the fundamental concepts within CCNA routing and switching, security, and wireless.

Course Overview:

These sections can be taken in any order, as a review of a particular concept or exam domain. However, if you are just becoming familiar with networking, security, and wireless, it is recommended that you view the courses sequentially.

In this course become familiar with the fundamental topics and skills required to install, operate, and troubleshoot a small to medium size enterprise branch network

Course Breakdown:

CCNA Routing & Switching (Section 1-10)
**Section 25: CCNA Routing and Switching: Test Me-Cisco 200-120 CCNA

Section 1: In the pre-assessment quiz you'll face questions from all sections of this training. Test your current knowledge and know your strengths and weaknesses.

Section 2: Understand the fundamentals of a network and learn about the operation of IP data networks, which will help administrators configure and troubleshoot issues moving forward.

Section 3: Review the topics of LAN switching, WAN technologies by taking a closer look at the particular variables of Ethernet, switching, broadcast and collision domains, and basic switching concepts.

Section 4: Take a look at both IPv4 and IPv6, and the role of IP addresses in network routing. Understand what subnetting and Variable Length Subnet Masks are.

Section 5: Study about system and network management, and discuss the fundamentals of how the router boot process works.

Section 6: Deepen your understanding of IP routing technologies and the fundamentals of how routing decisions are made within devices. Also focus on these particular routing protocols, EIGRP and OSPF, their fundamentals, and how to successfully configure each one.

Section 7: Concentrate on some IP services, and router and switch security. Learn about DHCP and how to configure it on a router.

Section 8: You will learn the skills to troubleshoot any router or switch issue. Walk through troubleshooting procedures and methodology. Explore how to troubleshoot IP addressing and switching problems, routing problems, as well as how to troubleshoot access control lists, WANs, and layer interface issues to enable efficient and secure network connectivity.

CCNA Security (640-554 IINS) (Section 9 - 10)
**Section 26: CCNA Security: Test Me-Cisco Exam CCNA Security 640-554 IINS

Section 9: In the pre-assessment quiz you'll face questions from all sections of this training. Test your current knowledge and know your strengths and weaknesses.

Section 10: Understand common security threats within a network and take a look at network and information security basics by learning some of the fundamental security principles. Learn how to secure the control, data and management planes on Cisco devices, including implementing security on Cisco routers.

Section 11: Take a look at the differences between TACACS and RADIUS by understanding what they offer as an authentication type, and how to configure each one. Review the examples of ways in which you can configure AAA, via the Command Line Interface and Cisco Configuration Professional, along with some verification commands.

Section 12: Access Control Lists (ACLs) help to mitigate threats against a network in a variety of ways. ACLs should be tested in a test environment prior to actually applying them and look at exactly what they are, what they do, and discuss the different types of ACLs and the role they play in security.

Section 13: Focus on securing the network management plane. Be able to define the management plane, and learn some best practices that can be used to make it more secure, such as strong passwords, AAA, Role Based Access Control, Syslog, and NTP. Then, you will learn to identify and study demonstrations of the different configurations that can be implemented on the management plane.

Section 14: Gain an in-depth understanding of these topics to determine how to best respond to layer 2 attacks.

Section 15: Cisco Firewall Technologies explains the different firewall technologies and the strengths and weaknesses that surround them.

Section 16: Cisco IPS discusses the differences between a Cisco IPS and Cisco IDS device, and some options that you have when deploying them in your network.

Section 17: Learn the basics of VPN technologies, and how IPSec works in a VPN tunnel setup. You will also look at the basics of cryptography in order to gain a better understanding of exactly what goes on behind the scenes of a VPN tunnel establishment. Finally, you will walk through different ways of implementing a site-to-site VPN and configured SSL VPN using the graphical device manager from an ASA.

CCNA Wireless (640-722 IUWNE)
(Section 18-24)
**Section 27: CCNA Wireless: Test Me-Cisco Exam CCNA Wireless 640-722 IUWNE

Section 18: In the pre-assessment quiz you'll face questions from all sections and topics of this training. Test your current knowledge and know your strengths and weaknesses.

Section 19: It's imperative for any network engineer to be familiar with the fundamental topics of a wireless network, including basic spread spectrum technology, the wireless regulatory bodies, and the impact of different wireless technologies.

Section 20: Installation of a Basic Cisco Wireless LAN discusses various best practices for Cisco Unified Wireless Network Architectures and provides demonstrations of installing and configuring autonomous access points, which operate on their own.

Section 21: Installation of Wireless Clients demonstrates the practical and theoretical basis from which you can effectively administer a wireless network.

Section 22: Basic WLAN Security provides a close up look at the implementation of security on the wireless network and some of the different aspects of wireless security.

Section 23: Basic WCS Operation demonstrates the configuration of access points and controllers in a WCS environment, how to audit them, and how to properly use heat maps for an environment in a wireless environment.

Section 24: Basic WLAN maintenance through the WCS and the WLC interface is critical knowledge that all network engineers must have.

*The content in this course aligns with from Cisco.

Recommendations:

Learn from others! Here are some reviews from the participants enrolled in this course (Click on reviews to see full list of reviews)

  • Smart method to learn - This course is helpful and using smart way to motivate thinking and understanding. The instructor has a professional delivery method, and the he materials are interesting and creative specially the flashcards and the exercises -- Ibrahim Alsayed
  • Great intro to CCNA - while this material can be pretty dry the instructor does a pretty good job of keeping the course interesting and informative. There is a lot of really good and easy to follow information. -- Sam Davidson
  • This CCNA course does an in depth coverage of the topics that you will need to know to pass the CCNA certification tests -- I highly recommend that anyone who wants to learn the material to take and pass the CCNA Exam, take this course. Those who master this course, will pass the exam on their first attempt. -- Bob Ziolkowski

What are the requirements?

  • No prerequisites for this course -A computer with internet.

What am I going to get from this course?

  • Test your knowledge and skills. Prove to yourself, and others, that you are ready for the Cisco Certified Network Associate (200-120) certification exam.
  • You’ll demonstrate your proficiency in the principles, techniques, and tools involved in install, configure, operate, and troubleshoot networks.
  • Our courseware is based on the CCNA (Interconnecting Cisco Networking Devices: Accelerated), the ICND1, and IND2 exam​ objectives
  • Become familiar with the client side of a wireless connection and how the client should be configured for wireless LAN access, as well as, how to properly configure various wireless clients.
  • Learn the fundamental topics of a wireless network, including basic spread spectrum technology, the wireless regulatory bodies, and the impact of different wireless technologies.
  • Test your knowledge and skills. Prove to yourself, and others, that you are ready for the Cisco Security Exam (640-554 IINS) certification exam.
  • You will learn about basic network and information security principles, and will be able to define what AAA is and going over some of its design considerations.
  • ACLs mitigate threats against a network in a variety of ways; we will be covering some of these ways in this course. You will be able to define the management plane and identify practices that can be used to make it more secure.
  • Test your knowledge and skills. Prove to yourself, and others, that you are ready for the Cisco Wireless Exam (640-722 IUWNE) certification exam.
  • Download extra printable and saveable PPT Slides, flash cards, games, and other supplemental materials within each section in our course.
  • Apply your knowledge througout the course with quick quizzes and be fully prepared for the Cisco exam with our final exam!
  • Communicate with the instructor and openly ask questions that will be addressed within 48 hours.
  • Participate in active discussions with other students & participants becoming Cisco Certified.

What is the target audience?

  • Professional who would like to prepare themselves for the Cisco Certified Network Associate (200-120), ICND1 (100-101), and/or the ICND2 (200-101) certification exams
  • Professional who would like to prepare themselves for the CCNA Security 640-554 IINS Certification Exam
  • Professional who would like to prepare themselves for the CCNA Wireless 640-722 IUWNE Certification Exam

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

01:13

This lecture contains an orientation on how to find the supplemental materials.

Section 1: Pre-Assessment: CCNA Routing & Switching
Pre-Assessment: CCNA Routing & Switching (CCNA 200-120)
15 questions
Section 2: Operation of IP Data Networks
01:46

The operation of I-P data networks, will provide you with a fundamental, theoretical overview of a network. In order configure and troubleshoot issues moving forward, understanding the fundamentals of a network is crucial.

This lecture will introduce you to the concept of IP Data Networks and how they operate.

Topics Covered Include:
  • Objectives
02:23

An internetwork is a group of devices, such as a printer, server, or a computer, that are grouped together and communicate with each other across one single network or many interconnected networks.

This lecture will discuss the definition of an Internetwork and how it pertains to an IP Data Network.

Topics Covered Include:
  • Types of Networks
  • Definitions
09:16

The Open Systems Interconnection Model, or OSI model is a theoretical model that relates to how data is transferred from one endpoint to another. There are seven layers, and each layer has an independent task in this process as well as specific protocols.

This lecture will discuss the operations within the OSI Model and how it works within an IP Data Network.

Topics Covered Include:
  • OSI Model
  • OSI Model
  • Port Numbers
  • TCP vs UDP
01:20

The TCP/IP suite is the most popular set of communications protocols used today. It is used both on the internet and on most networks around the world. At one point in time, there were other protocol suites, but nothing was quite as popular as TCP/IP.

This lecture will discuss the TCP and IP communication protocols and how they are used within IP Data Networks.

Topics Covered Include:
  • TCP/IP
02:01

This lecture will ask some sample questions.

00:49

This lecture will take you through some of the key points covered throughout the first portion of this section. Upon Completion of this section you will be prepared to move on to the second portion.

01:10

A broadcast domain is the device that hears all of the traffic that is being broadcast across the network, while attempting to reach all users on particular network segments. A collision domain is a division within a broadcast domain in which frames from one networked device could potentially collide with each other.

This lecture will discuss the differences between Broadcast and Collision Domains.

Topics Covered Include:
  • Collision Domain vs. Broadcast Domain
00:40

This lecture will discuss the three different types of traffic within an IP Data Network, Unicast traffic; Multicast traffic, and Broadcast traffic.

Topics Covered Include:
  • Data Transmission
05:02

There are numerous devices available that will transmit and receive network traffic. These devices include hubs, bridges, switches and routers. Some of these devices, such as a hub and a bridge, are not used as often as they used to be.

This lecture will discuss the network devices as well as how they are used.

Topics Covered Include:
  • Network Devices
06:14

Networks utilize different media types in order to transport data. The most predominant media type used is twisted pair copper cables. This type of cable is used for cabling in telephones and most Ethernet communications.

This lecture will discuss the Network Media Types and how they are used within IP Data Networks.

Topics Covered Include:
  • Network Media Types
  • Coaxial Types
01:09

This lecture will ask some sample questions.

01:05

This lecture will take you through some of the key points covered throughout the second portion of this section. Upon Completion of this section you will be prepared to move on to the next Section: LAN Switching and WAN Technologies.

Section Quiz
5 questions
Section 3: LAN Switching and WAN Technologies
00:30

This course will focus on the topics of LAN Switching and WAN Technologies. We'll look at the fundamentals of a network, particular variables Ethernets, switching, broadcasts and collision domains, and basic switching concepts.

This lecture will introduce you to LAN Switching and WAN Technologies and the concepts within it.

Topics Covered Include:
  • Objectives
07:12

Ethernet is an 802.3 (IEEE Standard), it is commonly used today and in order to use it a basic understanding of its fundamental is required. First, understanding that the frame contains the source and destination of the MAC address.

This lecture will discuss the meaning of the Ethernet and the importance of understanding its concepts.

Topics Covered Include:
  • Ethernet
  • SCMA/CD
02:04

There are two types of switching, packet and circuit switching. Packet Switching is when data is divided into packets and transmitted individually. Circuit Switching has a dedicated line allocated for transmission.

This lecture will discuss the different types of switching and what each of them mean.

Topics Covered Include:
  • Types of Switching
01:20

The system memory of a switch constructs a table to reference MAC Addresses for all incoming frames. When there is a match it goes out that port; however, there are times when it does not have a match.

This lecture will discuss what the CAM table is used for and what it does.

Topics Covered Include:
  • CAM Table
01:23

This lecture will ask some sample questions.

00:22

This lecture will take you through some of the key points covered throughout the first portion of this section. Upon Completion of this section you will be prepared to move on to the second portion.

00:20

This chapter will cover some very important concepts involved our layer 2 switching. Here is where we'll cover the definition and fundamentals of VLANs or Virtual Local Area Networks, trunking, and etherchannels.

This lecture will introduce you to VLANs and the components within it.

Topics Covered Include:
  • Objectives
04:39

A Virtual Local Area Network or VLAN is a way to logically segment networks into separate broadcast demands. This is a very important fact to remember, it is logical not physical. An administrator defines a number of switchboards that will be associated to a VLAN.

This lecture will discuss the ways a VLAN is defined and configured.

Topics Covered Include:
  • Define/Configure VLANs
  • Configure VLANs
  • Demonstration
05:40

VLAN Trunking Protocol (VTP) when configured on a switch will advertise its configuration information to neighboring switches, the ability enables all other switches in the network to learn the VLAN information dynamically.

This lecture will discuss the VLAN Trunking Protocol and what it is used for.

Topics Covered Include:
  • VLAN Trunking Protocol (VTP)
  • VTP Modes
  • VTP Settings
  • Demonstration
04:52

Trunking enable a switch router to send traffic to multiple VLANs across a link. The VLAN number is placed inside the Ethernet frame in order to identify which VLAN it belongs to when it traverses the trunk link. This referenced as a VLAN tag.

This lecture will discuss the uses of Trunking for VLANs and how to use them.

Topics Covered Include:
  • VLAN Trunking
  • Demonstration
03:07

Etherchannel is the ability to bundle multiple Ethernet links together to act as a single physical link. Fiber links are also capable of using Etherchannel, this is a huge advantage, especially in data centers or links to other switches.

This lecture will discuss the uses of Etherchannel and it different types.

Topics Covered Include:
  • Etherchannel
  • Etherchannel Types
  • Demonstration
01:09

This lecture will ask some sample questions.

00:24

This lecture will take you through some of the key points covered throughout the second portion of this section. Upon Completion of this section you will be prepared to move on to the third portion.

09:25

Let's dive into Spanning Tree Protocol and discuss some basic fundamentals and configuration. We will also take some time to cover RSTP and MSTP, which are more advanced spanning tree topics and built upon STP's base.

This lecture will introduce you to the Spanning Tree Protocol and its components.

Topics Covered Include:
  • Spanning Tree Topology
  • STP Timers
  • Demonstration
03:41

Because 802.1d STP is so slow, there was a push to improve spanning tree as a protocol as a whole. Rapid spanning tree, 802.1W, was developed in response to the inherent slowness, and included some other overall improvements in the protocol.

This lecture will discuss the inner workings of RSTP and why it was created.

Topics Covered Include:
  • New Port Types in (RSTP) 802.1w
  • New Port States in (RSTP) 802.1w
  • Multiple Spanning Tree (MST) 802.1s
  • Demonstration
00:52

This lecture will ask some sample questions.

00:26

This lecture will take you through some of the key points covered throughout the third portion of this section. Upon Completion of this section you will be prepared to move on to the fourth portion.

01:17

In this next chapter, we will talk about WAN in depth. Wide Area Networks are very important when it comes to larger networks that span large geographical regions, whether it be the internet or an enterprise.

This lecture will introduce you to Connection Technologies and its components.

Topics Covered Include:
  • Wide Area Network (WAN)
04:12

There are multiple connection technologies. Leased lines are a point-to-point connection between two endpoints. These are generally very expensive because they are dedicated links for these two endpoints.

This lecture will discuss the different types of connection technologies and what they do.

Topics Covered Include:
  • Connection Technologies
00:42

This lecture will ask some sample questions.

00:22

This lecture will take you through some of the key points covered throughout the fourth portion of this section. Upon Completion of this section you will be prepared to move on to the fifth portion.

05:33

This chapter will focus on how to configure WANs. First, we will configure a basic WAN serial connection. Then we will set up a basic point-to-point protocol, or P-P-P connection between two Cisco routers, and then look at configuring frame relay on Cisco routers.

This lecture will introduce you to configuring WANs and the components within.

Topics Covered Include:
  • WAN Serial Connections
  • WAN Serial Connection
  • Verification
  • Demonstration
04:55

PPP can be configured quite easily, and there are authentication tools that can be used to make sure the link is secure. Password authentication protocol, or PAP (pap), can be used between the links, so can challenge handshake authentication protocol, or CHAP (chap).

This lecture will discuss the ways of configuring the Point to Point Protocol.

Topics Covered Include:
  • PPP
  • Configuring PPP
  • Verifying PPP
  • Demonstration
04:55

With frame relay, you have another option to configure. Routers locally are DTE and LMI message, and keepalives are sent to setup and maintain the link called a virtual circuit with the remote router, which is usually a Telco.

This lecture will discuss what a frame relay is and the components within it.

Topics Covered Include:
  • Frame Relay
  • Configuring Frame Relay
  • Demonstration
01:13

This lecture will ask some sample questions.

00:19

This lecture will take you through some of the key points covered throughout the fifth portion of this section. Upon Completion of this section you will be prepared to move on to the sixth portion.

00:53

In this last chapter, we will talk about PPP over Ethernet, or simply called PPPOE, including a basic description of PPPOE and how to implement and troubleshoot it. PPP over Ethernet creates a PPP encapsulated tunnel over Ethernet.

This lecture will introduce you to PPPoE and the components within it.

Topics Covered Include:
  • Objectives
  • PPPoE
01:09

There are several configuration steps in creating a PPPoE tunnel. You must first define the dialer interface, which is simply a virtual interface. You can set up PPP encapsulation and discuss with the ISP on how you want to work an IP address scheme.

This lecture will discuss the ways of configuring PPPoE and how it is used.

Topics Covered Include:
  • Configuring PPPoE
02:34

In verifying and troubleshooting PPPoE, a few commands are helpful. “Show running-config” and “show IP interface brief” will help you identify link status, along with configuration information.

This lecture will discuss the ways of verifying and troubleshooting PPPoE.

Topics Covered Include:
  • Troubleshooting PPPoE
  • Demonstration
01:04

This lecture will ask some sample questions.

00:21

This lecture will take you through some of the key points covered throughout the sixth portion of this section. Upon Completion of this section you will be prepared to move on to the next Section: IPv4 and IPv6.

Section Quiz
5 questions
Section 4: IPv4 and IPv6
00:37

In this course, we will review the types of classes in both IPv4 and IPv6. We'll take a look at subnetting and Variable Length Subnet Masks, or VLSM. Finally, we will look at the structure of the IPv6 address, define several types of IPv6 addresses, and then configure an IPv6 address.

This lecture will introduce you to IPv4 and IPv6 and the components within them.

Topics Covered Include:
  • Introduction
  • Course Objectives
01:28

Internet protocol, or IP, defines the logical network layer address that will identify a host or a router interface that connects to a TCP/IP network. Think of an IP address like a mailing address for a data network.

This lecture will discuss the inner workings of IP Addresses and what they do.

Topics Covered Include:
  • IP Address
  • IP Addresses
04:01

There are 5 network classes, splitting up the network availability for each class. Since the first octet, like all of them, adds up to 255, we will look at how they split up. A Class A network's first octet range is 1 through 126.

This lecture will discuss the different Classful Networks and how they are divided.

Topics Covered Include:
  • Classful Networks
  • Network Address
01:26

IPv4 would have eventually run out if a solution wasn't found to eliminate the waste. One of the solutions was to subnet normal classful networks. Subnetting breaks down a Class A, Class B or Class C network even further to accommodate the number of IP addresses needed for each request.

This lecture will discuss the ways of subnetting the IP Addresses.

Topics Covered Include:
  • Subnetting
02:00

Once a company gets a publically routable IP address, or their own internal IP addressing scheme, it's time to develop a subnet plan to further break down the ranges for better use. This is called Variable Length Subnet Masking, or VLSM.

This lecture will discuss the necessity for an organization to obtain an IP Address and how it is used.

Topics Covered Include:
  • VLSM
  • VLSM
  • Best Practices
01:37

This lecture will ask some sample questions.

00:30

This lecture will take you through some of the key points covered throughout the first portion of this section. Upon Completion of this section you will be prepared to move on to the second portion.

00:57

IPv6 is becoming more popular, simply because there aren't any new addresses available to give out. Now, don't panic -- IPv4 is not going away entirely. It may down the road, but for right now, we will continue to use it.

This lecture will introduce you to IPv6 and the components within it.

Topics Covered Include:
  • Introduction
  • Objectives
03:25

IPv6 is meant to be a replacement for IPv4. IPv6 is a 128 bit address, compared to IPv4's 32 bit address. There is significantly more address availability for IPv6. IPv6 has approximately 3.4×1038 usable addresses, or more than 7.9×1028 times as many as IPv4.

This lecture will discuss the basics of IPv6 and how it is used.

Topics Covered Include:
  • Overview of IPv6
  • Impacted Variables
  • IPv6 Address
04:09

Addressing for IPv6 uses hexadecimal, 8 sets of 4 hex digits to be exact. Each set is separated by a colon, instead of a period like in IPv4. IPv6 came out with the option of abbreviating the addresses to make it easier to read.

This lecture will discuss the concept of addressing within IPv6.

Topics Covered Include:
  • IPv6 Addressing
  • Determining Network and Host Portions
01:32

IPv6 also has types of addresses, just like IPv4. They are referred to as Global Unicast and Unique Local. Subnetting can still be done within these types of addresses, but we'll discuss that a little later.

This lecture will discuss the global unicast address, and what it does.

Topics Covered Include:
  • Global Unicast
  • Example
01:08

Unique Local Unicast addresses act as private IPv6 addresses, just like IPv4 has a group of private addresses. They do have similarities to Global Unicast in how to subnet, but they are not registered with IANA, and they can be used internally.

This lecture will discuss the unique local unicast address, and what it does.

Topics Covered Include:
  • Unique Local Unicast
  • Creating a Unique Local Unicast Address
01:46

Link-local addresses are not used for normal traffic. They are used for protocols to communicate with each other and for routing purposes. Packets that are sent to a link-local address do not leave the subnet. Each IPv6 host has a link-local address, in addition to the other IPv6 addresses.

This lecture will discuss the link local address, and what it does.

Topics Covered Include:
  • Link-Local Addresses
01:22

EUI-64 stands for Extended Unique Identifier, which is an option to create and configure a stable and predictable IPv6 interface address. The MAC (mack) address is a part of this interface ID, and is easily recognizable because there is an FFFE hex group added to the address.

This lecture will discuss the EUI-64, and what it does.

Topics Covered Include:
  • EUI-64
  • Example
00:57

Route Solicitation messages ask routers to identify themselves. Route Advertisement messages are facts sent about the router, such as their link local address. There are also Neighbor Solicitation and Advertisement messages, which act like ARP requests by listing MAC (mack) addresses.

This lecture will discuss the Auto-Configuration, and what it does.

Topics Covered Include:
  • Auto-Configuration
02:24

Multicasting is better than broadcasting due to the fact that we do not want to flood traffic out to hosts that need it. Instead, we want to send a single, targeted message from one source to multiple destinations.

This lecture will discuss the Multicast, and what it does.

Topics Covered Include:
  • Important Multicast Addresses
  • Demonstration
00:54

This lecture will ask some sample questions.

00:36

This lecture will take you through some of the key points covered throughout the second portion of this section. Upon Completion of this section you will be prepared to move on to the next Section: System and Network Management.

Section Quiz
5 questions
Section 5: System and Network Managment
00:52

In this course, we'll talk about system and network management and discuss the fundamentals of how the router boot process works. But first, we are going take a look at how an IOS (EYE-OSE) device boots up, as well as the boot loader and operating system that is on these devices.

This lecture will introduce you to Router Startup.

Topics Covered Include:
  • Introduction
02:49

Similar to a desktop or laptop computer, all Cisco routers and switches go through the Power on Self-Test. This ensures all hardware components are detected and that they are in working order.

This lecture will discuss the router boot process, and what it is used for.

Topics Covered Include:
  • Power on Self-Test (POST)
  • POST Process
03:21

IOS (EYE-OSE) is the operating system that a Cisco router or switch uses for operation. The IOS (EYE-OSE) can be loaded into flash, and you have the ability to tell the router to boot from there in order to gain access to that operating system.

This lecture will discuss the Cisco IOS Images, and what they do.

Topics Covered Include:
  • Cisco IOS Images
  • IOS Configuration Commands
03:52

The configuration register is used by routers to find configuration settings at boot time. This occurs right before the router loads both the IOS (EYE-OSE) and the startup-configuration file. This command can be changed in case you choose to boot into Rom-Monitor.

This lecture will discuss configuration register, and what it does.

Topics Covered Include:
  • Configuration Register
  • Demonstration
02:27

There are several different configuration files that you need to be familiar with. The startup-configuration file is the initial configuration of the device and is stored in NVRAM. Startup-configuration will be loaded into RAM (ram) when the device first boots up.

This lecture will discuss the configuration files, and what they will be used for.

Topics Covered Include:
  • Configuration Files
00:58

This lecture will ask some sample questions.

00:33

Now, let's take a look at some basic router and switch management skills. We'll start by reviewing the setup mode process we talked about previously and what setup mode actually asks you to do.

This lecture will introduce you to basic router and switch management.

Topics Covered Include:
  • Introduction
00:54

When a router or a switch boots for the first time, the startup configuration is empty. The Setup mode will then prompt you to enter the configuration. You will be asked a series of questions that the IOS (EYE-OSE) will guide you through to give your device a basic configuration.

This lecture will discuss the initial setup for router and switch management.

Topics Covered Include:
  • Initial Setup
01:05

There are two types of modes on a device. The first mode is called user EXEC mode. User EXEC mode is what you will see when you receive your first prompt on a device. Here, you can view basic items, with some show commands.

This lecture will discuss the mode on a device, and how to manage the routers and switches within them.

Topics Covered Include:
  • Device Modes
04:46

To shorten your keystrokes when typing in a command, you can hit the tab key to finish the command. For example, if you type 'config t' and hit tab, it will complete the word with terminal. This will not work if there is no command to reference or if there is more than one option for 't'.

This lecture will discuss the IOS Commands, and how they are used.

Topics Covered Include:
  • IOS Commands
  • Demonstration
03:20

The first type of access is called console access. This local access is through a console cable that connects physically to a specific port labeled on your device. Every new device provided by Cisco ships with a console cable.

This lecture will discuss the access within devices, and how they are used.

Topics Covered Include:
  • Device Access
  • Demonstration
02:11

Ping is an ICMP protocol, and uses ICMP messages for requests and replies. You can ping the device by its name or the IP address of the destination. You can send echo requests as well, with the default being 5 on Cisco devices.

This lecture will discuss testing connectivity, and what the results are use for.

Topics Covered Include:
  • Ping
  • Traceroute
  • Telnet and SSH
01:08

This lecture will ask some sample questions.

00:27

This lecture will take you through some of the key points covered throughout the second portion of this section. Upon Completion of this section you will be prepared to move on to the third portion.

00:25

Now, let's dive into some basic network management tools, using protocols like Syslog and SNMP. This is very important for many engineers, especially during troubleshooting. It's imperative to know how to configure this correctly so you can see information properly from your devices.

This lecture will introduce you to Basic Network management.

Topics Covered Include:
  • Introduction
02:07

Cisco devices monitor and report on many events that occur throughout a time period. They range from very important to very irrelevant, depending on your task. You can see these messages in real time via the output.

This lecture will discuss Syslog, and what it is used for.

Topics Covered Include:
  • Syslog
03:23

SNMP is communications in which you define, between a manager and agents. A manager is a network management entity that monitors and manages groups of hosts and devices.

This lecture will discuss SNMP, and how it is used.

Topics Covered Include:
  • SNMP
  • SNMPv2
  • SNMPv3
00:53

This lecture will ask some sample questions.

00:22

Now, let's take some time to discuss Netflow. We'll define Netflow and discuss its importance. Be sure to keep this thought in mind -- In a network environment of any size, any statistical data you can retrieve from it is important.

This lecture will introduce you to netflow.

Topics Covered Include:
  • Introduction
01:12

Engineers need the ability to monitor their network with as much statistical data as possible. One of the best ways to monitor the network is by seeing real time data, so that constant analysis and focus can be kept on performance and security.

This lecture will give an overview of Netflow.

Topics Covered Include:
  • Overview of Netflow
00:54

Netflow can analyze applications and provide a fundamental baseline as to how your network is operating on a daily and normal level. Consistent data taken over a stretch of time can help you look at bottlenecks in your network and determine if there is room for network design and redesign.

This lecture will discuss the reasons for using netflow.

Topics Covered Include:
  • Why Use NetFlow?
01:45

When configuring Netflow, there are some parameters to consider. Take time to review the configurations in order to receive proper Netflow statistical data from as many devices as possible, which will ensure optimal network performance.

This lecture will discuss the ways of configuring Netflow.

Topics Covered Include:
  • Configuring NetFlow
  • Demonstration
00:55

This lecture will ask some sample questions.

00:51

This lecture will take you through some of the key points covered throughout the fourth portion of this section. Upon Completion of this section you will be prepared to move on to the next Section: IP Routing Technologies.

Section Quiz
5 questions
Section 6: IP Routing Technologies
01:40

Welcome to 'IP Routing Technologies'. In this course, we will cover IP routing technologies and the fundamentals of how routing decisions are made within devices.

This lecture will introduce you to IP Routing Technologies.

Topics Covered Include:
  • Introduction
01:07

CEF was introduced in the 1990's and replaced the existing internal routing logics of process switching and fast switching. But, why? Well, as you know, the faster a router can process data, the better. CEF optimized the internal processes of how a router forwards data.

This lecture will discuss CEF, and what it is used for.

Topics Covered Include:
  • Cisco Express Forwarding (CEF)
03:08

What does a device need to do in order to properly route its packets? Well, a router needs to have routes to remote networks in a routing table which point to the correct interface to send the data to in order to reach the destination network.

This lecture will discuss packet forwarding, and how it is used.

Topics Covered Include:
  • Packet Forwarding
  • Route Summarization

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

LearnSmart LLC, Smarter Training. Never Open a Textbook Again.

LearnSmart has served the learning community with high-quality professional skills and IT certification training since 1997. In that time, the company has helped thousands earn career-related certifications from respected vendors, such as Project Management Institute (PMI)®, Cisco, Microsoft, CompTIA, Oracle, and EC-Council. LearnSmart offers over 1,000 courses covering IT, project management, administrative, HR, and workplace safety topics. With a rapidly growing clientele of individuals and corporations, LearnSmart serves a broad range of Fortune 500 companies to universities, as well as government institutions and the armed forces.

LearnSmart is able to meet diverse career and learning needs through its extensive selection of training. LearnSmart uses industry experts to give learners the most up-to-date content in a video format as well as training resources including; reference tools, pretests, study guides and labs. For more information about how we can help pinpoint and solve your individual or multi-user training challenges.

PMI is a registered trademark of the Project Management Institute, Inc.

Ready to start learning?
Take This Course