Module 1. Network Fundamentals
Explain the role and function of network components and network topology architectures.
Compare physical interface and cabling type. Compare TCP to UDP. Configure and verify
IPv4 addressing and subnetting. Configure and verify IPv6 addressing and prefix. Describe
wireless principles. Explain virtualization fundamentals (virtual machines). Describe
Module 2. Network Access
Configure and verify VLANs (normal range) spanning multiple switches. Configure and verify
interswitch connectivity. Configure and verify Layer 2 discovery protocols (Cisco Discovery
Protocol and LLDP). Configure and verify (Layer 2/Layer 3) EtherChannel (LACP). Describe
the need for and basic operations of Rapid PVST+ Spanning Tree Protocol and identify
basic operations. Compare Cisco Wireless Architectures and AP modes. Describe AP and
WLC management access connections (Telnet, SSH, HTTP, HTTPS, console, and
Module 3. IP Connectivity
Interpret the components of routing table. Determine how a router makes a forwarding
decision by default. Configure and verify IPv4 and IPv6 static routing. Configure and verify
single area OSPFv2. Describe the purpose of first hop redundancy protocol.
Module 4. IP Services
Configure and verify inside source NAT using static and pools. Explain the role of DHCP and
DNS within the network. Explain the function of SNMP in network operations. Describe the
use of syslog features including facilities and levels. Explain the forwarding per-hop
behaviour (PHB) for QoS such as classification, marking, queuing, congestion, policing,
shaping. Configure network devices for remote access using SSH. Describe the capabilities
and function of TFTP/FTP in the network.
Module 5. Security Fundamentals
Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques).
Describe security password policies elements, such as management, complexity, and
password alternatives (multifactor authentication, certificates, and biometrics). Describe
remote access and site-to-site VPNs. Configure and verify access control lists. Configure
Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security).
Differentiate authentication, authorization, and accounting concepts. Describe wireless
security protocols (WPA, WPA2, and WPA3)
Module 6. Automation and Programmability
Explain how automation impacts network management. Compare traditional networks with
controller-based networking. Describe controller-based and software defined architectures
(overlay, underlay, and fabric). Compare traditional campus device management with Cisco
DNA Centre enabled device management. Describe characteristics of REST-based APIs
(CRUD, HTTP verbs, and data encoding). Recognize the capabilities of configuration
management mechanisms Puppet, Chef, and Ansible. Interpret JSON encoded data.