Orange High School
400 Lincoln Avenue, Orange NJ 07050
- Orange High School
- CCNA I & II
Jean, Ederson- CTE CISCO
Page Navigation
-
Orange High School
Course Outline/Syllabus
CCNA I & II
Instructor: Mr. Ederson Jean Planning Period:
Email: Jeaneder@orange.k12.nj.us Classroom #: 112
Phone #: (973)-677-4050 Principal: Mr. Jason Belton
Parents are encouraged to contact me regarding any questions or concerns regarding their children in my class. You can reach me at my email address or you can leave a message at 973)677-4050. I will do my best to return emails and/or phone calls within 48 hours.
Course Description:
CCNAv7 Curriculum Description
In this curriculum, Cisco Networking Academy™ participants develop workforce readiness skills and build a foundation for success in networking-related careers and degree programs. With the support of video and rich interactive media, participants learn, apply, and practice CCNA knowledge and skills through a series of in-depth hands-on experiences and simulated activities that reinforce their learning. Upon completion of all three course offerings, learners will be prepared to take the Cisco CCNA Unified certification exam.
CCNAv7 teaches comprehensive networking concepts and skills, from network applications to the protocols and services provided to those applications. Learners will progress from basic networking to more complex enterprise and theoretical networking models later in the curriculum.
CCNAv7 includes the following features:
- There are three offerings that make up the CCNAv7 curriculum.
- The three offerings align to and cover the competencies outlined for the CCNA Certification Exam.
- Each offering is comprised of multiple modules. Each module is comprised of topics.
- Modules emphasize critical thinking, problem-solving, collaboration, and the practical application of skills.
- Each topic includes a Check Your Understanding interactive quiz, or some other way to assess understanding, such as a lab or
a Packet Tracer. These topic-level assessments are designed to tell learners if they have a good grasp of the topic content, or if they need to review before continuing. Learners can ensure their level of understanding well before taking a graded quiz or exam. Check Your Understanding quizzes do not affect the learner’s overall grade.
- Students learn the basics of routing, switching, and advanced technologies to prepare for the Cisco CCNA exam, networking related degree programs, and entry-level networking careers.
- The language used to describe networking concepts is designed to be easily understood by learners at all levels and embedded
interactive activities help reinforce comprehension.
- Assessments and practice activities are focused on specific competencies to increase retention and provide flexibility in the
learning path.
- Multimedia learning tools, including videos, games, and quizzes, address a variety of learning styles and help stimulate learning
and promote increased knowledge retention.
- Hands-on labs and Cisco® Packet Tracer simulation-based learning activities help students develop critical thinking and complex
problem-solving skills.
- Embedded assessments provide immediate feedback to support the evaluation of knowledge and acquired skills.
- Cisco Packet Tracer activities are designed for use with the latest version of Packet Tracer.
- Oracle VirtualBox, the most recent version.
- Wireshark version 2.5 or higher.
CCNAv7: Introduction to Networks (ITN) Outline
The first course in the CCNA curriculum introduces the architectures, models, protocols, and networking elements that connect users, devices, applications, and data through the internet and across modern computer networks - including IP addressing and Ethernet fundamentals. By the end of the course, students can build simple local area networks (LANs) that integrate IP addressing schemes, foundational network security, and perform basic configurations for routers and switches.
Listed below are the current set of modules and their associated competencies outlined for this course. Each module is an integrated unit of learning that consists of content, activities, and assessments that target a specific set of competencies. The size of the module will depend on the depth of knowledge and skill needed to master the competency. Some modules are considered foundational, in that the artifacts presented, while not assessed, enable learning of concepts that are covered on the CCNA certification exam.
CCNAv7: Introduction to Networks (ITN) Outline
CCNAv7: ITN
Module
Topic
Objective
Networking Today
Explain the advances in modern network technologies.
Networks Affect Our Lives
Explain how networks affect our daily lives.
Network Components
Explain how host and network devices are used.
Network Representations and Topologies
Explain network representations and how they are used in network topologies.
Common Types of Networks
Compare the characteristics of common types of networks.
Internet Connections
Explain how LANs and WANs interconnect to the internet.
Reliable Networks
Describe the four basic requirements of a reliable network.
Network Trends
Explain how trends such as BYOD, online collaboration, video, and cloud computing are changing the way we interact.
Network Security
Identify some basic security threats and solutions for all networks.
The IT Professional
Explain employment opportunities in the networking field.
Module
Topic
Objective
Basic Switch and
End Device
Configuration
Implement initial settings including passwords, IP addressing, and default gateway parameters on a network switch and end devices.
Cisco IOS Access
Explain how to access a Cisco IOS device for configuration purposes.
IOS Navigation
Explain how to navigate Cisco IOS to configure network devices.
The Command Structure
Describe the command structure of Cisco IOS software.
Basic Device Configuration
Configure a Cisco IOS device using CLI.
Save Configurations
Use IOS commands to save the running configuration.
Ports and Addresses
Explain how devices communicate across network media.
Configure IP Addressing
Configure a host device with an IP address.
Verify Connectivity
Verify connectivity between two end devices.
Module
Topic
Objective
Protocols and Models
Explain how network protocols enable devices to access local and remote network resources.
The Rules
Describe the types of rules that are necessary to successfully communicate.
Protocols
Explain why protocols are necessary for network communication.
Protocol Suites
Explain the purpose of adhering to a protocol suite.
Standards Organizations
Explain the role of standards organizations in establishing protocols for network interoperability.
Reference Models
Explain how the TCP/IP model and the OSI model are used to facilitate standardization in the communication process.
Data Encapsulation
Explain how data encapsulation allows data to be transported across the network.
Data Access
Explain how local hosts access local resources on a network.
Module
Topic
Objective
Physical Layer
Explain how physical layer protocols, services, and network media support communications across data networks.
Purpose of the Physical Layer
Describe the purpose and functions of the physical layer in the network.
Physical Layer Characteristics
Describe the characteristics of the physical layer.
Copper Cabling
Identify the basic characteristics of copper cabling.
UTP Cabling
Explain how UTP cable is used in Ethernet networks.
Fiber-Optic Cabling
Describe fiber-optic cabling and its main advantages over other media.
Wireless Media
Connect devices using wired and wireless media.
Module
Topic
Objective
Number Systems
Calculate numbers between decimal, binary, and hexadecimal systems.
Binary Number System
Calculate numbers between decimal and binary systems.
Hexadecimal Number System
Calculate numbers between decimal and hexadecimal systems.
Module
Topic
Objective
Data Link Layer
Explain how media access control in the data link layer supports communication across networks.
Purpose of the Data Link Layer
Describe the purpose and function of the data link layer in preparing communication for transmission on specific media.
Topologies
Compare the characteristics of media access control methods on WAN and LAN topologies.
Data Link Frame
Describe the characteristics and functions of the data link frame.
Module
Topic
Objective
Ethernet Switching
Explain how Ethernet operates in a switched network.
Ethernet Frame
Explain how the Ethernet sublayers are related to the frame fields.
Ethernet MAC Address
Describe the Ethernet MAC address.
The MAC Address Table
Explain how a switch builds its MAC address table and forwards frames.
Switch Speeds and Forwarding
Methods
Describe switch forwarding methods and port settings available on Layer 2 switch ports.
Module
Topic
Objective
Network Layer
Explain how routers use network layer protocols and services to enable end-to-end connectivity.
Network Layer Characteristics
Explain how the network layer uses IP protocols for reliable communications.
IPv4 Packet
Explain the role of the major header fields in the IPv4 packet.
IPv6 Packet
Explain the role of the major header fields in the IPv6 packet.
How a Host Routes
Explain how network devices use routing tables to direct packets to a destination network.
Router Routing Tables
Explain the function of fields in the routing table of a router.
Module
Topic
Objective
Address Resolution
Explain how ARP and ND enable communication on a network.
MAC and IP
Compare the roles of the MAC address and the IP address.
ARP
Describe the purpose of ARP.
Neighbor Discovery
Describe the operation of IPv6 neighbor discovery.
Module
Topic
Objective
Basic Router
Configuration
Implement initial settings on a router and end devices.
Configure Initial Router Settings
Configure initial settings on a Cisco IOS router.
Configure Interfaces
Configure two active interfaces on a Cisco IOS router.
Configure the Default Gateway
Configure devices to use the default gateway.
Module
Topic
Objective
IPv4 Addressing
Calculate an IPv4 subnetting scheme to efficiently segment a network.
IPv4 Address Structure
Describe the structure of an IPv4 address including the network portion, the host portion, and the subnet mask.
IPv4 Unicast, Broadcast, and Multicast
Compare the characteristics and uses of the unicast, broadcast, and multicast IPv4 addresses.
Types of IPv4 Addresses
Explain public, private, and reserved IPv4 addresses.
Network Segmentation
Explain how subnetting segments a network to enable better communication.
Subnet an IPv4 Network
Calculate IPv4 subnets for a /24 prefix.
Subnet a /16 and /8 Prefix
Calculate IPv4 subnets for a /16 and /8 prefix.
Subnet to Meet Requirements
Given a set of requirements for subnetting, implement an IPv4 addressing scheme.
Variable Length Subnet Masking
Explain how to create a flexible addressing scheme using variable-length subnet masking (VLSM).
Structured Design
Implement a VLSM addressing scheme.
Module
Topic
Objective
IPv6 Addressing
Implement an IPv6 addressing scheme.
IPv4 Issues
Explain the need for IPv6 addressing.
IPv6 Addressing
Explain how IPv6 addresses are represented.
IPv6 Address Types
Compare types of IPv6 network addresses.
GUA and LLA Static Configuration
Explain how to configure static global unicast and link-local IPv6 network addresses.
Dynamic Addressing for IPv6
GUAs
Explain how to configure global unicast addresses dynamically.
Dynamic Addressing for IPv6 LLAs
Configure link-local addresses dynamically.
IPv6 Multicast Addresses
Identify IPv6 addresses.
Subnet an IPv6 Network
Implement a subnetted IPv6 addressing scheme.
Module
Topic
Objective
ICMP
Use various tools to test network connectivity.
ICMP Messages
Explain how ICMP is used to test network connectivity.
Ping and Traceroute Testing
Use ping and traceroute utilities to test network connectivity.
Module
Topic
Objective
Transport Layer
Compare the operations of transport layer protocols in supporting end-to-end communication.
Transportation of Data
Explain the purpose of the transport layer in managing the transportation of data in end-to-end communication.
TCP Overview
Explain characteristics of the TCP.
UDP Overview
Explain characteristics of the UDP.
Port Numbers
Explain how TCP and UDP use port numbers.
TCP Communication Process
Explain how TCP session establishment and termination processes facilitate reliable communication.
Reliability and Flow Control
Explain how TCP protocol data units are transmitted and acknowledged to guarantee delivery.
UDP Communication
Describe the UDP client processes to establish communication with a server.
Module
Topic
Objective
Application Layer
Explain the operation of application-layer protocols in providing support to end-user applications.
Application, Presentation, and Session
Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end-user applications.
Peer-to-Peer
Explain how end-user applications operate in a peer-topeer network.
Web and Email Protocols
Explain how web and email protocols operate.
IP Addressing Services
Explain how DNS and DHCP operate.
File-Sharing Services
Explain how file transfer protocols operate.
Module
Topic
Objective
Network Security Fundamentals
Configure switches and routers with device hardening features to enhance security.
Security Threats and Vulnerabilities
Explain why basic security measures are necessary on network devices.
Network Attacks
Identify security vulnerabilities.
Network Attack Mitigation
Identify general mitigation techniques.
Device Security
Configure network devices with device hardening features to mitigate security threats.
Module
Topic
Objective
Build a Small
Network
Implement a network design for a small network to include a router, a switch, and end devices.
Devices in a Small Network
Identify the devices used in a small network.
Small Network Applications and Protocols
Identify the protocols and applications used in a small network.
Scale to Larger Networks
Explain how a small network serves as the basis of larger networks.
Verify Connectivity
Use the output of the ping and tracert commands to verify connectivity and establish relative network performance.
Host and IOS Commands
Use host and IOS commands to acquire information about the devices in a network.
Troubleshooting Methodologies
Describe common network troubleshooting methodologies.
Troubleshooting Scenarios
Troubleshoot issues with devices in the network.
Prerequisites
Students are required to have completed the Introduction to Networks (ITN) course before beginning the Switching,
Routing and Wireless Essentials (SRWE) course.
CCNAv7: Switching, Routing and Wireless Essentials (SRWE) Outline The second course in the CCNA curriculum focuses on switching technologies and router operations that support small-to-medium business networks and includes wireless local area networks (WLANs) and security concepts. Students learn key switching and routing concepts. They can perform basic network configuration and troubleshooting, identify and mitigate LAN security threats, and configure and secure a basic WLAN.
Listed below are the current set of modules and their associated competencies outlined for this course. Each module is an integrated unit of learning that consists of content, activities, and assessments that target a specific set of competencies. The size of the module will depend on the depth of knowledge and skill needed to master the competency. Some modules are considered foundational, in that the artifacts presented, while not assessed, enable learning of concepts that are covered on the CCNA certification exam.
CCNAv7: Switching, Routing and Wireless Essentials (SRWE) Outline
CCNAv7: SRWE
Module
Topic
Objective
Basic Device
Configuration
Configure devices by using security best practices.
Configure a Switch with Initial
Settings
Configure initial settings on a Cisco switch.
Configure Switch Ports
Configure switch ports to meet network requirements
Secure Remote Access
Configure secure management access on a switch.
Basic Router Configuration
Configure basic settings on a router, using CLI, to route between two directly-connected networks.
Verify Directly Connected
Networks
Verify connectivity between two networks that are directly connected to a router.
Module
Topic
Objective
Switching Concepts
Explain how Layer 2 switches forward data.
Frame Forwarding
Explain how frames are forwarded in a switched network.
Switching Domains
Compare a collision domain to a broadcast domain.
Module
Topic
Objective
VLANs
Implement VLANs and trunking on a switched network.
Overview of VLANs
Explain the purpose of VLANs on a switched network.
VLANs in a Multi-Switched Environment
Explain how a switch forwards frames based on VLAN configuration in a multi-switch environment.
VLAN Configuration
Configure a switch port to be assigned to a VLAN based on requirements.
VLAN Trunks
Configure a trunk port on a LAN switch.
Dynamic Trunking Protocol
Configure Dynamic Trunking Protocol (DTP).
Module
Topic
Objective
Inter-VLAN Routing
Troubleshoot inter-VLAN routing on Layer 3 devices.
Inter-VLAN Routing Operation
Describe options for configuring inter-VLAN routing.
Router-on-a-Stick Inter-VLAN Routing
Configure router-on-a-stick inter-VLAN routing.
Inter-VLAN Routing using Layer
3 Switches
Configure inter-VLAN routing using Layer 3 switching.
Troubleshoot Inter-VLAN Routing
Troubleshoot common inter-VLAN configuration issues
Module
Topic
Objective
STP
Explain how STP enables redundancy in a Layer 2 network.
Purpose of STP
Explain common problems in a redundant, L2 switched network.
STP Operations
Explain how STP operates in a simple, switched network.
Evolution of STP
Explain how Rapid PVST+ operates.
Module
Topic
Objective
EtherChannel
Troubleshoot EtherChannel on switched links.
EtherChannel Operation
Describe EtherChannel technology.
Configure EtherChannel
Configure EtherChannel.
Verify and Troubleshoot
EtherChannel
Troubleshoot EtherChannel.
Module
Topic
Objective
DHCPv4
Implement DHCPv4 to operate across multiple LANs.
DHCPv4 Concepts
Explain how DHCPv4 operates across multiple LANs.
Configure DHCPv4 Server
Configure a router as a DHCPv4 server.
Configure DHCPv4 Client
Configure a router as a DHCPv4 client.
Module
Topic
Objective
SLAAC and DHCPv6 Concepts
Configure dynamic address allocation on IPv6 networks.
IPv6 Global Unicast Address Assignment
Explain how an IPv6 host can acquire its IPv6 configuration.
SLAAC
Explain the operation of SLAAC.
DHCPv6
Explain the operation of DHCPv6.
Configure DHCPv6 Server
Configure a stateful and stateless DHCPv6 server.
Module
Topic
Objective
FHRP Concepts
Explain how FHRPs provide default gateway services in a redundant network.
First Hop Redundancy Protocol
Explain the purpose and operation of first-hop redundancy protocols.
HSRP
Explain how HSRP operates.
Module
Topic
Objective
LAN Security Concepts
Explain how vulnerabilities compromise LAN security.
Endpoint Security
Explain how to use endpoint security to mitigate attacks.
Access Control
Explain how AAA and 802.1x are used to authenticate LAN endpoints and devices.
Layer 2 Security Threats
Identify Layer 2 vulnerabilities.
MAC Address Table Attack
Explain how a MAC address table attack compromises LAN security.
LAN Attacks
Explain how LAN attacks compromise LAN security.
Module
Topic
Objective
Switch Security
Configuration
Implement switch security to mitigate LAN attacks.
Implement Port Security
Implement port security to mitigate MAC address table attacks.
Mitigate VLAN Attacks
Explain how to configure DTP and native VLAN to mitigate VLAN attacks.
Mitigate DHCP Attacks
Explain how to configure DHCP snooping to mitigate DHCP attacks.
Mitigate ARP Attacks
Explain how to configure ARP inspection to mitigate ARP attacks.
Mitigate STP Attacks
Explain how to configure Portfast and BPDU Guard to mitigate STP attacks.
Module
Topic
Objective
WLAN Concepts
Explain how WLANs enable network connectivity.
Introduction to Wireless
Describe WLAN technology and standards.
Components of WLANs
Describe the components of a WLAN infrastructure.
WLAN Operation
Explain how wireless technology enables WLAN operation.
CAPWAP Operation
Explain how a WLC uses CAPWAP to manage multiple APs.
Channel Management
Describe channel management in a WLAN.
WLAN Threats
Describe threats to WLANs.
Secure WLANs
Describe WLAN security mechanisms.
Module
Topic
Objective
WLAN Configuration
Implement a WLAN using a wireless router and WLC.
Remote Site WLAN
Configuration
Configure a WLAN to support a remote site.
Configure a Basic WLC on the
WLC
Configure a WLC WLAN to use the management interface and WPA2 PSK authentication.
Configure a WPA2 Enterprise
WLAN on the WLC
Configure a WLC WLAN to use a VLAN interface, a
DHCP server, and WPA2 Enterprise authentication.
Troubleshoot WLAN Issues
Troubleshoot common wireless configuration issues.
Module
Topic
Objective
Routing Concepts
Explain how routers use information in packets to make forwarding decisions.
Path determination
Explain how routers determine the best path.
Packet Forwarding
Explain how routers forward packets to the destination.
Basic Router Configuration review
Configure basic settings on a Cisco IOS router.
IP Routing Table
Describe the structure of a routing table.
Static and Dynamic Routing
Compare static and dynamic routing concepts.
Module
Topic
Objective
IP Static Routing
Configure IPv4 and IPv6 static routes.
Static Routes
Describe the command syntax for static routes.
Configure IP Static Routes
Configure IPv4 and IPv6 static routes.
Configure IP Default Static Routes
Configure IPv4 and IPv6 default static routes.
Configure Floating Static Routes
Configure a floating static route to provide a backup connection.
Configure Static Host Routes
Configure IPv4 and IPv6 static host routes that direct traffic to a specific host.
Module
Topic
Objective
Troubleshoot Static and
Default Routes
Troubleshoot static and default route configurations.
Packet Processing with Static Routes
Explain how a router processes packets when a static route is configured.
Troubleshoot IPv4 Static and Default Route Configuration
Troubleshoot common static and default route configuration issues.
Prerequisites
Students are required to have completed both the Introduction to Networks (ITN) and the Switching, Routing and Wireless
Essentials (SRWE) courses before beginning this course. Learners are also expected to have the following skills:
- High school reading level.
- Basic computer literacy
- Basic PC operating system navigation skills
- Basic Internet usage skills
CCNAv7 Enterprise Networking, Security, and Automation (ENSA) Outline
The third course in the CCNAv7 curriculum describes the architectures and considerations related to designing, securing, operating, and troubleshooting enterprise networks. This course covers wide area network (WAN) technologies and quality of service (QoS) mechanisms used for secure remote access. ENSA also introduces software-defined networking, virtualization, and automation concepts that support the digitalization of networks. Students gain skills to configure and troubleshoot enterprise networks and learn to identify and protect against cybersecurity threats. They are introduced to network management tools and learn key concepts of software-defined networking, including controller-based architectures and how application programming interfaces (APIs) enable network automation.
Listed below are the current set of modules and their associated competencies outlined for this course. Each module is an integrated unit of learning that consists of content, activities, and assessments that target a specific set of competencies. The size of the module will depend on the depth of knowledge and skill needed to master the competency. Some modules are considered foundational, in that the artifacts presented, while not assessed, enable learning of concepts that are covered on the CCNA certification exam.
CCNAv7 Enterprise Networking, Security, and Automation (ENSA) Outline
CCNAv7: ENSA
Module
Topic
Objective
Single-Area OSPFv2
Concepts
Explain how single-area OSPF operates in both point-to-point and broadcast multiaccess networks.
OSPF Features and
Characteristics
Describe basic OSPF features and characteristics.
OSPF Packets
Describe the OSPF packet types used in single-area OSPF.
OSPF Operation
Explain how single-area OSPF operates.
Module
Topic
Objective
Single-Area OSPFv2 Configuration
Implement single-area OSPFv2 in both point-to-point and broadcast multiaccess networks.
OSPF Router ID
Configure an OSPFv2 router ID.
Point-to-Point OSPF Networks
Configure single-area OSPFv2 in a point-to-point network.
Multiaccess OSPF Networks
Configure the OSPF interface priority to influence the DR/BDR election in a multiaccess network.
Modify Single-Area
OSPFv2
Implement modifications to change the operation of single-area OSPFv2.
Default Route
Propagation
Configure OSPF to propagate a default route.
Verify Single-Area
OSPFv2
Verify a single-area OSPFv2 implementation.
Module
Topic
Objective
Network Security Concepts
Explain how vulnerabilities, threats, and exploits can be mitigated to enhance network security.
Current State of Cybersecurity
Describe the current state of cybersecurity and vectors of data loss.
Threat Actors
Describe the threat actors who exploit networks.
Threat Actor Tools
Describe tools used by threat actors to exploit networks.
Malware
Describe malware types.
Common Network Attacks
Describe common network attacks.
IP Vulnerabilities and Threats
Explain how IP vulnerabilities are exploited by threat actors.
TCP and UDP Vulnerabilities
Explain how TCP and UDP vulnerabilities are exploited by threat actors.
IP Services
Explain how IP services are exploited by threat actors.
Network Security Best Practices
Describe best practices for protecting a network.
Cryptography
Describe common cryptographic processes used to protect data in transit.
Module
Topic
Objective
ACL Concepts
Explain how ACLs are used as part of a network security policy.
Purpose of ACLs
Explain how ACLs filter traffic.
Wildcard Masks in ACLs
Explain how ACLs use wildcard masks.
Guidelines for ACL Creation
Explain how to create ACLs.
Types of IPv4 ACLs
Compare standard and extended IPv4 ACLs.
Module
Topic
Objective
ACLs for IPv4
Configuration
Implement IPv4 ACLs to filter traffic and secure administrative access.
Configure Standard IPv4 ACLs
Configure standard IPv4 ACLs to filter traffic to meet networking requirements.
Modify IPv4 ACLs
Use sequence numbers to edit existing standard IPv4 ACLs.
Secure VTY Ports with a Standard IPv4 ACL
Configure a standard ACL to secure vty access.
Configure Extended IPv4 ACLs
Configure extended IPv4 ACLs to filter traffic according to networking requirements.
Module
Topic
Objective
NAT for IPv4
Configure NAT services on the edge router to provide IPv4 address scalability.
NAT Characteristics
Explain the purpose and function of NAT.
Types of NAT
Explain the operation of different types of NAT.
NAT Advantages
Describe the advantages and disadvantages of NAT.
Configure Static NAT
Configure static NAT using the CLI.
Configure Dynamic NAT
Configure dynamic NAT using the CLI.
Configure PAT
Configure PAT using the CLI.
NAT64
Describe NAT for IPv6.
Module
Topic
Objective
WAN Concepts
Explain how WAN access technologies can be used to satisfy business requirements.
Purpose of WANs
Explain the purpose of a WAN.
WAN Operations
Explain how WANs operate.
Traditional WAN Connectivity
Compare traditional WAN connectivity options.
Modern WAN Connectivity
Compare modern WAN connectivity options.
Internet-Based Connectivity
Compare internet-based WAN connectivity options.
Module
Topic
Objective
VPN and IPsec
Concepts
Explain how VPNs and IPsec secure site-to-site and remote access connectivity.
VPN Technology
Describe the benefits of VPN technology.
Types of VPNs
Describe different types of VPNs
IPsec
Explain how the IPsec framework is used to secure network traffic.
Module
Topic
Objective
QoS Concepts
Explain how networking devices implement QoS.
Network Transmission Quality
Explain how network transmission characteristics impact quality.
Traffic Characteristics
Describe minimum network requirements for voice, video, and data traffic.
Queuing Algorithms
Describe the queuing algorithms used by networking devices.
QoS Models
Describe the different QoS models.
QoS Implementation Techniques
Explain how QoS uses mechanisms to ensure transmission quality.
Module
Topic
Objective
Network
Management
Implement protocols to manage the network.
Device Discovery with CDP
Use CDP to map network topology.
Device Discovery with LLDP
Use LLDP to map network topology.
NTP
Implement NTP between an NTP client and an NTP server.
SNMP
Explain SNMP operation.
Syslog
Explain Syslog operation.
Router and Switch File Maintenance
Use commands to back up and restore an IOS configuration file.
IOS Image Management
Perform an upgrade of an IOS system image.
Module
Topic
Objective
Network Design
Explain the characteristics of scalable network architectures.
Hierarchical Networks
Explain how data, voice, and video are converged in a switched network.
Scalable Networks
Explain considerations for designing a scalable network.
Switch Hardware
Explain how to switch hardware features support network requirements.
Router Hardware
Describe the types of routers available for small-to-medium sized business networks.
Module
Topic
Objective
Network
Troubleshooting
Troubleshoot enterprise networks.
Network Documentation
Explain how network documentation is developed and used to troubleshoot network issues.
Troubleshooting Process
Compare troubleshooting methods that use a systematic, layered approach.
Troubleshooting Tools
Describe different networking troubleshooting tools.
Symptoms and Causes of
Network Problems
Determine the symptoms and causes of network problems using a layered model.
Troubleshooting IP Connectivity
Troubleshoot a network using the layered model.
Module
Topic
Objective
Network
Virtualization
Explain the purpose and characteristics of network virtualization.
Cloud Computing
Explain the importance of cloud computing.
Virtualization
Explain the importance of virtualization.
Virtual Network
Infrastructure
Describe the virtualization of network devices and services.
Software-Defined
Networking
Describe software-defined networking.
Controllers
Describe controllers used in network programming.
Module
Topic
Objective
Network
Automation
Explain how network automation is enabled through RESTful APIs and configuration management tools.
Automation Overview
Describe automation.
Data Formats
Compare JSON, YAML, and XML data formats.
APIs
Explain how APIs enable a computer to computer communications.
REST
Explain how REST enables a computer to computer communications.
Configuration
Management
Compare the configuration management tools Puppet, Chef, Ansible, and SaltStack
IBN and Cisco DNA
Center
Explain how the Cisco DNA center enables intent-based networking.
Grading Policy:
Category Weight Calculations: Category Average * (MP Weight / 100) = Category Score
Final Grade Calculation: ((Sum of Category Scores) * 100) / (Sum of Category Weights)) + Extra Credit PointsCategory
Weight
Tests
25.0
Quizzes
20.0
Class Work
20.0
Authentic Assessment
25.0
Homework
10.0
100.0
Homework: Homework will consist of completing the assignments in the PC Hardware and Software Lab Manual and additional exercises listed on the weekly assignment sheet. Completion will be documented on the weekly assignment sheet.
Projects: There will be graded lab assignments. You will work in teams of two, but labs will be graded on an individual basis. All labs require the instructor or lab assistant’s initial on the weekly assignment sheet upon completion. Labs will be accepted late but at a reduction of 20 points per day (max. score 100). Labs will not be accepted over a week late (The only exception is Instructor approved excused absence). If your lab partner is absent during a lab day, continue to work on your labs. It will be your lab partner’s responsibility to catch up.
Tests: There will also be in-class close book quizzes/tests as we complete each chapter of the text. They will be short quizzes and are based on the content of the current chapter.
Make-Up Policy: First of all, MAKE-UP WORK IS YOUR RESPONSIBILITY! Assignments and homework can be obtained by going to our class calendar @ . Tests and quizzes are to be made-up in the morning before school on the day of your return or at a scheduled time per the instructor, which generally speaking, will be during Student Access Time.
Re-do Policy:
Students will have an opportunity to redo any semester work that is graded as D (70) or below. If a student opts to take advantage of the redo policy, it must be re-submitted within one (1) week of the graded assignment and the highest grade a student can receive is a 71
Classroom Rules of Conduct:
- You are expected to be punctual, alert, and prepared for class. You will be considerate of other students, which includes being quiet except when you are contributing to the class. You are encouraged to ask questions when in class - if you are confused or uncertain; it's likely your classmates are also. If you desire extra help, make arrangements with your instructor to schedule a time during office hours.
- Class time will be spent doing activities of relevance and rigor to joyfully accomplish the objectives of our course. In keeping with this mission, students are to remain on task for the entire period.
- All work areas must be straightened up before anyone is dismissed (all paper in the trash, chairs pushed in, and computer workbenches NEAT and ORGANIZED). I (Mr. Jean) dismiss you, not the bell, so if everything is in order when the bell rings, you will not be late for your next class. J
- NO FOOD, GUM, CANDY, DRINKS, ETC. ARE ALLOWED IN THE LAB SETTING. Thank you for your understanding and cooperation.
Cellular Phones
- Cellular phones and pagers are not allowed in class.
- Respect should be shown to all classroom equipment and materials…and to the computer hardware that we will be handling in a variety of ways on a very frequent basis throughout the year. Carelessness will not be tolerated.
AND FINALLY… (drum roll, please)
Take charge of your learning….doN't fall behind…and if you need help, please let me know, but be sure to DO YOUR PART every step of the way…your success in this class truly depends on it.
Academic Dishonesty Policy: The integrity of the academic program and the evaluation of each student’s achievement are of primary concern to educational institutions. Cheating on an educational exercise not only reflects dishonesty on the part of the student but also diminishes the value of the work done by his/her classmates. Students who cheat or plagiarize (using another’s words, ideas, or writing as one’s own) shall be subject to the following: referral to the Assistant Principal; parent/guardian contacted; a zero recorded for the exercise; possible detention and/or suspension; and/or removal from the course with a grade of “F” recorded on the transcript.