•  

    Orange High School

    Course Outline/Syllabus

     CCNA I & II

     

    Instructor: Mr. Ederson Jean                                             Planning Period:

    Email: Jeaneder@orange.k12.nj.us                                  Classroom #: 112

    Phone #: (973)-677-4050                                                    Principal: Mr. Jason Belton

    Parents are encouraged to contact me regarding any questions or concerns regarding their children in my class. You can reach me at my email address or you can leave a message at 973)677-4050. I will do my best to return emails and/or phone calls within 48 hours. 

    Course Description: 

    CCNAv7 Curriculum Description

    In this curriculum, Cisco Networking Academy™ participants develop workforce readiness skills and build a foundation for success in networking-related careers and degree programs. With the support of video and rich interactive media, participants learn, apply, and practice CCNA knowledge and skills through a series of in-depth hands-on experiences and simulated activities that reinforce their learning. Upon completion of all three course offerings, learners will be prepared to take the Cisco CCNA Unified certification exam.

    CCNAv7 teaches comprehensive networking concepts and skills, from network applications to the protocols and services provided to those applications. Learners will progress from basic networking to more complex enterprise and theoretical networking models later in the curriculum.

    CCNAv7 includes the following features:

    • There are three offerings that make up the CCNAv7 curriculum.
    • The three offerings align to and cover the competencies outlined for the CCNA Certification Exam.
    • Each offering is comprised of multiple modules. Each module is comprised of topics.
    • Modules emphasize critical thinking, problem-solving, collaboration, and the practical application of skills.
    • Each topic includes a Check Your Understanding interactive quiz, or some other way to assess understanding, such as a lab or

    a Packet Tracer. These topic-level assessments are designed to tell learners if they have a good grasp of the topic content, or if they need to review before continuing. Learners can ensure their level of understanding well before taking a graded quiz or exam. Check Your Understanding quizzes do not affect the learner’s overall grade.

    • Students learn the basics of routing, switching, and advanced technologies to prepare for the Cisco CCNA exam, networking related degree programs, and entry-level networking careers.
    • The language used to describe networking concepts is designed to be easily understood by learners at all levels and embedded

    interactive activities help reinforce comprehension.

    • Assessments and practice activities are focused on specific competencies to increase retention and provide flexibility in the

    learning path.

    • Multimedia learning tools, including videos, games, and quizzes, address a variety of learning styles and help stimulate learning

    and promote increased knowledge retention.

    • Hands-on labs and Cisco® Packet Tracer simulation-based learning activities help students develop critical thinking and complex

    problem-solving skills.

    • Embedded assessments provide immediate feedback to support the evaluation of knowledge and acquired skills.
    • Cisco Packet Tracer activities are designed for use with the latest version of Packet Tracer.
    • Oracle VirtualBox, the most recent version.
    • Wireshark version 2.5 or higher.

    CCNAv7: Introduction to Networks (ITN) Outline

    The first course in the CCNA curriculum introduces the architectures, models, protocols, and networking elements that connect users, devices, applications, and data through the internet and across modern computer networks - including IP addressing and Ethernet fundamentals. By the end of the course, students can build simple local area networks (LANs) that integrate IP addressing schemes, foundational network security, and perform basic configurations for routers and switches.

    Listed below are the current set of modules and their associated competencies outlined for this course. Each module is an integrated unit of learning that consists of content, activities, and assessments that target a specific set of competencies. The size of the module will depend on the depth of knowledge and skill needed to master the competency. Some modules are considered foundational, in that the artifacts presented, while not assessed, enable learning of concepts that are covered on the CCNA certification exam.

    CCNAv7: Introduction to Networks (ITN) Outline

    CCNAv7: ITN

     

     

    Module

    Topic

    Objective

    Networking Today

     

    Explain the advances in modern network technologies.

     

    Networks Affect Our Lives

    Explain how networks affect our daily lives.

     

    Network Components

    Explain how host and network devices are used.

     

    Network Representations and Topologies

    Explain network representations and how they are used in network topologies.

     

    Common Types of Networks

    Compare the characteristics of common types of networks.

     

    Internet Connections

    Explain how LANs and WANs interconnect to the internet.

     

    Reliable Networks

    Describe the four basic requirements of a reliable network.

     

    Network Trends

    Explain how trends such as BYOD, online collaboration, video, and cloud computing are changing the way we interact.

     

    Network Security

    Identify some basic security threats and solutions for all networks.

     

    The IT Professional

    Explain employment opportunities in the networking field.

    Module

    Topic

    Objective

    Basic Switch and

    End Device

    Configuration

     

    Implement initial settings including passwords, IP addressing, and default gateway parameters on a network switch and end devices.

     

    Cisco IOS Access

    Explain how to access a Cisco IOS device for configuration purposes.

     

     

    IOS Navigation

    Explain how to navigate Cisco IOS to configure network devices.

     

    The Command Structure

    Describe the command structure of Cisco IOS software.

     

    Basic Device Configuration

    Configure a Cisco IOS device using CLI.

     

    Save Configurations

    Use IOS commands to save the running configuration.

     

    Ports and Addresses

    Explain how devices communicate across network media.

     

    Configure IP Addressing

    Configure a host device with an IP address.

     

    Verify Connectivity

    Verify connectivity between two end devices.

    Module

    Topic

    Objective

    Protocols and Models

     

    Explain how network protocols enable devices to access local and remote network resources.

     

    The Rules

    Describe the types of rules that are necessary to successfully communicate.

     

    Protocols

    Explain why protocols are necessary for network communication.

     

    Protocol Suites

    Explain the purpose of adhering to a protocol suite.

     

    Standards Organizations

    Explain the role of standards organizations in establishing protocols for network interoperability.

     

    Reference Models

    Explain how the TCP/IP model and the OSI model are used to facilitate standardization in the communication process.

     

    Data Encapsulation

    Explain how data encapsulation allows data to be transported across the network.

     

    Data Access

    Explain how local hosts access local resources on a network.

    Module

    Topic

    Objective

    Physical Layer

     

    Explain how physical layer protocols, services, and network media support communications across data networks.

     

    Purpose of the Physical Layer

    Describe the purpose and functions of the physical layer in the network.

     

    Physical Layer Characteristics

    Describe the characteristics of the physical layer.

     

    Copper Cabling

    Identify the basic characteristics of copper cabling.

     

    UTP Cabling

    Explain how UTP cable is used in Ethernet networks.

     

    Fiber-Optic Cabling

    Describe fiber-optic cabling and its main advantages over other media.

     

     

    Wireless Media

    Connect devices using wired and wireless media.

    Module

    Topic

    Objective

    Number Systems

     

    Calculate numbers between decimal, binary, and hexadecimal systems.

     

    Binary Number System

    Calculate numbers between decimal and binary systems.

     

    Hexadecimal Number System

    Calculate numbers between decimal and hexadecimal systems.

    Module

    Topic

    Objective

    Data Link Layer

     

    Explain how media access control in the data link layer supports communication across networks.

     

    Purpose of the Data Link Layer

    Describe the purpose and function of the data link layer in preparing communication for transmission on specific media.

     

    Topologies

    Compare the characteristics of media access control methods on WAN and LAN topologies.

     

    Data Link Frame

    Describe the characteristics and functions of the data link frame.

    Module

    Topic

    Objective

    Ethernet Switching

     

    Explain how Ethernet operates in a switched network.

     

    Ethernet Frame

    Explain how the Ethernet sublayers are related to the frame fields.

     

    Ethernet MAC Address

    Describe the Ethernet MAC address.

     

    The MAC Address Table

    Explain how a switch builds its MAC address table and forwards frames.

     

    Switch Speeds and Forwarding

    Methods

    Describe switch forwarding methods and port settings available on Layer 2 switch ports.

    Module

    Topic

    Objective

    Network Layer

     

    Explain how routers use network layer protocols and services to enable end-to-end connectivity.

     

    Network Layer Characteristics

    Explain how the network layer uses IP protocols for reliable communications.

     

    IPv4 Packet

    Explain the role of the major header fields in the IPv4 packet.

     

    IPv6 Packet

    Explain the role of the major header fields in the IPv6 packet.

     

    How a Host Routes

    Explain how network devices use routing tables to direct packets to a destination network.

     

     

    Router Routing Tables

    Explain the function of fields in the routing table of a router.

    Module

    Topic

    Objective

    Address Resolution

     

    Explain how ARP and ND enable communication on a network.

     

    MAC and IP

    Compare the roles of the MAC address and the IP address.

     

    ARP

    Describe the purpose of ARP.

     

    Neighbor Discovery

    Describe the operation of IPv6 neighbor discovery.

    Module

    Topic

    Objective

    Basic Router

    Configuration

     

    Implement initial settings on a router and end devices.

     

    Configure Initial Router Settings

    Configure initial settings on a Cisco IOS router.

     

    Configure Interfaces

    Configure two active interfaces on a Cisco IOS router.

     

    Configure the Default Gateway

    Configure devices to use the default gateway.

    Module

    Topic

    Objective

    IPv4 Addressing

     

    Calculate an IPv4 subnetting scheme to efficiently segment a network.

     

    IPv4 Address Structure

    Describe the structure of an IPv4 address including the network portion, the host portion, and the subnet mask.

     

    IPv4 Unicast, Broadcast, and Multicast

    Compare the characteristics and uses of the unicast, broadcast, and multicast IPv4 addresses.

     

    Types of IPv4 Addresses

    Explain public, private, and reserved IPv4 addresses.

     

    Network Segmentation

    Explain how subnetting segments a network to enable better communication.

     

    Subnet an IPv4 Network

    Calculate IPv4 subnets for a /24 prefix.

     

    Subnet a /16 and /8 Prefix

    Calculate IPv4 subnets for a /16 and /8 prefix.

     

    Subnet to Meet Requirements

    Given a set of requirements for subnetting, implement an IPv4 addressing scheme.

     

    Variable Length Subnet Masking

    Explain how to create a flexible addressing scheme using variable-length subnet masking (VLSM).

     

    Structured Design

    Implement a VLSM addressing scheme.

    Module

    Topic

    Objective

    IPv6 Addressing

     

    Implement an IPv6 addressing scheme.

     

    IPv4 Issues

    Explain the need for IPv6 addressing.

     

     

    IPv6 Addressing

    Explain how IPv6 addresses are represented.

     

    IPv6 Address Types

    Compare types of IPv6 network addresses.

     

    GUA and LLA Static Configuration

    Explain how to configure static global unicast and link-local IPv6 network addresses.

     

    Dynamic Addressing for IPv6

    GUAs

    Explain how to configure global unicast addresses dynamically.

     

    Dynamic Addressing for IPv6 LLAs

    Configure link-local addresses dynamically.

     

    IPv6 Multicast Addresses

    Identify IPv6 addresses.

     

    Subnet an IPv6 Network

    Implement a subnetted IPv6 addressing scheme.

    Module

    Topic

    Objective

    ICMP

     

    Use various tools to test network connectivity.

     

    ICMP Messages

    Explain how ICMP is used to test network connectivity.

     

    Ping and Traceroute Testing

    Use ping and traceroute utilities to test network connectivity.

    Module

    Topic

    Objective

    Transport Layer

     

    Compare the operations of transport layer protocols in supporting end-to-end communication.

     

    Transportation of Data

    Explain the purpose of the transport layer in managing the transportation of data in end-to-end communication.

     

    TCP Overview

    Explain characteristics of the TCP.

     

    UDP Overview

    Explain characteristics of the UDP.

     

    Port Numbers

    Explain how TCP and UDP use port numbers.

     

    TCP Communication Process

    Explain how TCP session establishment and termination processes facilitate reliable communication.

     

    Reliability and Flow Control

    Explain how TCP protocol data units are transmitted and acknowledged to guarantee delivery.

     

    UDP Communication

    Describe the UDP client processes to establish communication with a server.

    Module

    Topic

    Objective

    Application Layer

     

    Explain the operation of application-layer protocols in providing support to end-user applications.

     

    Application, Presentation, and Session

    Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end-user applications.

     

    Peer-to-Peer

    Explain how end-user applications operate in a peer-topeer network.

     

    Web and Email Protocols

    Explain how web and email protocols operate.

     

    IP Addressing Services

    Explain how DNS and DHCP operate.

     

    File-Sharing Services

    Explain how file transfer protocols operate.

    Module

    Topic

    Objective

    Network Security Fundamentals

     

    Configure switches and routers with device hardening features to enhance security.

     

    Security Threats and Vulnerabilities

    Explain why basic security measures are necessary on network devices.

     

    Network Attacks

    Identify security vulnerabilities.

     

    Network Attack Mitigation

    Identify general mitigation techniques.

     

    Device Security

    Configure network devices with device hardening features to mitigate security threats.

    Module

    Topic

    Objective

    Build a Small

    Network

     

    Implement a network design for a small network to include a router, a switch, and end devices.

     

    Devices in a Small Network

    Identify the devices used in a small network.

     

    Small Network Applications and Protocols

    Identify the protocols and applications used in a small network.

     

    Scale to Larger Networks

    Explain how a small network serves as the basis of larger networks.

     

    Verify Connectivity

    Use the output of the ping and tracert commands to verify connectivity and establish relative network performance.

     

    Host and IOS Commands

    Use host and IOS commands to acquire information about the devices in a network.

     

    Troubleshooting Methodologies

    Describe common network troubleshooting methodologies.

     

    Troubleshooting Scenarios

    Troubleshoot issues with devices in the network.

     

     

     Prerequisites

    Students are required to have completed the Introduction to Networks (ITN) course before beginning the Switching,

    Routing and Wireless Essentials (SRWE) course. 

     

    CCNAv7: Switching, Routing and Wireless Essentials (SRWE) Outline The second course in the CCNA curriculum focuses on switching technologies and router operations that support small-to-medium business networks and includes wireless local area networks (WLANs) and security concepts.  Students learn key switching and routing concepts. They can perform basic network configuration and troubleshooting, identify and mitigate LAN security threats, and configure and secure a basic WLAN. 

    Listed below are the current set of modules and their associated competencies outlined for this course. Each module is an integrated unit of learning that consists of content, activities, and assessments that target a specific set of competencies. The size of the module will depend on the depth of knowledge and skill needed to master the competency. Some modules are considered foundational, in that the artifacts presented, while not assessed, enable learning of concepts that are covered on the CCNA certification exam.

    CCNAv7: Switching, Routing and Wireless Essentials (SRWE) Outline

     

    CCNAv7: SRWE

     

     

    Module

    Topic

    Objective

    Basic Device

    Configuration                 

     

    Configure devices by using security best practices.

     

    Configure a Switch with Initial

    Settings

    Configure initial settings on a Cisco switch.

     

    Configure Switch Ports

    Configure switch ports to meet network requirements

     

    Secure Remote Access

    Configure secure management access on a switch.

     

    Basic Router Configuration

    Configure basic settings on a router, using CLI, to route between two directly-connected networks.

     

    Verify Directly Connected

    Networks

    Verify connectivity between two networks that are directly connected to a router.

    Module

    Topic

    Objective

    Switching Concepts        

     

    Explain how Layer 2 switches forward data.

     

    Frame Forwarding

    Explain how frames are forwarded in a switched network.

     

    Switching Domains

    Compare a collision domain to a broadcast domain.

    Module

    Topic

    Objective

    VLANs 

     

    Implement VLANs and trunking on a switched network.

     

    Overview of VLANs

    Explain the purpose of VLANs on a switched network.

     

    VLANs in a Multi-Switched Environment

    Explain how a switch forwards frames based on VLAN configuration in a multi-switch environment.

     

    VLAN Configuration

    Configure a switch port to be assigned to a VLAN based on requirements.

     

     

    VLAN Trunks

    Configure a trunk port on a LAN switch.

     

    Dynamic Trunking Protocol

    Configure Dynamic Trunking Protocol (DTP).

    Module

    Topic

    Objective

    Inter-VLAN Routing 

     

    Troubleshoot inter-VLAN routing on Layer 3 devices.

     

    Inter-VLAN Routing Operation

    Describe options for configuring inter-VLAN routing.

     

    Router-on-a-Stick Inter-VLAN Routing

    Configure router-on-a-stick inter-VLAN routing.

     

    Inter-VLAN Routing using Layer

    3 Switches

    Configure inter-VLAN routing using Layer 3 switching.

     

    Troubleshoot Inter-VLAN Routing

    Troubleshoot common inter-VLAN configuration issues

    Module

    Topic

    Objective

    STP

     

    Explain how STP enables redundancy in a Layer 2 network.

     

    Purpose of STP

    Explain common problems in a redundant, L2 switched network.

     

    STP Operations

    Explain how STP operates in a simple, switched network.

     

    Evolution of STP

    Explain how Rapid PVST+ operates.

    Module

    Topic

    Objective

    EtherChannel

     

    Troubleshoot EtherChannel on switched links.

     

    EtherChannel Operation

    Describe EtherChannel technology.

     

    Configure EtherChannel

    Configure EtherChannel.

     

    Verify and Troubleshoot

    EtherChannel

    Troubleshoot EtherChannel.

    Module

    Topic

    Objective

    DHCPv4

     

    Implement DHCPv4 to operate across multiple LANs.

     

    DHCPv4 Concepts

    Explain how DHCPv4 operates across multiple LANs.

     

    Configure DHCPv4 Server

    Configure a router as a DHCPv4 server.

     

    Configure DHCPv4 Client

    Configure a router as a DHCPv4 client.

    Module

    Topic

    Objective

    SLAAC and DHCPv6 Concepts

     

    Configure dynamic address allocation on IPv6 networks.

     

    IPv6 Global Unicast Address Assignment

    Explain how an IPv6 host can acquire its IPv6 configuration.

     

    SLAAC

    Explain the operation of SLAAC.

     

     

    DHCPv6

    Explain the operation of DHCPv6.

     

    Configure  DHCPv6 Server

    Configure a stateful and stateless DHCPv6 server.

    Module

    Topic

    Objective

    FHRP Concepts

     

    Explain how FHRPs provide default gateway services in a redundant network.

     

    First Hop Redundancy Protocol

    Explain the purpose and operation of first-hop redundancy protocols.

     

    HSRP

    Explain how HSRP operates.

    Module

    Topic

    Objective

    LAN Security Concepts

     

    Explain how vulnerabilities compromise LAN security.

     

    Endpoint Security

    Explain how to use endpoint security to mitigate attacks.

     

    Access Control

    Explain how AAA and 802.1x are used to authenticate LAN endpoints and devices.

     

    Layer 2 Security Threats

    Identify Layer 2 vulnerabilities.

     

    MAC Address Table Attack

    Explain how a MAC address table attack compromises LAN security.

     

    LAN Attacks

    Explain how LAN attacks compromise LAN security.

    Module

    Topic

    Objective

    Switch Security

    Configuration

     

    Implement switch security to mitigate LAN attacks.

     

    Implement Port Security

    Implement port security to mitigate MAC address table attacks.

     

    Mitigate VLAN Attacks

    Explain how to configure DTP and native VLAN to mitigate VLAN attacks.

     

    Mitigate DHCP Attacks

    Explain how to configure DHCP snooping to mitigate DHCP attacks.

     

    Mitigate ARP Attacks

    Explain how to configure ARP inspection to mitigate ARP attacks.

     

    Mitigate STP Attacks

    Explain how to configure Portfast and BPDU Guard to mitigate STP attacks.

    Module

    Topic

    Objective

    WLAN Concepts

     

    Explain how WLANs enable network connectivity.

     

    Introduction to Wireless

    Describe WLAN technology and standards.

     

    Components of WLANs

    Describe the components of a WLAN infrastructure.

     

     

    WLAN Operation

    Explain how wireless technology enables WLAN operation.

     

    CAPWAP Operation

    Explain how a WLC uses CAPWAP to manage multiple APs.

     

    Channel Management

    Describe channel management in a WLAN.

     

    WLAN Threats

    Describe threats to WLANs.

     

    Secure WLANs

    Describe WLAN security mechanisms.

    Module

    Topic

    Objective

    WLAN Configuration

     

    Implement a WLAN using a wireless router and WLC.

     

    Remote Site WLAN

    Configuration

    Configure a WLAN to support a remote site.

     

    Configure a Basic WLC on the

    WLC

    Configure a WLC WLAN to use the management interface and WPA2 PSK authentication.

     

    Configure a WPA2 Enterprise

    WLAN on the WLC

    Configure a WLC WLAN to use a VLAN interface, a

    DHCP server, and WPA2 Enterprise authentication.

     

    Troubleshoot WLAN Issues

    Troubleshoot common wireless configuration issues.

    Module

    Topic

    Objective

    Routing Concepts

     

    Explain how routers use information in packets to make forwarding decisions.

     

    Path determination

    Explain how routers determine the best path.

     

    Packet Forwarding

    Explain how routers forward packets to the destination.

     

    Basic Router Configuration review

    Configure basic settings on a Cisco IOS router.

     

    IP Routing Table

    Describe the structure of a routing table.

     

    Static and Dynamic Routing

    Compare static and dynamic routing concepts.

    Module

    Topic

    Objective

    IP Static Routing

     

    Configure IPv4 and IPv6 static routes.

     

    Static Routes

    Describe the command syntax for static routes.

     

    Configure IP Static Routes

    Configure IPv4 and IPv6 static routes.

     

    Configure IP Default Static Routes

    Configure IPv4 and IPv6 default static routes.

     

    Configure Floating Static Routes

    Configure a floating static route to provide a backup connection.

     

    Configure Static Host Routes

    Configure IPv4 and IPv6 static host routes that direct traffic to a specific host.

    Module

    Topic

    Objective

    Troubleshoot Static and

    Default Routes

     

    Troubleshoot static and default route configurations.

     

    Packet Processing with Static Routes

    Explain how a router processes packets when a static route is configured.

     

    Troubleshoot IPv4 Static and Default Route Configuration

    Troubleshoot common static and default route configuration issues.

     

    Prerequisites

    Students are required to have completed both the Introduction to Networks (ITN) and the Switching, Routing and Wireless

    Essentials (SRWE) courses before beginning this course. Learners are also expected to have the following skills:

    • High school reading level.
    • Basic computer literacy
    • Basic PC operating system navigation skills
    • Basic Internet usage skills

     

    CCNAv7 Enterprise Networking, Security, and Automation (ENSA) Outline

    The third course in the CCNAv7 curriculum describes the architectures and considerations related to designing, securing, operating, and troubleshooting enterprise networks. This course covers wide area network (WAN) technologies and quality of service (QoS) mechanisms used for secure remote access. ENSA also introduces software-defined networking, virtualization, and automation concepts that support the digitalization of networks. Students gain skills to configure and troubleshoot enterprise networks and learn to identify and protect against cybersecurity threats. They are introduced to network management tools and learn key concepts of software-defined networking, including controller-based architectures and how application programming interfaces (APIs) enable network automation. 

    Listed below are the current set of modules and their associated competencies outlined for this course. Each module is an integrated unit of learning that consists of content, activities, and assessments that target a specific set of competencies. The size of the module will depend on the depth of knowledge and skill needed to master the competency. Some modules are considered foundational, in that the artifacts presented, while not assessed, enable learning of concepts that are covered on the CCNA certification exam.

     

    CCNAv7 Enterprise Networking, Security, and Automation (ENSA) Outline

     

    CCNAv7: ENSA

     

     

    Module

    Topic

    Objective

    Single-Area OSPFv2

    Concepts               

     

    Explain how single-area OSPF operates in both point-to-point and broadcast multiaccess networks.

     

    OSPF Features and

    Characteristics

    Describe basic OSPF features and characteristics.

     

    OSPF Packets

    Describe the OSPF packet types used in single-area OSPF.

     

    OSPF Operation

    Explain how single-area OSPF operates.

    Module

    Topic

    Objective

    Single-Area OSPFv2 Configuration

     

    Implement single-area OSPFv2 in both point-to-point and broadcast multiaccess networks.

     

    OSPF Router ID

    Configure an OSPFv2 router ID.

     

    Point-to-Point OSPF Networks

    Configure single-area OSPFv2 in a point-to-point network.

     

    Multiaccess OSPF Networks

    Configure the OSPF interface priority to influence the DR/BDR election in a multiaccess network.

     

    Modify Single-Area

    OSPFv2

    Implement modifications to change the operation of single-area OSPFv2.

     

    Default Route

    Propagation

    Configure OSPF to propagate a default route.

     

    Verify Single-Area

    OSPFv2

    Verify a single-area OSPFv2 implementation.

     

    Module

    Topic

    Objective

    Network Security Concepts

     

    Explain how vulnerabilities, threats, and exploits can be mitigated to enhance network security.

     

    Current State of Cybersecurity

    Describe the current state of cybersecurity and vectors of data loss.  

     

    Threat Actors

    Describe the threat actors who exploit networks.

     

    Threat Actor Tools

    Describe tools used by threat actors to exploit networks.

     

    Malware

    Describe malware types.

     

    Common Network Attacks

    Describe common network attacks.

     

    IP Vulnerabilities and Threats

    Explain how IP vulnerabilities are exploited by threat actors.

     

    TCP and UDP Vulnerabilities

    Explain how TCP and UDP vulnerabilities are exploited by threat actors.

     

    IP Services

    Explain how IP services are exploited by threat actors.

     

    Network Security Best Practices

    Describe best practices for protecting a network.

     

    Cryptography

    Describe common cryptographic processes used to protect data in transit.

    Module

    Topic

    Objective

    ACL Concepts

     

    Explain how ACLs are used as part of a network security policy.

     

    Purpose of ACLs

    Explain how ACLs filter traffic.

     

    Wildcard Masks in ACLs

    Explain how ACLs use wildcard masks.

     

    Guidelines for ACL Creation

    Explain how to create ACLs.

     

    Types of IPv4 ACLs

    Compare standard and extended IPv4 ACLs.

    Module

    Topic

    Objective

    ACLs for IPv4

    Configuration

     

    Implement IPv4 ACLs to filter traffic and secure administrative access.

     

    Configure Standard IPv4 ACLs

    Configure standard IPv4 ACLs to filter traffic to meet networking requirements.

     

    Modify IPv4 ACLs

    Use sequence numbers to edit existing standard IPv4 ACLs.

     

    Secure VTY Ports with a Standard IPv4 ACL

    Configure a standard ACL to secure vty access.

     

    Configure Extended IPv4 ACLs

    Configure extended IPv4 ACLs to filter traffic according to networking requirements.

     

     

    Module

    Topic

    Objective

    NAT for IPv4

     

    Configure NAT services on the edge router to provide IPv4 address scalability.

     

    NAT Characteristics

    Explain the purpose and function of NAT.

     

    Types of NAT

    Explain the operation of different types of NAT.

     

    NAT Advantages

    Describe the advantages and disadvantages of NAT.

     

    Configure Static NAT

    Configure static NAT using the CLI.

     

    Configure Dynamic NAT

    Configure dynamic NAT using the CLI.

     

    Configure PAT

    Configure PAT using the CLI.

     

    NAT64

    Describe NAT for IPv6.

    Module

    Topic

    Objective

    WAN Concepts

     

    Explain how WAN access technologies can be used to satisfy business requirements.

     

    Purpose of WANs

    Explain the purpose of a WAN.

     

    WAN Operations

    Explain how WANs operate.

     

    Traditional WAN Connectivity

    Compare traditional WAN connectivity options.

     

    Modern WAN Connectivity

    Compare modern WAN connectivity options.

     

    Internet-Based Connectivity

    Compare internet-based WAN connectivity options.

    Module

    Topic

    Objective

    VPN and IPsec

    Concepts

     

    Explain how VPNs and IPsec secure site-to-site and remote access connectivity.

     

    VPN Technology

    Describe the benefits of VPN technology.

     

    Types of VPNs

    Describe different types of VPNs

     

    IPsec

    Explain how the IPsec framework is used to secure network traffic.

    Module

    Topic

    Objective

    QoS Concepts

     

    Explain how networking devices implement QoS.

     

    Network Transmission Quality

    Explain how network transmission characteristics impact quality.

     

    Traffic Characteristics

    Describe minimum network requirements for voice, video, and data traffic.

     

    Queuing Algorithms

    Describe the queuing algorithms used by networking devices.

     

    QoS Models

    Describe the different QoS models.

     

    QoS Implementation Techniques

    Explain how QoS uses mechanisms to ensure transmission quality.

    Module

    Topic

    Objective

    Network

    Management

     

    Implement protocols to manage the network.

     

    Device Discovery with CDP

    Use CDP to map network topology.

     

    Device Discovery with LLDP

    Use LLDP to map network topology.

     

    NTP

    Implement NTP between an NTP client and an NTP server.

     

    SNMP 

    Explain SNMP operation.

     

    Syslog

    Explain Syslog operation.

     

    Router and Switch File Maintenance

    Use commands to back up and restore an IOS configuration file.

     

    IOS Image Management

    Perform an upgrade of an IOS system image.  

    Module

    Topic

    Objective

    Network Design

     

    Explain the characteristics of scalable network architectures.

     

    Hierarchical Networks

    Explain how data, voice, and video are converged in a switched network.

     

    Scalable Networks

    Explain considerations for designing a scalable network.

     

    Switch Hardware

    Explain how to switch hardware features support network requirements.

     

    Router Hardware

    Describe the types of routers available for small-to-medium sized business networks.

    Module

    Topic

    Objective

    Network

    Troubleshooting

     

    Troubleshoot enterprise networks.

     

    Network Documentation

    Explain how network documentation is developed and used to troubleshoot network issues.

     

    Troubleshooting Process

    Compare troubleshooting methods that use a systematic, layered approach.

     

    Troubleshooting Tools

    Describe different networking troubleshooting tools.

     

    Symptoms and Causes of

    Network Problems

    Determine the symptoms and causes of network problems using a layered model.

     

    Troubleshooting IP Connectivity

    Troubleshoot a network using the layered model.

     

     

    Module

    Topic

    Objective

    Network

    Virtualization

     

    Explain the purpose and characteristics of network virtualization.

     

    Cloud Computing

    Explain the importance of cloud computing.

     

    Virtualization

    Explain the importance of virtualization.

     

    Virtual Network

    Infrastructure

    Describe the virtualization of network devices and services.

     

    Software-Defined

    Networking

    Describe software-defined networking.

     

    Controllers

    Describe controllers used in network programming.

    Module

    Topic

    Objective

    Network

    Automation

     

    Explain how network automation is enabled through RESTful APIs and configuration management tools.

     

    Automation Overview

    Describe automation.

     

    Data Formats

    Compare JSON, YAML, and XML data formats.

     

    APIs

    Explain how APIs enable a computer to computer communications.

     

    REST

    Explain how REST enables a computer to computer communications.

     

    Configuration

    Management

    Compare the configuration management tools Puppet, Chef, Ansible, and SaltStack

     

    IBN and Cisco DNA

    Center

    Explain how the Cisco DNA center enables intent-based networking.

     

     

     

     

     

     

     

     

     

     

     

     

     

    Grading Policy:


    Category Weight Calculations: Category Average * (MP Weight / 100) = Category Score
    Final Grade Calculation: ((Sum of Category Scores) * 100) / (Sum of Category Weights)) + Extra Credit Points

     

    Category

     

    Weight

     

    Tests

     

    25.0

     

    Quizzes

     

    20.0

     

    Class Work

     

    20.0

     

    Authentic Assessment

     

    25.0

     

    Homework

     

    10.0

     

     

     

    100.0

     

                                                                                         

    Homework: Homework will consist of completing the assignments in the PC Hardware and Software Lab Manual and additional exercises listed on the weekly assignment sheet.  Completion will be documented on the weekly assignment sheet. 

    Projects: There will be graded lab assignments.  You will work in teams of two, but labs will be graded on an individual basis.  All labs require the instructor or lab assistant’s initial on the weekly assignment sheet upon completion.  Labs will be accepted late but at a reduction of 20 points per day (max. score 100).  Labs will not be accepted over a week late (The only exception is Instructor approved excused absence).  If your lab partner is absent during a lab day, continue to work on your labs.  It will be your lab partner’s responsibility to catch up.        

    Tests: There will also be in-class close book quizzes/tests as we complete each chapter of the text.  They will be short quizzes and are based on the content of the current chapter.  

    Make-Up Policy: First of all, MAKE-UP WORK IS YOUR RESPONSIBILITY!  Assignments and homework can be obtained by going to our class calendar @ .  Tests and quizzes are to be made-up in the morning before school on the day of your return or at a scheduled time per the instructor, which generally speaking, will be during Student Access Time. 

    Re-do Policy:

    Students will have an opportunity to redo any semester work that is graded as D (70) or below.  If a student opts to take advantage of the redo policy, it must be re-submitted within one (1) week of the graded assignment and the highest grade a student can receive is a 71 

    Classroom Rules of Conduct:

    • You are expected to be punctual, alert, and prepared for class. You will be considerate of other students, which includes being quiet except when you are contributing to the class. You are encouraged to ask questions when in class - if you are confused or uncertain; it's likely your classmates are also. If you desire extra help, make arrangements with your instructor to schedule a time during office hours.
    • Class time will be spent doing activities of relevance and rigor to joyfully accomplish the objectives of our course.  In keeping with this mission, students are to remain on task for the entire period.
    • All work areas must be straightened up before anyone is dismissed (all paper in the trash, chairs pushed in, and computer workbenches NEAT and ORGANIZED).  I (Mr. Jean) dismiss you, not the bell, so if everything is in order when the bell rings, you will not be late for your next class.  J
    • NO FOOD, GUM, CANDY, DRINKS, ETC.  ARE ALLOWED IN THE LAB SETTING.  Thank you for your understanding and cooperation.

    Cellular Phones

    • Cellular phones and pagers are not allowed in class.
    • Respect should be shown to all classroom equipment and materials…and to the computer hardware that we will be handling in a variety of ways on a very frequent basis throughout the year.   Carelessness will not be tolerated.

                                  AND FINALLY…  (drum roll, please)

    Take charge of your learning….doN't fall behind…and if you need help, please let me know, but be sure to DO YOUR PART every step of the way…your success in this class truly depends on it. 

    Academic Dishonesty Policy: The integrity of the academic program and the evaluation of each student’s achievement are of primary concern to educational institutions.  Cheating on an educational exercise not only reflects dishonesty on the part of the student but also diminishes the value of the work done by his/her classmates.  Students who cheat or plagiarize (using another’s words, ideas, or writing as one’s own) shall be subject to the following: referral to the Assistant Principal; parent/guardian contacted; a zero recorded for the exercise; possible detention and/or suspension; and/or removal from the course with a grade of “F” recorded on the transcript.

Last Modified on June 21, 2023