Cisco CCNA Training

Purchase Options:

This CCNA video series provides presentations based on our classroom training and practical videos for learning the topics covered in this certification track. We will teach you the concepts, configuration, monitoring, and troubleshooting related to Cisco networks. Many of the topics are presented in a step-by-step process, and include an example. You will also learn about design, best practices, and topics relevant for the real world networks shown in our practical video labs, showing you how to configure and monitor Cisco routers and switches. This video series is based on ICND1 and ICND2 includes 14 chapters customized to provide the following resources (for each chapter):

  • Bootcamp Presentation Videos
  • Practical Video Labs
  • Bootcamp Presentation Files

Videos (MP4) [~22 hours], Documents (PDF)

640-802 CCNA
OR
640-822 ICND1: Interconnecting Cisco Networking Devices Part 1 (ICND1)
640-816 ICND2: Interconnecting Cisco Networking Devices Part 2 (ICND2)

Below are the video topics in this series [~22 hours]:

Interconnecting Cisco Network Devices Part 1 (ICND1) for CCENT/CCNA:

  • Building Simple Networks
    1. Exploring the Functions of Networking
      1. What is a Network?
      2. Components on a Network
      3. Network User Applications (Batch, Interactive, Real-Time)
      4. Physical and Logical Topologies (Bus, Star, Ring)
    2. Securing the Network
      1. Need for Network Security
      2. Open and Closed Networks
      3. Adversaries & Hacker Motivations
      4. Classes of Attacks
      5. Physical Security
      6. Environmental Threats
      7. Electrical Threats
      8. Maintenance Threats
      9. Reconnaissance and Access/Password Attacks
    3. Understanding Host-to-Host Communication Models
      1. OSI Reference Model
      2. Data Encapsulation and De-encapsulation
      3. Protocol Data Units (PDU)
      4. TCP/IP Model
      5. Network, Routing and Transport Protocols
    4. Understanding the TCP/IP’s Internet Layer
      1. IP Addressing
      2. IP Header
      3. IP Address Classes
      4. Network and Broadcast Addresses
      5. Private IP Addresses & Address Exhaustion
      6. CIDR Addressing
      7. DHCP
      8. DNS
      9. Determine IP Address of a Host
      10. Source and Destination Terms
    5. Understanding the TCP/IPs Transport & Application Layers
      1. IP and Transport
      2. TCP
        1. TCP Header
        2. 3-Way Handshake
        3. Segmentation
        4. Windowing (Fixed, Sliding Window), Window Size, Flow Control
        5. Error Recovery
        6. Sequence and Acknowledgements
        7. Global Synchronization
      3. UDP, UDP Header
      4. Port Numbers with TCP and UDP
    6. Packet Delivery Process
      1. Layer 1 Devices and Functions
      2. Layer 1 Devices, Functions, and Addressing (MAC Address)
      3. Layer 3 Devices, Functions, and Addressing (IP Addressing)
      4. Address Resolution Protocol (ARP)
      5. Host-to-Host Packet Delivery Example
      6. Default Gateway
      7. Ping and Traceroute
    7. Understanding Ethernet
      1. Ethernet and LANs
      2. Components on the LAN
      3. Ethernet 802.3
      4. Data Link Sub-Layers: MAC and LLC
      5. CSMA/CD, Collision Detection
      6. Ethernet Frame
      7. Ethernet Addressing
    8. Connecting into an Ethernet LAN
      1. Ethernet Network Speed
      2. Unshielded Twisted Pair (UTP) Cables
      3. UTP Cable Categories: CAT3, CAT5, CAT6, etc
      4. UTP Straight-Through & Crossover Cables
      5. RJ-45 Ports and Connectors
      6. GBIC and Fiber Cables (Short, Long range)
  • Ethernet LANs
    1. Challenges of Shared LANs
      1. Ethernet LAN Segments
      2. Ethernet Specifications (e.g. 100BASE-TX)
      3. Collisions and Collision Domains
    2. Cisco IOS Software
      1. Cisco IOS using CLI (Command Line Interface)
      2. Basic Startup Process
      3. Basic Configuration Wizard
      4. Console and Remote Terminal
      5. Cisco EXEC Access Levels (User EXEC, Privilege EXEC)
      6. Keyboard Help: ?, Tab
      7. Enhanced Editing Commands
      8. Memory on Cisco Routers (Flash, DRAM, NVRAM, ROM)
    3. Starting a Cisco Switch
      1. Switch LED and Port LED Indicators
      2. Logging into a Cisco Switch
      3. Cisco Switch Configuration
      4. Saving Configuration
      5. Verify Basic Switch Operations
      6. MAC Address Table Management
    4. Cisco Switch Security
      1. Physical and Environmental Threats
      2. Password Security (Enable, User Accounts)
      3. Telnet vs. SSH
      4. Port Security Concepts and Configuration
      5. Monitoring Port Security
    5. Maximizing the Benefits of LAN Switching
      1. Microsegmentation
      2. Full Duplex and Half Duplex
      3. Duplex Configuration
      4. Media Rates in Enterprise Networks
      5. Hierarchical Design: Core, Distribution, Access
      6. Spanning Tree Protocol (STP)
    6. Troubleshooting Switch Issues
      1. Layered Approach for Troubleshooting
      2. Identifying and Resolving Media Issues
      3. Monitoring Commands
      4. Identifying and Resolving Configuration Issues
  • Wireless LANs (WLANs)
    1. Wireless Networking
      1. Business Case for Wireless
      2. Wireless LAN (WLAN)
      3. CSMA/CA Collision Avoidance
      4. Radio Frequency (RF) Transmission
      5. IEEE and Wireless
      6. Radio Waves (VHF, UHF, SHF)
      7. Unlicensed Bands (ISM, UNII)
      8. EIRP
      9. 802.11 Standards (802.11a/b/g/n)
    2. Wireless Security
      1. Security Threats
      2. WEP
      3. WPA, 802.11i/WPA2
      4. TKIP, AES
      5. 802.1x
      6. Service Set Identifier (SSID)
      7. Wireless Client Association
    3. Implementing a Wireless LAN
      1. Ad-Hoc
      2. Infrastructure Mode: BSS, ESS
      3. BSA and ESA Wireless Topology
      4. Wireless Data Rates
      5. Wireless Clients
      6. Wireless Troubleshooting
  • LAN Concepts and Configuration
    1. Router Functions
      1. Routers and Main Functions of Routers
      2. Path Determination
      3. Routing Table
      4. Static Routing
      5. Dynamic Routing
      6. Routing Metrics
      7. Distance Vector and Link State Routing Protocol
    2. Binary Numbering
      1. Decimal and Binary Systems
      2. Significant Bits (LSB, MSB)
      3. Converting Decimal to Binary
      4. Converting Binary to Decimal
    3. Network Addressing & Subnetting
      1. Sub-Networks
      2. Flat Networks
      3. Two-Level and Three-Level Addressing
      4. Creating Subnets (Subnetting)
      5. Subnet Masks
      6. Subnet Address, Broadcast Address
    4. Starting a Cisco Router
      1. Startup of Cisco Router
      2. Setup Wizard
      3. Auto Secure
      4. User EXEC, Privilege EXEC modes
      5. Help Services: ?, Tab
      6. Basic Cisco IOS Commands
      7. Viewing Configuration Files
    5. Configuring a Cisco Router
      1. Configuration Mode
      2. Saving Configuration
      3. Configuring Hostname and Console Settings
      4. Initializing Interfaces (no shutdown)
      5. Configuring IP Addresses on Interfaces
      6. Interface Status
    6. Cisco Router Security
      1. Physical and Environmental Threats
      2. Password Security (Enable, Console, VTY)
      3. Enable Password Hack
      4. Configuring Security Banner
      5. Telnet and SSH Configuration
    7. Using the Cisco SDM
      1. Overviews
      2. Smart Wizards
      3. Cisco SDM Dashboard
      4. Cisco SDM Software
      5. HTTP and HTTPS Configuration
      6. Username and Password using Privilege 15 Configuration
      7. VTY Configuration
      8. Starting Cisco SDM
    8. Cisco Router acting as a DHCP Server
      1. Understanding DHCP
      2. Enabling DHCP on Cisco SDM
      3. DHCP Tips
      4. Monitoring DHCP
    9. Accessing Remote Devices from a Cisco Router
      1. Telnet and SSH from a Cisco Router
      2. Suspending and Resuming a Telnet Session
      3. Connectivity Tests (Ping, Traceroute)
  • WAN Connections and IP Routing
    1. Understanding WAN Technologies
      1. What is a WAN?
      2. WAN vs. LAN
      3. WAN Cabling
      4. DCE and DTE
      5. Dedicated WAN: Leased Line
      6. Switched WAN: Circuit Switched, Packet Switched, Cell Switched
    2. Enabling the Internet Connection
      1. Packet Switched Communication
      2. DSL
      3. Cable
      4. History of the Internet
      5. NAT and PAT
    3. Static Routing
      1. Routing Overview
      2. Static Route Configuration
      3. Default Route Configuration
      4. Routing Table
    4. Configuring Serial Encapsulations
      1. Circuit Switching
      2. PSTN, POTS
      3. WAN Bandwidth in the US and Europe
      4. WAN Interface Configuration
      5. Bandwidth Command
      6. Point-to-Point Communication: HDLC, PPP
      7. PPP: LCP, NCP, Authentication
      8. HDLC Configuration
      9. PPP Configuration
      10. Monitoring PPP
      11. Frame Relay, VC, DLCI
      12. ATM and Cell Switching
    5. Configuring RIP
      1. IP Routing
      2. Dynamic Routing
      3. IGP and EGP
      4. Routing Protocol Classifications: Distance Vector, Link State, Hybrid
      5. Administrative Distance
      6. Classful Routing and Classless Routing
      7. RIP
      8. RIP Configuration
      9. Monitoring RIP
      10. Troubleshooting RIP
  • Network Management
    1. Discovering Neighbors on the Network
      1. Cisco Discovery Protocol (CDP)
      2. Information obtained using CDP
      3. Configuring CDP
      4. Disabling CDP
      5. Monitoring and Maintaining CDP
    2. Cisco Router Startup and Configuration Files
      1. Cisco Router Power-on Boot Sequence
      2. Internal Router Components (CPU, Memory, Interfaces)
      3. ROM Functions
      4. Cisco IOS
      5. Configuration Register
    3. Managing Files and IOS File Systems
      1. Cisco IOS File Systems (Network, Flash, RW Data)
      2. Managing files using Cisco IFS
      3. IOS file names
      4. IOS Software Backup
      5. IOS Software Upload/Upgrade
      6. Managing Configuration Files
      7. Merging Configuration Files
      8. Show and Debug Commands
  • Practical Videos
    • TCP IP Properties and Network Tools
    • CCENT/CCNA Network Design and Diagram
    • Operating and Navigating Cisco IOS
    • Basic Configuration on Cisco IOS I
    • Basic Configuration on Cisco IOS II
    • Starting up a Cisco Catalyst Switch
    • Basic Configuration and Navigating on a Cisco Switch
    • Configuring Port Security (using Sticky MAC addresses)
    • Port Security Violations
    • Static Port Security Configuration
    • Basic Network Configuration
    • Managing Telnet Sessions
    • Console and VTY Password Configuration
    • Sending Session Messages on Cisco IOS
    • Configuring DHCP Server on Cisco IOS
    • Enabling DHCP on a Cisco Ethernet Interface
    • Enabling HTTP Services
    • User Accounts with Privilege Level Rights
    • Enabling SSHv2 on Cisco IOS
    • Using the Configuration Wizard (Setup)
    • Using the Auto Secure Wizard
    • HDLC and PPP Configuration
    • Configuring Static Routes
    • Configuring Static Default Routes
    • Configuring RIP Routing
    • Administrative Distance Configuration Example
    • Configuring a Basic Static NAT
    • Cisco Discovery Protocol (CDP)
    • Managing File Systems on Cisco IOS
    • Viewing Processes on Cisco IOS

Interconnecting Cisco Network Devices Part 2 (ICND2) for CCNA:

  • Review of Cisco IOS for Routers and Switches
    1. Configuration and Router Modes
    2. Other Configuration Modes
    3. Major Commands and Subcommands
    4. Help Facilities
    5. Command Review
  • Switched Network Design
    1. Implementing VLANs and Trunks
      1. VLANs and Trunks
      2. Without VLANs (Flat Network)
      3. VLANs
      4. VLANs and IP Addressing
      5. LAN and Data Center traffic
      6. Traffic Types
      7. Voice and Data VLANs
      8. VLAN Membership Modes
      9. 802.1Q Trunking
      10. 802.1Q Frame
      11. Native VLAN
      12. VLAN Trunking Protocol (VTP)
      13. vlan.dat File
      14. VTP Dangers
      15. VTP Pruning
      16. VTP Configuration
      17. Verifying VTP Configuration
      18. 802.1Q Configuration
      19. Verifying 802.1Q Configuration
      20. Default VLANs and User-Defined VLANs
      21. VLAN Configuration
      22. Verifying VLAN Configuration
      23. VLAN Port Assignment
      24. Adds, Moves and Changes for VLANs Considerations
    2. Spanning Tree Protocol (STP)
      1. Redundant Switched Topology
      2. 2-Tier/3-Tier Switch Topology (Core, Distribution, Access)
      3. Oversubscription Ratios
      4. EtherChannel
      5. Problems with Redundant Topologies
      6. Switch Behavior with Broadcast Frames
      7. Broadcast Storms
      8. Multiple Frame Transmissions
      9. MAC Database Instabilities
      10. Resolving Issues with STP
      11. Bridge Protocol Data Unit (BPDU)
      12. STP Port States
        1. Blocking State
        2. Listening State
        3. Learning State
        4. Forwarding State
      13. Portfast
      14. Portfast Configuration
      15. STP Operation
        1. Selecting the Root Bridge
        2. Root Ports
        3. Designated Ports
        4. Path Cost
      16. Step-by-Step STP Example
      17. STP Recalculation
      18. Common Spanning Tree (CST)
      19. Per-VLAN Spanning Tree (PVST+)
      20. PVST+ Operation
      21. Rapid Spanning Tree (RSTP)
      22. RSTP Port Roles
      23. RSTP Example
      24. Per-VLAN RSTP Plus (PVRST+, RSTP+)
      25. Configuring PVRST+ (RSTP+)
      26. Verifying PVRST+ (RSTP+)
      27. Static Root Bridge Configuration
      28. Multiple Spanning Tree Protocol (MSTP)
    3. Routing between VLANs
      1. Understanding Inter-VLAN routing
      2. 802.1Q on a Cisco Router interface
      3. Configuring Inter-VLAN Routing
        1. Tagged VLAN
        2. Native VLAN (Untagged VLAN)
    4. Securing the Expanded Network
      1. Overview of Switch Security Concerns
      2. Security Policy
      3. Securing Switch Devices
      4. Securing Switch Protocols
      5. Mitigating Attacks through a Switch
      6. Port Security
      7. 802.1x Port-Based Authentication
    5. Troubleshooting Switched Networks
      1. Troubleshooting Switches
      2. Physical Layer/Port Connectivity Issues
        1. Hardware Issues
        2. Configuration Issues
      3. VLAN and Trunking Issues
        1. Mismatches
        2. Inter-VLAN connectivity
      4. VTP Issues
        1. VTP communication
        2. Step-by-Step Example of VTP Danger
      5. Spanning Tree issues
        1. Broadcast Storm
        2. Root Ports, Root Bridge
        3. Verifying the Configuration of RSTP+
  • Routed Network Design
    1. Review of Dynamic Routing
      1. Types of Routing
      2. Routed vs. Routing
      3. Routing Protocols
      4. Routing Protocol Types (IGP, EGP)
      5. IGP Routing Protocol Algorithms
      6. Routing Protocol Metrics
      7. Administrative Distance (AD)
        1. Routing Protocol ADs
        2. Example of Administrative Distance
    2. Distance Vector Routing Protocols
      1. Distance Vector Routing
      2. Route Discovery
      3. Maintaining Routes
      4. Routing Loops
      5. Troubleshooting Routing Loops and TTL (Time-to-Live)
      6. Route Poisoning
      7. Poison Reverse
      8. Hold-Down Timers
      9. Triggered Updates
      10. Hold-Downs with Triggered Updates
    3. Link State and Hybrid Protocols
      1. Link State Protocols
      2. Link and Interfaces with Link State Protocols
      3. Benefits and Advantages
      4. Link-State Network Hierarchy (AS, Areas)
      5. Link State Route Types
      6. Link State Routing Protocol Algorithms & Example
      7. Link State Protocol Limitations
      8. Hybrid Routing Protocols
    4. Implementing Variable-Length Subnet Masks (VLSM)
      1. VLSM
      2. Reviewing Subnets and Subnetting
      3. Classful Prefixes
      4. VLSM Benefits
      5. Calculating VLSM Networks
      6. Example of Calculating VLSM networks
      7. VLSM Example
    5. Route Summarization with VLSM
      1. Summarization with VLSM
      2. Example of Summarization with VLSM
      3. Calculating the Summary Route
      4. Requirements for Summarization
      5. How route summarization is managed
      6. Classful Summarization in Discontiguous Networks
  • Simple OSPF Configuration
    1. Introducing OSPF
      1. Introducing OSPF
      2. OSPF Topologies
      3. OSPF Area Types
        1. Backbone
        2. Non-Backbone Area
      4. OSPF Router Types
        1. Backbone Router
        2. Non-Backbone Routers (Internal/Standard, Stub)
        3. Area Border Router (ABR)
        4. AS Border Router (ASBR)
      5. Establishing OSPF Neighbor Adjacencies
      6. OSPF Hello Packet
      7. SPF Algorithm
      8. OSPF Cost Calculation
    2. Configuring and Verifying OSPF
      1. Configuring OSPF
      2. Loopback Interfaces
      3. Verifying OSPF Configuration
        1. show ip route
        2. show ip protocols
        3. show ip ospf
        4. show ip ospf interface
        5. show ip ospf neighbor
      4. Routing Table Fields and OSPF
      5. Troubleshooting OSPF
      6. Load Balancing with OSPF
      7. Configuring Load Balancing with OSPF
      8. OSPF Authentication
      9. Configuring Plaintext Authentication
      10. Configuration Example for OSPF Authentication
      11. Verifying Plaintext Authentication
    3. Troubleshooting
      1. Troubleshoot OSPF Neighbor Adjacencies
      2. Troubleshoot OSPF Routing Table issues
      3. Troubleshoot OSPF Authentication issues
  • Simple EIGRP Configuration
    1. Implementing EIGRP
      1. Introducing EIGRP
      2. Routing Tables for EIGRP
      3. Successor and Feasible Successor Routes
    2. Configuring and Verifying EIGRP
      1. Configuring EIGRP
      2. Configuration Example
      3. Summarization
      4. Verifying EIGRP
        1. show ip route
        2. show ip protocols
        3. show ip eigrp neighbors
        4. show ip eigrp topology
        5. show ip eigrp traffic
        6. debug ip eigrp
    3. Load Balancing with EIGRP
      1. Loading with EIGRP
      2. EIGRP Metrics
      3. Load Balancing across Equal Cost Paths
      4. Load Balancing across Unequal Cost Paths
        1. Concepts
        2. Configuration & Example
    4. Route Authentication
      1. EIGRP Authentication
      2. Creating a Key Chain
      3. Configuring MD5 Authentication
      4. Configuration Examples
      5. Verifying MD5 Authentication
    5. Troubleshooting EIGRP
      1. Troubleshooting EIGRP neighbor relationships
      2. Troubleshooting EIGRP routing table issues
      3. Troubleshooting EIGRP authentication issues
  • Managing Traffic with Access Control Lists (ACLs)
    1. Access Control List (ACL)
      1. ACL Operations
      2. Understanding ACLs
      3. Outbound ACLs
      4. Inbound ACLs
      5. IP ACLs
      6. ACL Evaluation
      7. Types of ACLs (Standard, Extended, Numbered, Named)
      8. ACL Identification
      9. Sequence Numbers
      10. General Principles for Creating ACLs
      11. Dynamic ACLs
        1. Concepts and Benefits
        2. Configuration
      12. Reflexive ACLs
        1. Concepts and Benefits
        2. Configuration
      13. Time-Based ACLs
        1. Concepts and Benefits
        2. Configuration
      14. ACL Wildcard Masking
      15. Numbered Standard ACLs
      16. Configuring Numbered Standard ACLs & Examples
      17. Removing ACLs
      18. Access Class for VTY Sessions (Telnet, SSH)
      19. Numbered Extended ACLs
      20. Configuring Numbered Extended ACLs & Examples
      21. Extended ACL using Established
      22. Configuring Named Standard ACLs & Examples
      23. Configuring Named Extended ACLs & Examples
      24. Adding Comments to Named/Numbered ACLs
    2. Troubleshooting ACLs
      1. Verifying ACLs applied to an interface
      2. Commands for monitoring ACLs
      3. ACL Troubleshooting and Problem Solving Scenarios
  • Managing Address Space with NAT and IPv6
    1. Network Address Translation (NAT)
      1. Scaling the network with NAT and PAT
      2. Introducing NAT and PAT
      3. NAT Terms
      4. NAT Forms (Static, Dynamic, PAT)
      5. NAT Overload (PAT)
      6. Static NAT Address Mapping
      7. Router Processing Order
      8. Configuring a Static NAT
      9. Verifying NAT Translations
      10. Configuring Dynamic NAT
      11. Configuring NAT Overload
      12. NAT Process
      13. NAT Timeouts
      14. Clearing NAT Translations
      15. Resolving Translation Table Issues
      16. Monitoring NAT
      17. Troubleshooting NAT Examples
    2. Transitioning to IPv6
      1. Reasons for using IPv6
      2. IPv6 and IPv4 comparisons
      3. IPv6 Benefits
      4. Internet usage
      5. Understanding IPv6 addresses
      6. IPv6 Address Shortcuts
      7. Broadcasts in IPv6
      8. IPv6 Unicast Address Space
      9. Global Unicast Address
      10. Private Unicast Address (Site-Local, Link-Local)
      11. IPv6 Address Format
      12. IPv6 over Data Link Layer
      13. IPv6 Address Aggregation
      14. Assigning IPv6 Address
      15. Manual Interface ID Assignment
      16. Configuring a Static IPv6 Address
      17. Name Resolution
      18. EUI-64 process in IPv6
      19. EUI-64 Interface ID Assignment
      20. Configuring IPv6 using EUI-64
      21. DHCPv6 (Stateful Addressing)
      22. Routing Characteristics with IPv6
      23. IPv6 Routing Protocols
      24. RIP Next Generation (RIPng)
      25. Configuring RIPng
      26. IPv4 and IPv6 Transition Mechanisms
      27. Dual Stack
      28. Dual Stack Configuration Example
      29. IPv6 Tunneling
      30. IPv6 Tunneling Issues and Requirements
  • Extending the Network into the WAN
    1. Virtual Private Networks (VPN)
      1. Introducing VPN Solutions
      2. VPN Benefits
      3. VPN Types
      4. Site-to-Site VPN
      5. Remote Access (Client VPN)
      6. Easy VPN
      7. SSL VPN (AnyConnect)
      8. VPN Deployment Options
      9. VPN on Cisco IOS Routers
      10. VPN on Cisco ASA Firewalls
      11. Introducing IPSec
      12. Confidentiality (Encryption)
      13. Encryption Algorithms (DES, 3DES, AES)
      14. Authentication
      15. Authentication/Hash Algorithms (MD5, SHA-1)
      16. Peer Authentication (PSK, RSA Signature)
      17. IPSec Protocol Framework
      18. Authentication Header (AH)
      19. Encapsulation Security Payload (ESP)
    2. WAN Connection with PPP
      1. Understanding WAN Encapsulations
      2. WAN Protocols
      3. Metro Ethernet
      4. Overview of PPP
      5. PPP Session Establishment (LCP, NCP)
      6. PAP
      7. CHAP
      8. Configuring PPP Authentication using CHAP
      9. Verifying PPP Encapsulation
      10. Verifying PPP Authentication
    3. WAN Connection with Frame Relay
      1. Understanding Frame Relay
      2. Frame Relay WAN Devices (DTE, DCE)
      3. Frame Relay Components
        1. Local Access Rate
        2. Virtual Circuit (VC)
        3. Permanent Virtual Circuit (PVC)
        4. Switched Virtual Circuit (SVC)
        5. DLCI
        6. Committed Information Rate (CIR)
        7. Discard Eligible (DE)
        8. Inverse ARP
        9. Local Management Interface (LMI)
        10. FECN, BECN
      4. Frame Relay Topologies (Partial-Mesh, Full-Mesh, Star Topology)
      5. Frame Relay NBMA
      6. Resolving Routing Reachability Issues
      7. Frame Relay VC Mapping
      8. Signaling with Frame Relay
      9. Process of Inverse ARP and LMI
      10. Configuring Frame Relay using Inverse-ARP
      11. Configuring Frame Relay using Static Maps
      12. Configuring Frame Relay Point-to-Point interfaces
      13. Configuring Frame Relay Multipoint (NBMA)
      14. Verifying Frame Relay
      15. Troubleshooting Frame Relay
      16. Troubleshooting Frame Relay Connectivity Issues
      17. Troubleshooting Frame Relay Remote Router Connectivity
      18. Troubleshooting Frame Relay End-to-End Connectivity
  • Practical Videos
    1. Default Switched Network Configuration
    2. VTP Configuration
    3. 802.1Q Configuration
    4. Creating VLANs
    5. Configuring Primary and Secondary Root Bridges (for each VLAN)
    6. VLAN Port Mapping
    7. Inter-VLAN Configuration on Cisco IOS Router
    8. Monitoring and Verifying Switch Operations
    9. OSPF Configuration
    10. Verifying OSPF Configuration
    11. OSPF Equal-Cost Load Balancing
    12. OSPF Plaintext Authentication
    13. EIGRP Configuration
    14. Verifying EIGRP Configuration
    15. EIGRP Unequal-Cost Load Balancing
    16. EIGRP MD5 Authentication
    17. Troubleshooting EIGRP MD5 Authentication issues
    18. Standard Numbered ACLs
    19. Extended Named ACLs
    20. Adding ACL rules using Sequence Numbers
    21. Adding ACL Logging
    22. Verifying ACL Configuration
    23. Reflexive ACLs (RACL)
    24. Dynamic ACLs (Lock-and-Key)
    25. Time-Based ACLs
    26. Static NAT Configuration
    27. NAT Overload (PAT) Configuration
    28. Dynamic NAT Configuration
    29. Verifying NAT Configuration
    30. Static IPv6 Address Configuration
    31. Static IPv6 Address using EUI-64
    32. RIP Next Generation (RIPng) Configuration for IPv6
    33. Verifying RIPng Configuration
    34. Frame Relay Configuration using Multipoint interface
    35. Frame Relay Static Map Configuration
    36. Frame Relay using Inverse-ARP
    37. Frame Relay Configuration using Point-to-Point interfaces
    38. Configuring EIGRP Routing with Frame Relay
    39. Verifying Frame Relay Configuration
    40. Configuring PPP using CHAP Authentication

IMG_7397Michel Thomatis, CCIE #6778 (15 year) – Chief Network Architect & Lead Trainer

Michel has spent the last 18 years as a network engineer/architect.  As a 15-year CCIE, Michel loves the opportunity to provide training in a wide-array of network technologies. He formerly worked at Cisco, as well as in government, banking, and non-profit organizations. He has published the “Network Design Cookbook” and a science fiction novel called “The Dark End”.  He has also published various iOS applications (virtual Network Engineer, Circlefalls) that can be found on Apple’s iOS App Store.  Other software development experience includes python and SDN.  Currently, Michel is the owner, Chief Network Architect and Lead Trainer at RouteHub Group, LLC.