{"id":13634,"date":"2022-09-12T13:43:09","date_gmt":"2022-09-12T10:43:09","guid":{"rendered":"https:\/\/esi.edu.sa\/?post_type=courses&#038;p=13634"},"modified":"2026-02-04T15:15:14","modified_gmt":"2026-02-04T12:15:14","slug":"cisco-ccna","status":"publish","type":"courses","link":"https:\/\/esi.edu.sa\/en\/courses\/cisco-ccna\/","title":{"rendered":"CISCO CCNA Course"},"content":{"rendered":"<p dir=\"ltr\" style=\"text-align: justify;\"><img decoding=\"async\" class=\"alignnone wp-image-20027\" src=\"https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy.png\" alt=\"\" width=\"188\" height=\"40\" srcset=\"https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy.png 300w, https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy-50x11.png 50w\" sizes=\"(max-width: 188px) 100vw, 188px\" \/><\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Overview<\/strong><\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Cisco Certified Network Associate (CCNA) is a widely-recognized IT certification for professionals who are beginning their IT<\/li>\n<li>The CCNA certification course is developed by Cisco and is ideal for professionals who are part of digital transformation initiatives that help in business growth and new-age<\/li>\n<li>This 5-day Certified cisco network associate certification course validates your knowledge and skills in the fundamentals of networking, IP connectivity, security, automation, and more.<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Learning Objectives<\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">Participants who take part in the Cisco Certified Network Associate (CCNA) training will learn:<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Network fundamentals in the form of network components, topology, virtualization, switching concepts, and more<\/li>\n<li>Install, operate, and configure IPV4 to IPV6 networks<\/li>\n<li>Installing switches to perform the initial configuration<\/li>\n<li>Understanding routing and implementation of a Cisco router<\/li>\n<li>Host-to-host communication through routers and switches<\/li>\n<li>Resolve network issues and common problems with IPv4 addressing<\/li>\n<li>VLANs, trunks, and inter-VLAN Routing<\/li>\n<li>Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP)<\/li>\n<li>WAN and VPN concepts<\/li>\n<li>How to introduce virtualization through network and device architectures, and more<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Target Audience<\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">Job roles that can take up CCNA training include, but are not limited to:<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>IT Technicians<\/li>\n<li>Network Engineers<\/li>\n<li>Anybody who wants to gain knowledge of Cisco products and services<\/li>\n<li>Aspiring IT Professionals<\/li>\n<li>Anybody who is looking to clear their CCNA Certification Exam<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>The Main Topic of the Course<\/strong><\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Module 1: Network Fundamentals<\/li>\n<li>Module 2: Network Access<\/li>\n<li>Module 3: IP Connectivity<\/li>\n<li>Module 4: IP Services<\/li>\n<li>Module 5: Security Fundamentals<\/li>\n<li>Module 6: Automation and Programmability<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Course Prerequisites<\/strong><\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>There are no prerequisites required to sit for the CCNA However, it would be beneficial if participants have a minimum 1-2 years of work experience in implementing Cisco services and solutions<\/li>\n<li>It is also recommended but not mandatory that participants have basic IP addressing skills and knowledge of networking fundamentals<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Exam requirements<\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">There are no specific prerequisites required to attend Exam<\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>LAB Requirement<\/strong><\/p>\n<p style=\"text-align: justify;\">Students should have a computer with 8 GB at least to create virtualization LAB<\/p>\n<p style=\"text-align: justify;\">LAB could be applied to the client&#8217;s computer with any virtualization<\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Course Outlines and Training Plan<\/strong><\/p>\n<p dir=\"ltr\" style=\"direction: ltr; text-align: justify;\">Module 1: Network Fundamentals<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Explain the role and function of network components<\/li>\n<li>Describe characteristics of network topology architectures<\/li>\n<li>Compare physical interface and cabling types<\/li>\n<li>Identify interface and cable issues (collisions, errors, mismatch duplex, and\/or speed)<\/li>\n<li>Compare TCP to UDP<\/li>\n<li>Configure and verify IPv4 addressing and subnetting<\/li>\n<li>Describe the need for private IPv4 addressing<\/li>\n<li>Configure and verify IPv6 addressing and prefix<\/li>\n<li>Compare IPv6 address types<\/li>\n<li>Verify IP parameters for Client OS (Windows, Mac OS, Linux)<\/li>\n<li>Describe wireless principles<\/li>\n<li>Explain virtualization fundamentals (virtual machines)<\/li>\n<li>Describe switching concepts<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 2: Network Access<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Configure and verify VLANs (normal range) spanning multiple switches<\/li>\n<li>Configure and verify Interswitch connectivity<\/li>\n<li>Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)<\/li>\n<li>Configure and verify (Layer 2\/Layer 3) EtherChannel (LACP)<\/li>\n<li>Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol and identify basic operations<\/li>\n<li>Compare Cisco Wireless Architectures and AP modes<\/li>\n<li>Describe physical infrastructure connections of WLAN components (AP, WLC, access\/trunk ports, and LAG)<\/li>\n<li>Describe AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, console, and TACACS+\/RADIUS)<\/li>\n<li>Configure the components of a wireless LAN access for client connectivity using GUI only such as WLAN creation, security settings, QoS profiles, and advanced WLAN settings<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"direction: ltr; text-align: justify;\">Module 3: IP Connectivity<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Interpret the components of the routing table<\/li>\n<li>Determine how a router makes a forwarding decision by default<\/li>\n<li>Configure and verify IPv4 and IPv6 static routing<\/li>\n<li>Configure and verify single area OSPFv2<\/li>\n<li>Describe the purpose of first-hop redundancy protocol<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 4:<br \/>\nIP Services<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Configure and verify inside source NAT using static and pools<\/li>\n<li>Configure and verify NTP operating in a client and server mode<\/li>\n<li>Explain the role of DHCP and DNS within the network<\/li>\n<li>Explain the function of SNMP in network operations<\/li>\n<li>Describe the use of Syslog features including facilities and levels<\/li>\n<li>Configure and verify DHCP client and relay<\/li>\n<li>Explain the forwarding per-hop behavior (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping<\/li>\n<li>Configure network devices for remote access using SSH<\/li>\n<li>Describe the capabilities and function of TFTP\/FTP in the network<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 5: Security Fundamentals<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)<\/li>\n<li>Describe security program elements (user awareness, training, and physical access control)<\/li>\n<li>Configure device access control using local passwords<\/li>\n<li>Describe security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics)<\/li>\n<li>Describe remote access and site-to-site VPNs<\/li>\n<li>Configure and verify access control lists<\/li>\n<li>Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security)<\/li>\n<li>Differentiate authentication, authorization, and accounting concepts<\/li>\n<li>Describe wireless security protocols (WPA, WPA2, and WPA3)<\/li>\n<li>Configure WLAN using WPA2 PSK using the GUI<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Module 6: Automation and Programmability<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li style=\"text-align: justify;\">Explain how automation impacts network management<\/li>\n<li style=\"text-align: justify;\">Compare traditional networks with controller-based networking<\/li>\n<li style=\"text-align: justify;\">Describe controller-based and software-defined architectures (overlay, underlay, and fabric)<\/li>\n<li style=\"text-align: justify;\">Compare traditional campus device management with Cisco DNA Center-enabled device management<\/li>\n<li style=\"text-align: justify;\">Describe characteristics of REST-based APIs (CRUD, HTTP verbs, and data encoding)<\/li>\n<li style=\"text-align: justify;\">Recognize the capabilities of configuration management mechanisms Puppet, Chef, and Ansible<\/li>\n<li style=\"text-align: justify;\">Interpret JSON encoded data<\/li>\n<\/ul>\n","protected":false},"author":6,"featured_media":13635,"template":"","course_category":[38],"class_list":["post-13634","courses","type-courses","status-publish","has-post-thumbnail","hentry","course_category-it-en","infinite-scroll-item","no-featured-image-padding"],"acf":[],"_links":{"self":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/13634","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses"}],"about":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/types\/courses"}],"author":[{"embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/users\/6"}],"version-history":[{"count":17,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/13634\/revisions"}],"predecessor-version":[{"id":33912,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/13634\/revisions\/33912"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/media\/13635"}],"wp:attachment":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/media?parent=13634"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/course_category?post=13634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}