/CCNA3v7 - Enterprise Networking, Security, and Automation - for Teachers
Provided by: Open University
Course Area: All areas
Course Type: Continuous Professional Development
Start date: Anytime
Subjects: Cyber Security, Information Technology, Networks, Networks and Security
Who is this course for
The Cisco Networking Academy CCNAv7 curriculum is designed for participants who are seeking entry-level jobs in the ICT industry or hope to fulfill prerequisites to pursue more specialized ICT skills. The CCNAv7 curriculum is presented in three courses: Introduction to Networks (ITN), Switching, Routing and Wireless Essentials (SRWE), and Enterprise Networking, Security, and Automation (ENSA).
These three courses provide integrated and comprehensive coverage of networking topics including: IP routing and switching fundamentals, network security and services, and network programmability and automation, while providing learners extensive opportunities for hands-on practical experience and career skills development.
The curriculum is appropriate for teachers at many education levels and types of institutions, including high schools, secondary schools, universities, colleges, career and technical schools, and community centres.
What will I learn
The third course in the CCNAv7 curriculum describes the architectures and considerations related to designing, securing, operating, and troubleshooting enterprise networks. This course covers wide area network (WAN) technologies and quality of service (QoS) mechanisms used for secure remote access. ENSA also introduces software-defined networking, virtualization, and automation concepts that support the digitalization of networks.
Students gain skills to configure and troubleshoot enterprise networks, and learn to identify and protect against cybersecurity threats. They are introduced to network management tools and learn key concepts of software-defined networking, including controller-based architectures and how application programming interfaces (APIs) enable network automation.
Listed below are the current set of modules and their associated competencies outlined for this course. Each module is an integrated unit of learning that consists of content, activities and assessments that target a specific set of competencies. The size of the module will depend on the depth of knowledge and skill needed to master the competency. Some modules are considered foundational, in that the artifacts presented, while not assessed, enable learning of concepts that are covered on the CCNA certification exam.
Single-Area OSPFv2 Concepts
Explain how single-area OSPF operates in both point-to-point and broadcast multiaccess networks. OSPF Features and Characteristics Describe basic OSPF features and characteristics. OSPF Packets Describe the OSPF packet types used in single-area OSPF. OSPF Operation Explain how single-area OSPF operates.
OSPFv2 Configuration Implement single-area OSPFv2 in both point-to-point and broadcast multiaccess networks. OSPF Router ID Configure an OSPFv2 router ID. Point-to-Point OSPF Networks Configure single-area OSPFv2 in a point-to-point network. Multiaccess OSPF Networks Configure the OSPF interface priority to influence the DR/BDR election in a multiaccess network. Modify Single-Area OSPFv2 Implement modifications to change the operation of singlearea OSPFv2. Default Route Propagation Configure OSPF to propagate a default route. Verify Single-Area OSPFv2 Verify a single-area OSPFv2 implementation.
Network Security Concepts
Explain how vulnerabilities, threats, and exploits can be mitigated to enhance network security. Current State of Cybersecurity Describe the current state of cybersecurity and vectors of data loss. Threat Actors Describe the threat actors who exploit networks. Threat Actor Tools Describe tools used by threat actors to exploit networks. Malware Describe malware types. Common Network Attacks Describe common network attacks. IP Vulnerabilities and Threats Explain how IP vulnerabilities are exploited by threat actors. TCP and UDP Vulnerabilities Explain how TCP and UDP vulnerabilities are exploited by threat actors. IP Services Explain how IP services are exploited by threat actors. Network Security Best Practices Describe best practices for protecting a network. Cryptography Describe common cryptographic processes used to protect data in transit.
Explain how ACLs are used as part of a network security policy. Purpose of ACLs Explain how ACLs filter traffic. Wildcard Masks in ACLs Explain how ACLs use wildcard masks. Guidelines for ACL Creation Explain how to create ACLs. Types of IPv4 ACLs Compare standard and extended IPv4 ACLs.
ACLs for IPv4 Configuration
Implement IPv4 ACLs to filter traffic and secure administrative access. Configure Standard IPv4 ACLs Configure standard IPv4 ACLs to filter traffic to meet networking requirements. Modify IPv4 ACLs Use sequence numbers to edit existing standard IPv4 ACLs. Secure VTY Ports with a Standard IPv4 ACL Configure a standard ACL to secure vty access. Configure Extended IPv4 ACLs Configure extended IPv4 ACLs to filter traffic according to networking requirements.
NAT for IPv4
Configure NAT services on the edge router to provide IPv4 address scalability. NAT Characteristics Explain the purpose and function of NAT. Types of NAT Explain the operation of different types of NAT. NAT Advantages Describe the advantages and disadvantages of NAT. Configure Static NAT Configure static NAT using the CLI. Configure Dynamic NAT Configure dynamic NAT using the CLI. Configure PAT Configure PAT using the CLI. NAT64 Describe NAT for IPv6.
Explain how WAN access technologies can be used to satisfy business requirements. Purpose of WANs Explain the purpose of a WAN. WAN Operations Explain how WANs operate. Traditional WAN Connectivity Compare traditional WAN connectivity options. Modern WAN Connectivity Compare modern WAN connectivity options. Internet-Based Connectivity Compare internet-based WAN connectivity options.
VPN and IPsec Concepts
Explain how VPNs and IPsec secure site-to-site and remote access connectivity. VPN Technology Describe benefits of VPN technology. Types of VPNs Describe different types of VPNs IPsec Explain how the IPsec framework is used to secure network traffic.
Explain how networking devices implement QoS. Network Transmission Quality Explain how network transmission characteristics impact quality. Traffic Characteristics Describe minimum network requirements for voice, video, and data traffic. Queuing Algorithms Describe the queuing algorithms used by networking devices. QoS Models Describe the different QoS models.
Network Management Implement protocols to manage the network. Device Discovery with CDP Use CDP to map a network topology. Device Discovery with LLDP Use LLDP to map a network topology. NTP Implement NTP between an NTP client and NTP server. SNMP Explain SNMP operation. Syslog Explain syslog operation. Router and Switch File Maintenance Use commands to back up and restore an IOS configuration file. IOS Image Management Perform an upgrade of an IOS system image.
Explain the characteristics of scalable network architectures. Hierarchical Networks Explain how data, voice, and video are converged in a switched network. Scalable Networks Explain considerations for designing a scalable network. Switch Hardware Explain how switch hardware features support network requirements. Router Hardware Describe the types of routers available for small to-mediumsized business networks.
Troubleshoot enterprise networks. Network Documentation Explain how network documentation is developed and used to troubleshoot network issues. Troubleshooting Process Compare troubleshooting methods that use a systematic, layered approach. Troubleshooting Tools Describe different networking troubleshooting tools. Symptoms and Causes of Network Problems Determine the symptoms and causes of network problems using a layered model. Troubleshooting IP Connectivity Troubleshoot a network using the layered model.
Explain the purpose and characteristics of network virtualization. Cloud Computing Explain the importance of cloud computing. Virtualization Explain the importance of virtualization. Virtual Network Infrastructure Describe the virtualization of network devices and services. Software-Defined Networking Describe software-defined networking. Controllers Describe controllers used in network programming.
Explain how network automation is enabled through RESTful APIs and configuration management tools. Automation Overview Describe automation. Data Formats Compare JSON, YAML, and XML data formats. APIs Explain how APIs enable computer to computer communications. REST Explain how REST enables computer to computer communications. Configuration Management Compare the configuration management tools Puppet, Chef, Ansible, and SaltStack IBN and Cisco DNA Center Explain how Cisco DNA center enables intent-based networkingVisit this course