In this course (CCNA 1 v7 200-301), students will be able to build simple LANs, perform basic router and switch configurations, and implement IP addressing schemes.
Welcome to Introduction to Networks v7.0 (ITN)
Welcome to the first course of the Cisco Networking Academy CCNAv7 curriculum, Introduction to Networks (ITN). This is the first of three courses that are aligned to the CCNA Certification Exam. ITN contains 17 modules, each with a series of topics.
In Introduction to Networks, you will gain a basic understanding of the way networks operate. You will learn about network components and their functions, as well as how a network is structured, and the architectures used to create networks, including the internet.
But ITN is about more than learning networking concepts. By the end of this course, you will be able to build local area networks (LANs), configure basic settings on routers and switches, and implement internet protocol (IP).
In ITN, every concept that you learn and skill that you develop will be used in the rest of the CCNA curriculum. Now is the time to supercharge your networking career and let Cisco Networking Academy help you to reach your goal!
COURSE CONTENT CCNA 1 200-301
Module 1 Networking Today | CCNA 1 v7
Module Title: Networking Today
Module Objective: Explain the advances in modern network technologies.
Welcome to Networking Today!
Congratulations! This module starts you on your path to a successful career in Information Technology by giving you a foundational understanding of the creation, operation, and maintenance of networks. As a bonus, you get to dive into networking simulations using Packet Tracer. We promise you will really enjoy it!
Networks Affect our Lives
Explain how networks affect our daily lives.
Explain how host and network devices are used.
Network Representations and Topologies
Explain network representations and how they are used in network topologies.
Common Types of Networks
Compare the characteristics of common types of networks.
Explain how LANs and WANs interconnect to the internet.
Describe the four basic requirements of a reliable network.
Explain how trends such as BYOD, online collaboration, video, and cloud computing are changing the way we interact.
Identify some basic security threats and solution for all networks.
The IT Professional
Explain employment opportunities in the networking field.
Module 2 Basic Switch and End Device Configuration | CCNA 1 v7
Module Title: Basic Switch and End Device Configuration
Module Objective: Implement initial settings including passwords, IP addressing, and default gateway parameters on a network switch and end devices.
Welcome to Basic Switch and End Device Configuration!
As part of your career in networking, you might have to set up a new network or maintain and upgrade an existing one. In either case, you’ll configure switches and end devices so that they are secure and perform effectively based on your requirements.
Out of the box, switches and end devices come with some general configuration. But for your particular network, switches and end devices require your specific information and instructions. In this module, you will learn how to access Cisco IOS network devices. You will learn basic configuration commands and use them to configure and verify a Cisco IOS device and an end device with an IP address.
Of course, there is much more to network administration, but none of that can happen without first configuring switches and end devices. Let’s get started!
Cisco IOS Access
Explain how to access a Cisco IOS device for configuration purposes.
Explain how to navigate Cisco IOS to configure network devices.
The Command Structure
Describe the command structure of Cisco IOS software.
Basic Device Configuration
Configure a Cisco IOS device using CLI.
Use IOS commands to save the running configuration.
Ports and Addresses
Explain how devices communicate across network media.
Module Objective: Explain how network protocols enable devices to access local and remote network resources.
Welcome to Protocols and Models!
You know the basic components of a simple network, as well as initial configuration. But after you have configured and connected these components, how do you know they will work together? Protocols! Protocols are sets of agreed upon rules that have been created by standards organizations. But, because you cannot pick up a rule and look closely at it, how do you truly understand why there is such a rule and what it is supposed to do? Models! Models give you a way to visualize the rules and their place in your network. This module gives you an overview of network protocols and models. You are about to have a much deeper understanding of how networks actually work!
Describe the types of rules that are necessary to successfully communicate.
Explain why protocols are necessary in network communication.
Explain the purpose of adhering to a protocol suite.
Explain the role of standards organizations in establishing protocols for network interoperability.
Explain how the TCP/IP model and the OSI model are used to facilitate standardization in the communication process.
Explain how data encapsulation allows data to be transported across the network.
Explain how local hosts access local resources on a network.
Module Objective: Explain how physical layer protocols, services, and network media support communications across data networks.
Welcome to Physical Layer!
The physical layer of the OSI model sits at the bottom of the stack. It is part of the Network Access layer of the TCP/IP model. Without the physical layer, you would not have a network. This module explains, in detail, the three ways to connect to the physical layer. Packet Tracer activities and labs will give you the confidence you need to cable up your own network! Let’s get busy!
Purpose of the Physical Layer
Describe the purpose and functions of the physical layer in the network.
Physical Layer Characteristics
Describe characteristics of the physical layer.
Identify the basic characteristics of copper cabling.
Explain how UTP cable is used in Ethernet networks.
Describe fiber optic cabling and its main advantages over other media.
Module Objective: Calculate numbers between decimal, binary, and hexadecimal systems.
Welcome to Number Systems!
Guess what? This is a 32-bit IPv4 address of a computer in a network: 11000000.10101000.00001010.00001010. It is shown in binary. This is the IPv4 address for the same computer in dotted decimal: 192.168.10.10. Which one would you rather work with? IPv6 addresses are 128 bits! To make these addresses more manageable, IPv6 uses a hexadecimal system of 0-9 and the letters A-F.
As a network administrator you must know how to convert binary addresses into dotted decimal and dotted decimal addresses into binary. You will also need to know how to convert dotted decimal into hexadecimal and vice versa. (Hint: You still need your binary conversion skills to make this work.)
Surprisingly, it is not that hard when you learn a few tricks. This module contains an activity called the Binary Game which will really help you get started. So, why wait?
Binary Number System
Calculate numbers between decimal and binary systems.
Hexadecimal Number System
Calculate numbers between decimal and hexadecimal systems.
Module Objective: Explain how media access control in the data link layer supports communication across networks.
Welcome to Data Link Layer!
Every network has physical components and media connecting the components. Different types of media need different information about the data in order to accept it and move it across the physical network. Think of it this way: A well-hit golf ball moves through the air fast and far. It can also move through water but not as fast or as far unless it is helped by a more forceful hit. This is because the golf ball is traveling through a different medium; water instead of air.
Data must have help to move it across different media. The data link layer provides this help. As you might have guessed, this help differs based on a number of factors. This module gives you an overview of these factors, how they affect data, and the protocols designed to ensure successful delivery. Let’s get started!
Purpose of the Data Link Layer
Describe the purpose and function of the data link layer in preparing communication for transmission on specific media.
Compare the characteristics of media access control methods on WAN and LAN topologies.
Data Link Frame
Describe the characteristics and functions of the data link frame.
Module Objective: Explain how Ethernet operates in a switched network.
Welcome to Ethernet Switching!
If you are planning to become a network administrator or a network architect, you will definitely need to know about Ethernet and Ethernet switching. The two most prominent LAN technologies in use today are Ethernet and WLAN. Ethernet supports bandwidths of up to 100 Gbps, which explains its popularity. This module contains a lab using Wireshark in which you can look at Ethernet frames and another lab where you view network device MAC addresses. There are also some instructional videos to help you better understand Ethernet. By the time you have finished this module, you too could create a switched network that uses Ethernet!
Explain how the Ethernet sublayers are related to the frame fields.
Ethernet MAC Address
Describe the Ethernet MAC address.
The MAC Address Table
Explain how a switch builds its MAC address table and forwards frames.
Switch Speeds and Forwarding Methods
Describe switch forwarding methods and port settings available on Layer 2 switch ports.
Module Objective: Explain how routers use network layer protocols and services to enable end-to-end connectivity.
Welcome to Network Layer!
By now you may have noticed that the modules in this course are progressing from the bottom up through the OSI model layers. At the network layer of the OSI model, we introduce you to communication protocols and routing protocols. Say you want to send an email to a friend who lives in another city, or even another country. This person is not on the same network as you. A simple switched network cannot get your message any further than the end of your own network. You need some help to keep this message moving along the path to your friend’s end device. To send an email (a video, or a file, etc.) to anyone who is not on your local network, you must have access to routers. To access routers, you must use network layer protocols. To help you visualize these processes, this module contains two Wireshark activities. Enjoy!
Network Layer Characteristics
Explain how the network layer uses IP protocols for reliable communications.
Explain the role of the major header fields in the IPv4 packet.
Explain the role of the major header fields in the IPv6 packet.
How a Host Routes
Explain how network devices use routing tables to direct packets to a destination network.
Router Routing Tables
Explain the function of fields in the routing table of a router.
Module Objective: Explain how ARP and ND enable communication on a network.
Welcome to Address Resolution!
Hosts and routers both create routing tables to ensure that they can send and receive data across networks. So how does this information get created in a routing table? As a network administrator, you could enter these MAC and IP addresses manually. But that would take a lot of time and the likelihood of making a few mistakes is great. Are you thinking that there must be some way that this could be done automatically, by the hosts and routers themselves? Of course, you are correct! And even though it is automatic, you must still understand how this works, because you may have to troubleshoot a problem, or worse, your network could be attacked by a threat actor. Are you ready to learn about address resolution? This module has several very good videos to help explain the concepts, as well as three Packet Tracer activities to cement your understanding. Why wait?
MAC and IP
Compare the roles of the MAC address and the IP address.
Describe the purpose of ARP.
Describe the operation of IPv6 neighbor discovery.
Module Objective: Implement initial settings on a router and end devices.
Welcome to Basic Router Configuration!
Have you ever run a relay? The first person runs the first leg of the race and hands off the baton to the next runner, who continues forward in the second leg of the race and hands off the baton to the third runner, and on it goes. Routing packets is very similar to a relay. But if the first runner does not know where to find the second runner, or drops the baton in the first leg, then that relay team will most certainly lose the race.
Routing packets is very similar to a relay. As you know, routing tables are created and used by routers to forward packets from their local networks on to other networks. But a router cannot create a routing table or forward any packets until it has been configured. If you plan to become a network administrator you definitely must know how to do this. The good news? It is easy! This module has Syntax Checker activities so that you can practice your configuration commands and see the output. There are also some Packet Tracer activities to get you started. Let’s go!
Configure Initial Router Settings
Configure initial settings on an IOS Cisco router.
Configure two active interfaces on a Cisco IOS router.
Module Objective: Calculate an IPv4 subnetting scheme to efficiently segment your network.
Welcome to IPv4 Addressing!
Currently, there are still plenty of networks using IPv4 addressing, even as the organizations which use them are making the transition to IPv6. So it is still very important for network administrators to know everything they can about IPv4 addressing. This module covers the fundamental aspects of IPv4 addressing in detail. It includes how to segment a network into subnets and how to create a variable-length subnet mask (VLSM) as part of an overall IPv4 addressing scheme. Subnetting is like cutting a pie into smaller and smaller pieces. Subnetting may seem overwhelming at first, but we show you some tricks to help you along the way. This module includes several videos, activities to help you practice subnetting, Packet Tracers and a lab. Once you get the hang of it, you’ll be on your way to network administration!
IPv4 Address Structure
Describe the structure of an IPv4 address including the network portion, the host portion, and the subnet mask.
IPv4 Unicast, Broadcast, and Multicast
Compare the characteristics and uses of the unicast, broadcast and multicast IPv4 addresses.
Types of IPv4 Addresses
Explain public, private, and reserved IPv4 addresses.
Explain how subnetting segments a network to enable better communication.
Subnet an IPv4 Network
Calculate IPv4 subnets for a /24 prefix.
Subnet a /16 and a /8 Prefix
Calculate IPv4 subnets for a /16 and /8 prefix.
Subnet To Meet Requirements
Given a set of requirements for subnetting, implement an IPv4 addressing scheme.
Variable Length Subnet Masking
Explain how to create a flexible addressing scheme using variable length subnet masking (VLSM).
Module Objective: Implement an IPv6 addressing scheme.
Welcome to IPv6 Addressing!
It is a great time to be (or become) a network administrator! Why? Because in many networks, you will find both IPv4 and IPv6 working together. After the hard work of learning to subnet an IPv4 network, you may find that subnetting an IPv6 network is much easier. You probably didn’t expect that, did you? A Packet Tracer at the end of this module will give you the opportunity to subnet an IPv6 network. Go ahead, jump in!
Explain the need for IPv6 addressing.
IPv6 Address Representation
Explain how IPv6 addresses are represented.
IPv6 Address Types
Compare types of IPv6 network addresses.
GUA and LLA Static Configuration
Explain how to Configure static global unicast and link-local IPv6 network addresses.
Dynamic Addressing for IPv6 GUAs
Explain how to configure global unicast addresses dynamically.
Module Objective: Use various tools to test network connectivity.
Welcome to ICMP!
Imagine that you have an intricate model train set. Your tracks and trains are all connected and powered up and ready to go. You throw the switch. The train goes halfway around the track and stops. You know right away that the problem is most likely located where the train has stopped, so you look there first. It is not as easy to visualize this with a network. Fortunately, there are tools to help you locate problem areas in your network, AND they work with both IPv4 and IPv6 networks! You will be happy to know that this module has a couple Packet Tracer activities to help you practice using these tools, so let’s get testing!
Explain how ICMP is used to test network connectivity.
Ping and Traceroute Testing
Use ping and traceroute utilities to test network connectivity.
Module Objective: Compare the operations of transport layer protocols in supporting end-to-end communication.
Welcome to Transport Layer!
The transport layer is where, as the name implies, data is transported from one host to another. This is where your network really gets moving! The transport layer uses two protocols: TCP and UDP. Think of TCP as getting a registered letter in the mail. You have to sign for it before the mail carrier will let you have it. This slows down the process a bit, but the sender knows for certain that you received the letter and when you received it. UDP is more like a regular, stamped letter. It arrives in your mailbox and, if it does, it is probably intended for you, but it might actually be for someone else who does not live there. Also, it may not arrive in your mailbox at all. The sender cannot be sure you received it. Nevertheless, there are times when UDP, like a stamped letter, is the protocol that is needed. This topic dives into how TCP and UDP work in the transport layer. Later in this module there are several videos to help you understand these processes.
Transportation of Data
Explain the purpose of the transport layer in managing the transportation of data in end-to-end communication.
Explain characteristics of TCP.
Explain characteristics of UDP.
Explain how TCP and UDP use port numbers.
TCP Communication Process
Explain how TCP session establishment and termination processes facilitate reliable communication.
Reliability and Flow Control
Explain how TCP protocol data units are transmitted and acknowledged to guarantee delivery.
Compare the operations of transport layer protocols in supporting end-to-end communication.
Module Objective: Explain the operation of application layer protocols in providing support to end-user applications.
Welcome to Application Layer!
As you have learned, the transport layer is where data actually gets moved from one host to another. But before that can take place, there are a lot of details that have to be determined so that this data transport happens correctly. This is why there is an application layer in both the OSI and the TCP/IP models. As an example, before there was streaming video over the internet, we had to watch home movies in a variety of other ways. Imagine that you videotaped some of your child’s soccer game. Your parents, in another city, only have a video cassette player. You have to copy your video from your camera onto the right type of video cassette to send to them. Your brother has a DVD player, so you transfer your video to a DVD to send to him. This is what the application layer is all about, making sure that your data is in a format that the receiving device can use. Let’s dive in!
Application, Presentation, and Session
Explain how the functions of the application layer, presentation layer, and session layer work together to provide network services to end user applications.
Explain how end user applications operate in a peer-to-peer network.
Module Objective: Configure switches and routers with device hardening features to enhance security.
Welcome to Network Security Fundamentals!
You may have already set up a network, or you may be getting ready to do just that. Here is something to think about. Setting up a network without securing it is like opening all the doors and windows to your home and then going on vacation. Anyone could come by, gain entry, steal or break items, or just make a mess. As you have seen on the news, it is possible to break into any network! As a network administrator, it is part of your job to make it difficult for threat actors to gain access to your network. This module gives you an overview of types of network attacks and what you can do to reduce a threat actor’s chances of succeeding. It also has Packet Tracer activities to let you practice some basic techniques for network security. If you have a network, but it is not as secure as possible, then you will want to read this module right now!
Security Threats and Vulnerabilities
Explain why basic security measure are necessary on network devices.
Identify security vulnerabilities.
Network Attack Mitigation
Identify general mitigation techniques.
Configure network devices with device hardening features to mitigate security threats.
Module Objective: Implement a network design for a small network to include a router, a switch, and end devices.
Welcome to Build a Small Network!
Hooray! You have come to the final module in the Introduction to Networks v7.0 course. You have most of the foundational knowledge needed to set up your own network. Where do you go from here? You build a network, of course. And not only do you build one, you verify that it is working, and even troubleshoot some common network problems. This module has labs and Packet Tracer activities to help you practice your new skills as a network administrator. Let’s get going!
Devices in a Small Network
Identify the devices used in a small network.
Small Network Applications and Protocols
Identify the protocols and applications used in a small network.
Scale to Larger Networks
Explain how a small network serves as the basis of larger networks.
Use the output of the ping and tracert commands to verify connectivity and establish relative network performance.
Host and IOS Commands
Use host and IOS commands to acquire information about the devices in a network.
Describe common network troubleshooting methodologies
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.