CCNA 3 v7 Enterprise Networking, Security, and Automation 200 301
CCNA 3 v7 Enterprise Networking, Security, and Automation 200 301
CCNA 3 v7 Enterprise Networking, Security, and Automation 200 301

CCNA 3 v7 | CCNA 200-301

CCNA 3 V7 updated
  • Quality of Content
  • Packet Tracer
  • Exams & Quizz
5

Summary

Welcome to the final course of the Cisco Networking Academy CCNAv7 curriculum, Enterprise Networking, Security, and Automation (ENSA).

Welcome to Enterprise Networking, Security, and Automation (ENSA)

Welcome to the final course of the Cisco Networking Academy CCNAv7 curriculum, Enterprise Networking, Security, and Automation (ENSA). This is the third of three courses that are aligned to the CCNA Certification Exam. ENSA contains 14 modules, each with a series of topics.

In Enterprise Networking, Security, and Automation, you will take the skills and knowledge that you learned in ITN and SWRE and apply them to wide area networks (WANs). WANs are large, complex networks that require advanced understanding of network operation and security. ENSA also introduces you to two game-changing areas of networking: virtualization and automation.

By the end of this course you will be able to configure, troubleshoot, and secure enterprise network devices. You will be versed in application programming interfaces (APIs) and the configuration management tools that make network automation possible.

When you have completed ENSA, you will have gained the practical experience you need to prepare for the certification exam. You will also have the skills required for associate-level roles in the Information and Communication Technologies (ICT) industry. Let Cisco Networking Academy help you get where you want to go!

CCNA Enterprise Networking, Security, and Automation V7
CCNA Enterprise Networking, Security, and Automation V7

COURSE CONTENT CCNA 1 200-301

Module 1 Single-Area OSPFv2 Concepts | CCNA 3 v7

  • Module Title: Single-Area OSPFv2 Concepts
  • Module Objective: Explain how single-area OSPF operates in both point-to-point and broadcast multiaccess networks.

Welcome to Single-Area OSPFv2 Concepts!

Imagine that it is time for your family to visit your grandparents. You pack your bags and load them into the car. But this takes a bit longer than you planned for and now you are running late. You pull out your map. There are three different routes. One route is no good because there is a lot of construction on the main road and it is temporarily closed. Another route is very scenic, but it takes an additional hour to get to your destination. The third route is not as pretty but it includes a highway, which is much faster. In fact, it is so much faster that you might actually be on time if you take it.

In networking, packets do not need to take the scenic route. The fastest available route is always the best. Open Shortest Path First (OSPF) is designed to find the fastest available path for a packet from source to destination. This module covers the basic concepts of single-area OSPFv2. Let’s get started!

Topic Title Topic Objective
OSPF Features and Characteristics Describe basic OSPF features and characteristics.
OSPF Packets Describe the OSPF packet types used in single-area OSPF.
OSPF Operation Explain how single-area OSPF operates.

Content:

Module 2 Single-Area OSPFv2 Configuration | CCNA 3 v7

  • Module Title: Single-Area OSPFv2 Configuration
  • Module Objective: Implement single-area OSPFv2 in both point-to-point and broadcast multiaccess networks.

Welcome to Single-Area OSPFv2 Configuration!

Now that you know about single-area OSPFv2, you can probably think of all the ways it could benefit your own network. As a link-state protocol, OSPF is designed to not only find the fastest available route, it is designed to create fast, available routes. If you prefer a bit more control over some areas of your network, OSPF gives you several ways to manually override the DR election process and create your own preferred routes. With OSPF, your network can combine the automated processes with your own choices to make a network that you could troubleshoot in your sleep! You know you want to learn how to do this!

Topic Title Topic Objective
OSPF Router ID Configure an OSPFv2 router ID.
Point-to-Point OSPF Networks Configure single-area OSPFv2 in a point-to-point network.
Multiaccess OSPF Networks Configure the OSPF interface priority to influence the DR/BDR election in a multiaccess network.
Modify Single-Area OSPFv2 Implement modifications to change the operation of single-area OSPFv2.
Default Route Propagation Configure OSPF to propagate a default route.
Verify Single-Area OSPFv2 Verify a single-area OSPFv2 implementation.

Content:

Module 3 Network Security Concepts | CCNA 3 v7

  • Module Title: Network Security Concepts
  • Module Objective: Explain how vulnerabilities, threats, and exploits can be mitigated to enhance network security.

Welcome to Network Security Concepts!

Perhaps you’ve heard one of the hundreds of news stories about a data security breach within a large corporation or even a government. Was your credit card number exposed by a breach? Your private health information? Would you like to know how to prevent these data breaches? The field of network security is growing every day. This module provides a detailed landscape of the types of cybercrime and the many ways we have to fight back against cybercriminals. Let’s get started!

Topic Topic Title
Current State of Cybersecurity Describe the current state of cybersecurity and vectors of data loss.
Threat Actors Describe tools used by threat actors to exploit networks.
Threat Actor Tools Describe tools used by threat actors to exploit networks.
Malware Describe malware types.
Common Network Attacks Describe common network attacks.
IP Vulnerabilities and Threats Explain how IP vulnerabilities are exploited by threat actors.
TCP and UDP Vulnerabilities Explain how TCP and UDP vulnerabilities are exploited by threat actors.
IP Services Explain how IP services are exploited by threat actors.
Network Security Best Practices Describe best practices for protecting a network.
Cryptography Describe common cryptographic processes used to protect data in transit.

Content:

Module 4 ACL Concepts | CCNA 3 v7

  • Module Title: ACL Concepts
  • Module Objective: Explain how ACLs are used as part of a network security policy.

Welcome to ACL Concepts!

You have arrived at your grandparents’ residence. It is a beautiful gated community with walking paths and gardens. For the residents safety, no one is permitted to get into the community without stopping at the gate and presenting the guard with identification. You provide your ID and the guard verifies that you are expected as a visitor. He documents your information and lifts the gate. Imagine if the guard had to do this for the many staff members that entered each day. They have simplified this process by assigning a badge for each employee to automatically raise the gate once the badge is scanned. You greet your grandparents who are anxiously awaiting you at the front desk. You all get back into the car to go down the street for dinner. As you exit the parking lot, you must again stop and show your identification so that the guard will lift the gate. Rules have been put in place for all incoming and outgoing traffic.

Much like the guard in the gated community, network traffic passing through an interface configured with an access control list (ACL) has permitted and denied traffic. The router compares the information within the packet against each ACE, in sequential order, to determine if the packet matches one of the ACEs. This process is called packet filtering. Let’s learn more!

Topic Title Topic Objective
Purpose of ACLs Explain how ACLs filter traffic.
Wildcard Masks in ACLs Explain how ACLs use wildcard masks.
Guidelines for ACL Creation Explain how to create ACLs.
Types of IPv4 ACLs Compare standard and extended IPv4 ACLs.

Content:

Module 5 ACLs for IPv4 Configuration | CCNA 3 v7

  • Module Title: ACLs for IPv4 Configuration
  • Module Objective: Explain the advances in modern network technologies.

Welcome to ACLs for IPv4 Configuration!

In the gated community where your grandparents live, there are rules for who can enter and leave the premises. The guard will not raise the gate to let you in to the community until someone confirms that you are on an approved visitor list. Much like the guard in the gated community, network traffic passing through an interface configured with an access control list (ACL) has permitted and denied traffic. How do you configure these ACLs? How do you modify them if they are not working correctly or if they require other changes? How do ACLs provide secure remote administrative access? Get started with this module to learn more!

Topic Title Topic Objective
Configure Standard IPv4 ACLs Configure standard IPv4 ACLs to filter traffic to meet networking requirements.
Modify IPv4 ACLs Use sequence numbers to edit existing standard IPv4 ACLs.
Secure VTY Ports with a Standard IPv4 ACL Configure a standard ACL to secure VTY access.
Configure Extended IPv4 ACLs Configure extended IPv4 ACLs to filter traffic according to networking requirements.

Content:

Module 6 NAT for IPv4 | CCNA 3 v7

  • Module Title: NAT for IPv4
  • Module Objective: Configure NAT services on the edge router to provide IPv4 address scalability.

Welcome to NAT for IPv4!

IPv4 addresses are 32-bit numbers. Mathematically, this means that there can be just over 4 billion unique IPv4 addresses. In the 1980s, this seemed like more than enough IPv4 addresses. Then came the development of affordable desktop and laptop computers, smart phones and tablets, many other digital technologies, and of course, the internet. Rather quickly it became apparent that 4 billion IPv4 addresses would not be nearly enough to handle the growing demand. This is why IPv6 was developed. Even with IPv6, most networks today are IPv4-only, or a combination of IPv4 and IPv6. The transition to IPv6-only networks is still ongoing, that is why Network Address Translation (NAT) was developed. NAT is designed to help manage those 4 billion addresses so that we can all use our many devices to access the internet. As you can see, it is important that you understand the purpose of (NAT) and how it works. As a bonus, this module contains multiple Packet Tracer activities where you get to configure different types of NAT. Get going!

Topic Title Topic Objective
NAT Characteristics Explain the purpose and function of NAT.
Types of NAT Explain the operation of different types of NAT.
NAT Advantages and Disadvantages Describe the advantages and disadvantages of NAT.
Static NAT Configure static NAT using the CLI.
Dynamic NAT Configure dynamic NAT using the CLI.
PAT Configure PAT using the CLI.
NAT64 Describe NAT for IPv6.

Content:

Module 7 WAN Concepts | CCNA 3 v7

  • Module Title: WAN Concepts
  • Module Objective: Explain how WAN access technologies can be used to satisfy business requirements.

Welcome to WAN Concepts!

As you know, local area networks are called LANs. The name implies that your LAN is local to you and your small home or office business. But what if your network is for a larger business, perhaps even a global enterprise? You cannot operate a large business with multiple sites without a wide area network, which is called a WAN. This module explains what WANs are and how they connect to the internet and also back to your LAN. Understanding the purpose and functions of WANs is foundational to your understanding of modern networks. So let’s jump in to WAN Concepts!

Topic Title Topic Objective
Purpose of WANs Explain the purpose of a WAN.
WAN Operations Explain how WANs operate.
Traditional WAN Connectivity Compare traditional WAN connectivity options.
Modern WAN Connectivity Compare modern WAN connectivity options.
Internet-Based Connectivity Compare internet-based connectivity options.

Content:

Module 8 VPN and IPsec Concepts | CCNA 3 v7

  • Module Title: VPN and IPsec Concepts
  • Module Objective: Explain how VPNs and IPsec are used to secure site-to-site and remote access connectivity.

Welcome to VPN and IPsec Concepts!

Have you, or someone you know, ever been hacked while using public WiFi? It’s surprisingly easy to do. But there is a solution to this problem: Virtual Private Networks (VPNs) and the additional protection of IP Security (IPsec). VPNs are commonly used by remote workers around the globe. There are also personal VPNs that you can use when you are on public WiFi. In fact, there are many different kinds of VPNs using IPsec to protect and authenticate IP packets between their source and destination. Want to know more? Click Next!

Topic Title Topic Objective
VPN Technology Describe benefits of VPN technology.
Types of VPNs Describe different types of VPNs.
IPsec Explain how the IPsec framework is used to secure network traffic.

Content:

See complete content

Module 9 QoS Concepts | CCNA 3 v7

  • Module Title: QoS Concepts
  • Module Objective: Explain how networking devices implement QoS.

Welcome to QoS Concepts!

Imagine driving on a heavily congested road and you are in a rush to meet a friend for dinner. You hear the siren and see the lights of an ambulance behind you. You need to move off the road to let the ambulance through. The ambulance getting to the hospital takes priority over you getting to the restaurant on time.

Much like the ambulance taking priority in the traffic on the highway, some forms of network traffic need priority over others. Why? Get started with this module to find out!

Topic Title Topic Objective
Network Transmission Quality Explain how network transmission characteristics impact quality.
Traffic Characteristics Describe minimum network requirements for voice, video, and data traffic.
Queuing Algorithms Describe the queuing algorithms used by networking devices.
QoS Models Describe the different QoS models.
QoS Implementation Techniques Explain how QoS uses mechanisms to ensure transmission quality.

Content:

Module 10 Network Management | CCNA 3 v7

  • Module Title: Network Management
  • Module Objective: Implement protocols to manage the network.

Welcome to Network Management!

Imagine that you are at the helm of a spaceship. There are many, many components that work together to move this ship. There are multiple systems to manage these components. To get where you are going you would need to have a full understanding of the components and the systems that manage them. You would probably appreciate any tools that would make managing your spaceship – while you are also flying it – simpler.

Like a complex spaceship, networks also need to be managed. Happily, there are many tools that are designed to make network management simpler. This module introduces you to several tools and protocols to help you manage your network – while your users are using it. It also includes many Packet Tracer activities and Hands On Labs to test your skills. These are the tools of great network administrators, so you will definitely want to get started!

Topic Title Topic Objective
Device Discovery with CDP Use CDP to map a network topology.
Device Discovery with LLDP Use LLDP to map a network topology.
NTP Implement NTP between an NTP client and NTP server.
SNMP Explain how SNMP operates.
Syslog Explain syslog operation.
Router and Switch File Maintenance Use commands to back up and restore an IOS configuration file.
IOS Image Management Implement protocols to manage the network.

Content:

Module 11 Network Design | CCNA 3 v7

  • Module Title: Network Design
  • Module Objective: Explain the characteristics of scalable network architectures.

Welcome to Network Design!

You are a sought after spaceship designer! You have been asked to design a new spaceship. Your first questions are, “What will this ship be used for? How large is the crew? Will it be a war ship? A cargo ship? A science and exploration vessel?” What if the answer is, “The crew can be as few as 50 people, but it must be able to hold as many as 500. It will be used in a variety of ways.”? How do you design a ship like this? You must design the size and configuration of the ship, and the power it requires, wisely.

Designing a network to meet current requirements and to adapt to future requirements is a complex task. But it can be done, thanks to hierarchical and scalable network designs that use the right components. You know you want to learn about this. Even if you have not designed your current network, knowing about network design will increase your value to the organization as a great network administrator! And who doesn’t want that?

Topic Title Topic Objective
Hierarchical Networks Explain how data, voice, and video are converged in a switched network.
Scalable Networks Explain considerations for designing a scalable network.
Switch Hardware Explain how switch hardware features support network requirements.
Router Hardware Describe the types of routers available for small to-medium-sized business networks.

Content:

Module 12 Network Troubleshooting | CCNA 3 v7

  • Module Title: Network Troubleshooting
  • Module Objective: Troubleshoot enterprise networks.

Welcome to Network Troubleshooting!

Who is the best network administrator that you have ever seen? Why do you think this person is so good at it? Likely, it is because this person is really good at troubleshooting network problems. They are probably experienced administrators, but that is not the whole story. Good network troubleshooters generally go about this in a methodical fashion, and they use all of the tools available to them.

The truth is that the only way to become a good network troubleshooter is to always be troubleshooting. It takes time to get good at this. But luckily for you, there are many, many tips and tools that you can use. This module covers the different methods for network troubleshooting and all of the tips and tools you need to get started. This module also has two really good Packet Tracer activities to test your new skills and knowledge. Maybe your goal should be to become the best network administrator that someone else has ever seen!

Topic Title Topic Objective
Network Documentation Explain how network documentation is developed and used to troubleshoot network issues.
Troubleshooting Process Compare troubleshooting methods that use a systematic, layered approach.
Troubleshooting Tools Describe different networking troubleshooting tools.
Symptoms and Causes of Network Problems Determine the symptoms and causes of network problems using a layered model.
Troubleshooting IP Connectivity Troubleshoot a network using the layered model.

Content:

Module 13 Network Virtualization | CCNA 3 v7

  • Module Title: Network Virtualization
  • Module Objective: Explain the purpose and characteristics of network virtualization.

Welcome to Network Virtualization!

Imagine you live in a two-bedroom house. You use the second bedroom for storage. The second bedroom is packed full of boxes, but you still have more to place in storage! You could consider building an addition on your house. It would be a costly endeavor and you may not need that much space forever. You decide to rent a storage unit for the overflow.

Similar to a storage unit, network virtualization and cloud services can provide a business with options other than adding servers into their own data center. In addition to storage, it offers other advantages. Get started with this module to learn more about what virtualization and cloud services can do!

Topic Title Topic Objective
Cloud Computing Explain the importance of cloud computing.
Virtualization Explain the importance of virtualization.
Virtual Network Infrastructure Describe the virtualization of network devices and services.
Software-Defined Networking Describe software-defined networking.
Controllers Describe controllers used in network programming.

Content:

Module 14 Network Automation | CCNA 3 v7

  • Module Title: Network Automation
  • Module Objective: Explain how network automation is enabled through RESTful APIs and configuration management tools.

Welcome to Network Automation!

Have you set up your home network? A small office network? Imagine doing those tasks for tens of thousands of end devices and thousands of routers, switches, and access points! Did you know that there is software that automates those tasks for an enterprise network? In fact, there is software that can automate the design of an enterprise network. It can automate all of the monitoring, operations and maintenance for your network. Interested? Get started!

Topic Title Topic Objective
Automation Overview Describe automation.
Data Formats Compare JSON, YAML, and XML data formats.
APIs Explain how APIs enable computer to computer communications.
REST Explain how REST enables computer to computer communications.
Configuration Management Compare the configuration management tools Puppet, Chef, Ansible, and SaltStack.
IBN and Cisco DNA Center Explain how Cisco DNA center enables intent-based networking.

Content: