| Module |
Objective |
| Module 1: Basic Device Configuration |
Implement basic device configuration using security best practices |
| Module 2: Switching Concepts |
Explain how Layer 2 switches forward data |
| Module 3: VLANs |
Implement VLANs and trunking in a switched network |
| Module 4: Inter-VLAN Routing |
Troubleshoot inter-VLAN routing issues on Layer 3 devices |
| Module 5: STP |
Explain how STP enables redundancy in an Layer 2 network |
| Module 6: EtherChannel |
Implement EtherChannel to improve performance and redundancy on switched links |
| Module 7: DHCPv4 Configuration |
Implement DHCPv4 to operate across multiple LANs |
| Module 8: SLAAC and DHCPv6 |
Explain the operation of dynamic address allocation in IPv6 networks |
| Module 9: FHRP Concepts |
Explain how FHRPs provide default gateway services in a redundant network |
| Module 10: LAN Security Concepts |
Explain how vulnerabilities compromise LAN security |
| Module 11: Switch Security Configuration |
Configure switch security to mitigate LAN attacks |
| Module 12: WLAN Concepts |
Explain how WLANs enable network connectivity |
| Module 13: WLAN Configuration |
Implement a WLAN using a wireless router and WLC |
| Module 14: Routing Concepts |
Explain how routers use information in packets to make forwarding decisions |
| Module 15: Ip Stating Routing |
Implement IPv4 static routing to enable connectivity |
| Module 16: Troubleshoot Static and Default Routes |
Troubleshoot static and default route configurations |