CCNA Training Course in Jaipur

Certification

Industry-oriented certification Digital Marketing training course to furnish your career to kick-start/grow at MNCs/Non-MNCs Organization & corporate

Experienced Faculty

Professional expert Sr. Digital Marketing Institute With 15+ Years of working experience will provide you industrial level training.

Placement Assistance

Receive placement assistance after completion of 70% training, E-lite team will arrange interviews till you’ll get the placement.

LAB Facility

You can attain the practical training session to get the indutrial exposure & prepare for the corporate level challanges.

Workshop Sessions

You’ll attain knowledge on bases of real-time scenarios, live projects & best case study to complete E-lite workshop.

Admin Support

E-lite 7 days working admin team co-ordinates you for the fresh batch schedule/re-scheduling classes/arrange doubt classes.

CCNA Trainng Programme Details

Course Duration:90 – 120 HRS with Highly Skilled Corporate Trainers
(Level 1 – NSEA (N+|A+|Linux|Windows|CCNA) Training) for 5 Modules – Weekdays / Weekend

E-lite Institute Jaipur – Level 1 – NSEA (N+|A+|Linux|Windows|CCNA) Certification Training Delivery Method:

  • Web / Desktop Base.
  • Instructor-Led Classroom Sessions.
  • Presentations/Demonstration/Practicals of concepts.
  • Handouts/Assignments/Real-time Exposure to work on Clients.

CCENT – Networking Training Programme Modules

CCNA Training Course

<ul> <li>Personal Computer Components</li> <li>Operating System Fundamentals</li> <li>Installing and Configuring Peripheral Components</li> <li>Installing and Configuring System Components</li> <li>Maintaining and Troubleshooting Peripheral Components</li> <li>Troubleshooting System Components</li> <li>Maintaining and Troubleshooting Microsoft Windows</li> <li>Network Technologies</li> <li>Installing and Managing Network Connections</li> <li>Supporting Printers and Scanners</li> </ul> <p>Module 1.1</p> <p><strong>Module &ndash; 1.1 (A) Hardware A+ </strong></p> <ul> <li>Personal Computer Components</li> <li>Operating System Fundamentals</li> <li>Installing and Configuring Peripheral Components</li> <li>Installing and Configuring System Components</li> <li>Maintaining and Troubleshooting Peripheral Components</li> <li>Troubleshooting System Components</li> <li>Maintaining and Troubleshooting Microsoft Windows</li> <li>Network Technologies</li> <li>Installing and Managing Network Connections</li> <li>Supporting Printers and Scanners</li> </ul> <p>Module &ndash; 1.1 (B ) N+</p> <ul> <li>Network Basics</li> <li>Wired Computer-to-Computer Connections</li> <li>Network-to-Network Connections</li> <li>Wired Internetworking Device</li> <li>Wired Communication Standards</li> <li>Wireless Networking</li> <li>Security Threats and Mitigation</li> <li>Network Access Control</li> <li>Monitoring</li> <li>Troubleshooting</li> </ul> <p>Module 1.2 &ndash; lpv4 ADDRESSING</p> <ul> <li>IP address</li> <li>IP Addressing</li> <li>Version of IP Address</li> <li>Public</li> <li>Private IP Address</li> <li>Network Mask</li> <li>Role Network mask in IP Addressing</li> <li>Default Mask of Classful IP Address</li> <li>IP Address is combination of Network bits &amp; Host bits</li> <li>Network ID or Network Address</li> <li>Broadcast ID or Broadcast Address</li> <li>No. of Network ID&rsquo;: &amp; Valid IP Address in Class A, Class B, Class C</li> <li>Design &amp; Implementation of Network Scenario with Classful Network</li> </ul> <p>Module 1.3 &ndash; IPV4 Saving Techniques</p> <ul> <li>Subnetting</li> <li>VLSM</li> <li>NAT</li> <li>Subnetting &amp; its advantages</li> <li>How to proceed for Subnetting &amp; VLSM</li> <li>I Design &amp; Implementation of Network Scenario with Subnetted Network &amp; VLSM</li> <li>Network Address, Broadcast Address</li> <li>First Valid IP address</li> <li>Last valid IP address</li> <li>Valid range of IP address</li> <li>Sub net mask,</li> <li>Block size</li> <li>Next Network Address</li> </ul> <p>Module 1.4 &ndash; Cisco Router Introduction Theory:</p> <ul> <li>Introduction to Cisco Router</li> <li>General port diagram of Cisco Routers</li> <li>Cable &amp; Connection.</li> <li>Connectivity diagram of Cisco Routers with Network Devices</li> <li>Describe the boot process of Cisco IOS routers <ul> <li>POST</li> <li>Booting Process of Routers</li> <li>Boot preferences</li> <li>Cisco IOS image(s)</li> <li>How to access Cisco Router Console</li> <li>Basic Management mode &amp; Commands of Cisco Router</li> </ul> </li> </ul> <p>Module 1.5 &ndash; IP ROUTING Theory:</p> <ul> <li>Basic Routing Concept</li> <li>Routed &amp; Routing Protocols <ul> <li>Types of Routing &amp; Protocols.</li> <li>Static Routing.</li> <li>Static Route</li> <li>Default route</li> </ul> </li> <li>Differentiate terms: <ul> <li>Next hop</li> <li>AD</li> <li>Metric</li> <li>Destination NID</li> <li>Route Codes</li> <li>Outgoing interface</li> </ul> </li> <li>AD &amp; Metrics of Different Routing Protocols</li> </ul> <p>LAB :</p> <ul> <li>configure and verify Static Route</li> <li>Con?gure and verify Default Route</li> </ul> <p>Module 1.6 &ndash; DYNAMIC PROTOCOLS &amp; DYNAMIC ROUTING Theory:</p> <ul> <li>Types of dynamic protocols</li> <li>IGP vs EGP protocols</li> <li>Static vs. Dynamic</li> <li>Link state vs. Distance Vector</li> </ul> <p>Module 1.7 &ndash; OSPF ( Open Shortest Path First ) Theory: OSPF Terminology</p> <ul> <li>Link-states Advertisement</li> <li>Router ID &amp; its selection.</li> <li>Loopback Interface &amp; Loopback Interface <ul> <li>Hello Timer &amp; Dead Timer</li> <li>Concept of Area in OSPF &amp; its Advantages</li> <li>Backbone area</li> <li>Types of Area&rsquo;s in OSPF</li> <li>OSPF router interface Priority</li> <li>DR &amp; BDR Concept</li> <li>Process ID</li> <li>Concept of Wild Card Mask</li> <li>ABR &amp; ASBR</li> <li>Passive Interface</li> <li>AD &amp; Metric</li> </ul> </li> <li>Neighbor adjacency components</li> <li>OSPF router states</li> <li>Discuss OSPF single &amp; multi area</li> </ul> <p><strong>Type of Tables in OSPF</strong></p> <ul> <li>Neighbor Table</li> <li>Topology Table</li> <li>Routing Table</li> </ul> <p>LAB :</p> <ul> <li>Configure and verify ospfv2 single area</li> <li>Configure and verify ospfv2 multi area</li> <li>Verify ospf metric calculation.</li> <li>Modify OSPF Parameter.</li> </ul> <p>Helpful Command use in LAB</p> <ul> <li>showip interface brief</li> <li>show protocols</li> <li>show running-config</li> <li>showip route</li> <li>showip route connected</li> <li>show ip route ospf</li> </ul> <p>Module 1.8 &ndash; EIGRP (Enhanced Interior Gateway</p> <p><strong>Routing Protocol) Theory</strong></p> <ul> <li>Characteristics of EIGRP</li> <li>Feasible Distance / Feasible Successors /Administrative distance</li> <li>Feasibility condition</li> <li>Metric composition</li> <li>Router ID</li> <li>Auto summary &amp; no auto summary</li> <li>Muticast address of eigrp</li> <li>Hello &amp; Hold timer</li> <li>AD&rdquo;s of eigrp</li> <li>Passive interface</li> <li>Wild card mask</li> <li><strong>Types of eigrp tables. </strong></li> <li>Neighbor Table</li> <li>Topology Table</li> <li>Routing Table <ul> <li>Neighbor adjacency Parameter</li> </ul> </li> <li>Hello</li> <li>ASN</li> <li>METRIC</li> </ul> <p>LAB:</p> <ul> <li>Configure and verify EIGRP</li> <li>Configure and verify Redistribution with non&not;-eigrp</li> <li>Stop unwanted Traffic on LAN segment (using passive-interface.)</li> <li>Modify EIGRP Parameter.</li> </ul> <p><strong>Helpful Command use in LAB</strong></p> <ul> <li>show ip interface brief</li> <li>show protocols</li> <li>show running-config</li> <li>show ip route</li> <li>show ip route eigrp</li> <li>show ipeigrpneighbour</li> <li>show ipeigrp topology</li> </ul> <p><strong>Module 1.9 &ndash; HOW TO MANAGE CISCO DEVICES Theory</strong></p> <ul> <li>Cisco Discovery Protocol (CDP)</li> <li>Introduction</li> <li>How to enable &amp; disable CDP on Router &amp; Interface</li> <li>Password recovery procedure</li> <li>Backup &amp; Up gradation of IOS</li> <li>Backup &amp; Up gradation of Configuration File</li> </ul> <p><strong>Describe following terms:</strong></p> <ul> <li>Ping</li> <li>Traceroute</li> <li>Tracert</li> <li>DebugIP Packet</li> <li>DebuglPlCMP</li> </ul> <p>LAB:</p> <ul> <li>Verify CDP to ?nd out information ofdirectly connected Cisco devices</li> <li>Disable CDP on router and interface</li> <li>Modify CDP Timers.</li> <li>Con?gure and verify of Advance Telnet feature.</li> <li>Configure &amp; Verify HOST Resolving.</li> <li>Backup of IOS File</li> <li>Backup of Con?guration File.</li> <li>Restoring of I0S FiIe</li> <li>Restoring of Con?guration File.</li> <li>Cisco router Password recovery &amp; Recovery of NVRM File.</li> </ul> <p>Module 1.10 &ndash; IP SERIVCES DHCP</p> <ul> <li>DHCP Server (IOS Router)</li> <li>DHCP Client</li> <li>DHCP Pool</li> <li>Default Router</li> </ul> <p><strong>Packet Filtering via ACL</strong></p> <ul> <li>Describe the types, features, and applications of ACLs</li> <li>Standard</li> <li>Sequence numbers</li> <li>Editing</li> <li>Extended</li> <li>Numbered</li> <li>Log option</li> <li>Inbound &amp; Outbound ACL</li> <li>Drawback of Standard 81 Extended ACL</li> <li>How to overcome Drawback of Standard &amp; Extended ACL</li> <li>ACL Implementation Rules</li> <li>Identify the basic operation of NAT</li> <li>Purpose</li> <li>Pool</li> <li>Static (?xed &ndash; One Private IP need One Public IP)</li> <li>1 to 1 (variable &ndash; One Private IP need One Public IP)</li> <li>Overloading (Group of Private IP Address need one Public IP)</li> <li>Source addressing (bi-directional)</li> <li>One way NAT ( uni-directional)</li> </ul> <p><strong>NTP</strong></p> <ul> <li>NTP Server</li> <li>NTP Client</li> </ul> <p><strong>ADVANCE TOPICS</strong></p> <ul> <li>VRRP</li> <li>HSRP</li> <li>GLBP</li> <li>Concept of Syslog sewer</li> </ul> <p>LAB:</p> <ul> <li>Configure and verify Static (?xed) NAT.</li> <li>Configure and verify Static (with pool) NAT</li> <li>Configure and verify PAT (Overloading)</li> <li>Configure and verify Numbered Standard &amp; Named Standard ACL</li> <li>Configure and verify Numbered Extended &amp; Named Extended ACL.</li> <li>Configure and verify NTP Server and Client.</li> <li>Con?guring and verify router interfaces to useDHCP</li> <li>Con?guring and verify DHCP</li> </ul> <p>Module 1.11 &ndash; LAN Switching Technology</p> <ul> <li>Introduction of Cisco Switches</li> <li>Collision Domain &amp; Broadcast Domain</li> <li>Bridges and Hubs</li> <li>Types of switching</li> </ul> <p><strong>Bridge &amp; its Function</strong></p> <ul> <li>Forwarding</li> <li>Filtering</li> <li>Flooding</li> <li>Formation of MAC Table or CAM Table</li> </ul> <p><strong>VLAN &amp; its Advantage</strong></p> <ul> <li>Network segmentation</li> <li>Security</li> <li>Enhanced performance</li> <li>How to creates VLAN</li> <li>Types of VLAN membership</li> <li>Access port &amp; Access Ilnk</li> <li>Trunk port &amp; Trunk link</li> <li>How to form trunk 8: its requirements</li> <li>Trunking Protocols ISL &amp; dot1q</li> <li>Frame Forwarding Techniques in Switch</li> <li>Inter-Vlan Routing</li> <li>STP</li> </ul> <p><strong>STP Convergence Components</strong></p> <ul> <li>lowest Bridge ID</li> <li>lowest RPC</li> <li>lowest Sender BID</li> <li>lowest Sender Port ID</li> </ul> <p><strong>STP Convergence Steps:</strong></p> <ul> <li>Election of Root Bridge.</li> <li>Election of Root Port.</li> <li>Election of Designated Port</li> <li>Spanning Tree Mode</li> <li>Concept of Ether channel</li> </ul> <p>LAB:</p> <ul> <li>Con?gure and verify initial switch con?guration</li> <li>Verify CAM Table.</li> <li>Con?gure and verify VLANs</li> <li>Con?gure and verify trunking on Ciscoswitches</li> <li>Con?gure and verify inter VLAN routing(Router on a stick)</li> <li>sub interfaces</li> </ul> <p>Module 1.12 &ndash; Network Device Security Con?gure and verify network</p> <ul> <li>Device password security</li> <li>Enable secret vs enable</li> <li>Transport</li> <li>Disable telnet</li> <li>SSH</li> <li>VTYs</li> <li>Physical security</li> <li>Service password</li> <li>Con?gure and verify Switch Port Security</li> <li>features such as</li> <li>Sticky MAC</li> <li>MAC address limitation</li> <li>Static / dynamic</li> </ul> <p>Module 1.13 &ndash; WAN Technologies</p> <ul> <li>WAN Connection types</li> <li>WAN Protocols</li> <li>Introduction of HDLC</li> </ul> <p><strong>Introduction of PPP &amp; its feature</strong></p> <ul> <li>PPP sub Protocols</li> <li>PPP session establishment</li> <li>PPP authentication methods</li> <li>Understanding Frame-Relay</li> <li>Fundamentals</li> <li>How to make Router as a FRAME_RELAY</li> <li>Switch</li> </ul> <p><strong>Frame-Relay logical Topologies</strong></p> <ul> <li>Hub 8- Spoke</li> <li>Full Mesh</li> <li>Partial Mesh</li> <li>Virtual Private Network</li> <li>Basic fundamentals of VPN</li> </ul> <p>LAB :</p> <p><strong>Configure and verify a basic WAN serial connection</strong></p> <ul> <li>Configure and verify a PPP connection between Cisco routers</li> <li>Configure and verify PPP Authentication</li> <li>Configure and verify Frame Relay on Cisco routers</li> </ul> <p>Module 1.14 &ndash; Ipv6</p> <ul> <li>Introduction of lpv6</li> <li>Need of lpv6</li> </ul> <p><strong>Ipv6 addressing</strong></p> <ul> <li>Link Local address</li> <li>Site local address</li> <li>Global Unicast Address</li> <li>Multicast Address</li> <li>eui 64</li> <li>autocon?guratlon</li> </ul> <p><strong>Ipv6 packet type</strong></p> <ul> <li>Unicast</li> <li>Multicast</li> <li>Anycast</li> <li>Ipv6 supporting protocols (RIPng, OSPFva, EIGRPvG,MP-BGP)</li> </ul> <p><strong>LAB :</strong></p> <ul> <li>Configuring &amp; Verify IPV6 Address</li> <li>Configure &amp; verify OSPFv2</li> </ul> <p><strong>Module 1.15 &ndash; 3 OSI (Open System Interconnection) &amp; TCP/IP</strong></p> <ul> <li>Introduction to OSI or Layered Structure mode006C</li> <li>Data encapsulation &amp; De-encapsulation Process</li> <li>PDU form of Data at each layer</li> <li>Role of OSI layers</li> <li>Application</li> <li>Presentation</li> <li>Session</li> <li>Transport</li> <li>Network</li> <li>Data llnk</li> <li>Physical</li> <li>Introduction of Protocols &amp; Network Devices per</li> <li>layer</li> <li>OSI peer to peer communication diagram</li> <li>OSI Vs TCP/IP</li> <li>TCP/IP Layers</li> </ul>

Find the CCNA course details. Classes and Course can be designed/customize as per request

Duration of Module

CCNA Course Module CCNA Course Duration
M 1 (CCNA) 80 (Hours)
M 2 (Winows / Linux) 10 (Hours)
M 1 & 2 (Complete Course) 90 (Hours)

Batch Timings

CCNA Course Schedule CCNA Course Timing
Monday to Friday 8:00 AM – 10:00 AM
Monday to Friday 10:00 AM – 12:00 PM
Monday to Friday 2:00 PM – 4:00 PM
Monday to Friday 4:00 PM – 6:00 PM
Saturday/Sunday 8:00 | 12:00 | 2:00 | 4:00
Sunday 8:00 AM – 10:00 AM
Sunday 10:00 AM – 12:00 PM
Sunday 2:00 PM – 4:00 PM
Sunday 4:00 PM – 6:00 PM