Level: Foundation

Implementing and Administering Cisco Solutions (CCNA) v1.0 Class

5 Day | Instructor Led

The Implementing and Administering Cisco Solutions (CCNA) v1.0 course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation, and software-defined networking. UKI is not affiliated with or endorsed by Cisco

Inquire About:
Implementing and Administering Cisco Solutions (CCNA) v1.0 Class

Ideal Candidates for CCNA Class

This course is designed for anyone seeking CCNA certification. The course also provides foundational knowledge for all support technicians involved in the basic installation, operation, and verification of Cisco networks.
The job roles best suited to the material in this course are:
Entry-level network engineer
Network administrator
Network support technician
Help desk technician

Implementing and Administering Cisco Solutions (CCNA) v1.0 Class Prerequisites

The knowledge and skills that students are expected to have before attending this course are:
Basic computer literacy
Basic PC operating system navigation skills
Basic internet usage skills
Basic IP address knowledge

What You'll Get in Implementing and Administering Cisco Solutions (CCNA) v1.0 Class

Expert Level Instruction

Cisco Press CCNA Library

Daily Exercises to Reinforce Memory Recall - Cognitive Core

What You'll Learn in Implementing and Administering Cisco Solutions (CCNA) v1.0 Class

Identify the components of a computer network and describe their basic characteristics
Describe the features and functions of the Cisco IOS Software
Describe LANs and the role of switches within LANs
Describe Ethernet as the network access layer of TCP/IP and describe the operation of switches
Install a switch and perform the initial configuration
Describe the TCP/IP internet Layer, IPv4, its addressing scheme, and subnetting
Describe the TCP/IP Transport layer and Application layer
Explore functions of routing
Implement basic configuration on a Cisco router
Explain host-to-host communications across switches and routers
Identify and resolve common switched network issues and common problems associated with IPv4
Describe IPv6 main features, addresses and configure and verify basic IPv6 connectivity
Describe, implement and verify VLANs and trunks
Describe the application and configuration of inter-VLAN routing
Explain the basics of dynamic routing protocols and describe components and terms of OSPF
Explain how STP and RSTP work
Configure link aggregation using EtherChannel
Describe the purpose of Layer 3 redundancy protocols
Describe basic WAN and VPN concepts
Describe the operation of ACLs and their applications in the network
Configure internet access using DHCP clients and explain and configure NAT on Cisco routers
Describe the basic QoS concepts
Describe the concepts of wireless networks, which types of wireless networks can be built and how to
use WLC
Describe network and device architectures and introduce virtualization
Introduce the concept of network programmability and SDN and describe the smart network management solutions like Cisco DNA Center, SD-Access and SD-WAN
Describe the management of Cisco devices
Describe the current security threat landscape
Describe threat defense technologies
Implement basic steps to harden network devices

Implementing and Administering Cisco Solutions (CCNA) v1.0 Class Certification

This exam tests your knowledge and skills related to: Network fundamentals Network access IP connectivity IP services Security fundamentals Automation and programmability

CCNA Outline

Section 1: Exploring the Functions of Networking Section 2: Introducing the Host-To-Host Communications Model Section 3: Operating Cisco IOS Software Section 4: Introducing LANs Section 5: Exploring the TCP/IP Link Layer Section 6: Starting a Switch Section 7: Introducing the TCP/IP Internet Layer, IPv4 Addressing, and Subnets Section 8: Explaining the TCP/IP Transport Layer and Application Layer Section 9: Exploring the Functions of Routing Section 10: Configuring a Cisco Router Section 11: Exploring the Packet Delivery Process Section 12: Troubleshooting a Simple Network Section 13: Introducing Basic IPv6 Section 14: Configuring Static Routing Section 15: Implementing VLANs and Trunks Section 16: Routing Between VLANs Section 17: Introducing OSPF Section 18: Building Redundant Switched Topologies Section 19: Improving Redundant Switched Topologies with EtherChannel Section 20: Exploring Layer 3 Redundancy Section 21: Introducing WAN Technologies Section 22: Explaining Basics of ACL Section 23: Enabling Internet Connectivity Section 24: Introducing QoS Section 25: Explaining Wireless Fundamentals Section 26: Introducing Architectures and Virtualization Section 27: Explaining the Evolution of Intelligent Networks Section 28: Introducing System Monitoring Section 29: Managing Cisco Devices Section 30: Examining the Security Threat Landscape Section 31: Implementing Threat Defense Technologies Section 32: Securing Administrative Access Section 33: Implementing Device Hardening


A. Erlich


I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin


The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.

Top Related Courses

The BEC XXE exercise is a customized, six-hour, Cyber Range exercise hosted on ManTech’s Advanced Cyber Range Environment (ACRE). Lead by expert cyber security engineers, the exercise can be executed in a classroom and remotely. In this exercise, BEC-based attacks are simulated. Participants will be introduced to variations of the BEC attack (both external and internal) and will capture, preserve and recover network and host-based artifacts from the attacks. They will also determine the origin of the attacks, the extent of the compromise, and any on-going activity related to it. Discussion focuses on blue team threat hunter tasks. This exercise uses a hands-on keyboard approach to create realistic technical training and management interaction opportunities where participants respond to and report events as identified. Participants are engaged via an Incident Response "Observe/Engage" Model and are encouraged to view the attack as if it were happening to their institutions in real time. Participants are asked to share what they have done or would do based on the facts provided.

All actions in war, regardless of the level, are based upon either taking the initiative or reacting in response to the opponent. By taking the initiative, we dictate the terms of the conflict and force the enemy to meet us on our terms. The initiative allows us to pursue some positive aim even if only to preempt an enemy initiative. It is through the initiative that we seek to impose our will on the enemy.

Cyber Vanguard Series - Cyber Strike takes the offensive and defensive assault tactics and applies them in several different real world scenarios. The entire course is hands on and builds upon the skills and knowledge the students have previously received. Applications include Offensive only - Hunt Teaming, Data Harvesting, and Asset Extraction, Defensive Only – Defending Your Assets, Setting Active Intrusion Systems, Vulnerability Assessment and Remediation, and Offensive and Defensive – Capture the Flag, where teams are pitted against each other to protect their own resources while attacking the opposing team.

© 2019 Ultimate Knowledge Insitute | All Rights Reserved
GSA# GS-35F-0469W