DTSS has been providing the online course called CCNA Online. This course is designed for: Students, Engineers, People are working at ITdepartment in agencies and enterprises. The course includes CCNA 200-301 program content and real-life situations at some agencies and enterprises.

DTSS commits that our lectures who are in charge have all the requirements: Master's degree in computer science; Cisco Networking Academy (CCAI) Instructor degree; more than 15 years of teaching experience in the field of computer networking; currently working as IT manager at 2 companies in Saigon.

Through years running this course, we have received many positive feedback from our students. 


In this course, we'll cover:


1. Network Fundamentals

1.1. Explain the role and function, how the components work in an enterprise network such as: Router, L2, L3 switch, new generation Firewalls, IPS intrusion detection and prevention systems, Access point transmitters, centralized Controller tools (Cisco DNA Center and WLC), servers and terminals.

1.2. Describe the characteristics of different types of network architectures and models such as 2-tier model, 3-tier model, Spine-leaf model, WAN, Small office/home office (SOHO)

1.3. Compare the device's network ports and connection cables such as single-mode fiber, multimode fiber, copper cable, PoE technology

1.4. Identify and resolve problems related to network ports and cable connections

1.5. Compare TCP and UDP protocols

1.6. Working with IPv4 addresses such as addressing, configuring, checking addresses

1.7. Working with IPv6 addresses such as classification of address types, configuration methods, generation of IPv6 addresses

1.8. Describe the characteristics and concepts in Wireless networks

1.9. Basics of virtualization technologies in enterprise networks (virtual machines)


2. Network Access – Methods to access the network

2.1. VLAN concept, configure and check VLAN related issues on Switch system such as Access ports (data and voice) problems, Default VLAN and VLAN connection problems.

2.2. Configure and check connection problems for Switch systems using VLANs such as Trunk ports and Trunk 802.1Q, Native VLAN.

2.3. Use layer 2 protocols such as Cisco Discovery Protocol and LLDP.

2.4. Configure and test the Etherchannel feature.

2.5. Describe the need for Spanning tree Protocol - STP, STP operations such as root bridge selection, root port selection and other port types, port states, and Rapid STP features.

2.6. Compare wireless network architectures and AP operating modes.

2.7. Describe techniques for connecting and managing Wireless networks such as Telnet, SSH, HTTP, HTTPS, console, and TACACS+/RADIUS.

2.8. Configure Wireless network settings using graphical interface via WLC.


3. IP Connectivity – Routing issues, IP connectivity

3.1. Explain the elements that appear in the routing table such as Routing protocol code (symbol of the address learned from which protocol), Prefix (length of the network part of the address), Network mask (subnet mask of the address). can only be learned), Next hop (address of the next station needed to reach the destination), Administrative distance (value compares the priority of routing protocols to the destination), Metric (value compares the priority of the routing protocols to the destination). routes ahead).

3.2. How the Router decides to choose the appropriate path to the destination: based on the Longest match rule, based on the Administrative distance index, based on the Routing protocol metric.

3.3. Configure and test static route - Static Route.

3.4. OSPF operation, configure and test dynamic routing using OSPF: Neighbor adjacencies, Point-to-point, Broadcast (DR/BDR selection), Router ID.


4. IP Services – Services in the network

4.1. Configure and check NAT operations - Network Address Translation converts addresses to help machines access the Internet.

4.2. Configure and test time synchronization between devices.

4.3. Explain the role of DHCP and DNS services in the network, configure the DHCP service.

4.4. Explain the function of the system monitoring SNMP operation.

4.5. Describe the use of tools to collect activity log information of devices in the system..4.6 Explain the operation in QoS such as traffic classification, traffic marking, processing queue, when there is congestion, the implementation of predefined policies.

4.7. Configure remote administration services such as Telnet, SSH.

4.8. Describe the function of File Server TFTP and FTP in the network.


5. Security Fundamentals

5.1. Define key concepts in security such as threats (threats), vulnerabilities (vulnerabilities), exploits (exploitation techniques).

5.2. Describe elements of a security program such as user awareness, vulnerability training, and physical access control.

5.3. Configure device access control using local Password.

5.4. Describe the elements of establishing policies for secure passwords such as management, password complexity, alternate passwords, multi-factor authentication, use of certificates, and use of biometrics .

5.5. Introduction to VPNs.

5.6. Configuring and using ACLs - access control lists.

5.7. Configure layer 2 security features such as DHCP snooping, dynamic ARP inspection, port security.

5.8. Concepts of AAA – authentication, authorization, accounting.

5.9. Security protocols for Wireless networks such as WPA, WPA2, WPA3.

5.10. Configure security for Wireless networks using WPA2 PSK.


6. Automation and Programmability

6.1. Explain how automation affects the network.

6.2. Compare traditional and automated network management on controllers.

6.3. Describe the components of controller-based and software defined architectures (overlay, underlay, fabric) such as Separation between control plane and data plane, North-bound and south-bound API.

6.4. Comparison of traditional management methods and management through Cisco DNA Center.

6.5. Compare tools like Chef, Puppet, Ansible.

6.6. Build JSON format files.