<div style="margin:20px 0 0 200px"> To view the site, enable JavaScript by changing your browser options, then <a href="">Try Again</a>.</div>
EC-Council Accredited Training Center

CCNA or Cisco Certified Network Associate is an Information Technology certification from CISCO, the American multinational and leader in IT, networking and cyber security solutions. CCNA certification is an associate level Cisco Career Certification.

The content of the exams is propriety.

The CCNA certification is valid for a period of 3 years. Renewal of the certification requires the present holders to register and pass the same or higher level Cisco re certification exam every 3 years.

The topics include connecting to a WAN, implementing network security, network types, network media, routing and switching fundamentals, the TCP/IP and OSI models, IP addressing, WAN technologies, operating and configuring IOS devices, extending switched networks with VLANs, determining IP routes, managing IP traffic with access lists, and establishing point-to-point connections.

5.0
Course Rating

View All Reviews »

6350+
Students Enrolled and Counting…

Full List of Alumni »

Why learn CCNA Essentials?

Enhances industry interface. Essential for
Networking Industry

Course Syllabus »

Imparts in depth knowledge of
Networking.

Provides essential
Networking Knowledge
for
Ethical Hacking.

Fulfils eligibility for
CCNA Global by CISCO.

Jobs »
Duration

Duration

40 hours - 2 classes per week

Eligibility

Eligibility

10+2 along with a basic aptitude and understanding of computer hardware knowledge.

Course Fees

Course Fees

Class Room Training

Rs.13,000/-
Inclusive of all taxes

Online Training

Rs.23,000/-
Rs.13,000/-
Inclusive of all taxes

What You Will Get?

40 Hours
in-depth training by Cisco Certified Trainer

Study Materials

CCNA Essentials
Certificate of Completion after examination and alumni status

Your Course Path

CCNA Essentials Course Path

Course Details

  1. Essential to understand ethical hacking
  2. Prerequisite for CEH
Introduction 2 Hours - 6 Topics
  • What is Networking? (Day 1)
  • What is Internet? (Day 1)
  • LAN, MAN, WAN, Topology (Day 1)
  • Bits, Bytes and Octets (Day 1)
  • What is Packet Tracer? (Day 1)
  • Packet Tracer Installation (Day 1)
  • Introduction to IP and MAC Address (Day 2)
  • Use of IP and MAC Address (Day 2)
  • What is OUI and DI? (Day 2)
  • IANA, ICANN (Day 2)
  • IPv4(Classful Addressing) (Day 2)
  • Class A,B,C,D,E (Day 2)
  • Public IP Private IP (Day 2)
  • Loopback Address and APIPA (Day 2)
  • Default Subnet Mask (Day 2)
  • What is Subnetting? (Day 3)
  • What is FLSM and VLSM? (Day 3)t
  • What is Subnet Mask? (Day 3)
  • What is CIDR? (Day 3)
  • Calculate FLSM for Class C Address (Day 3)
  • Calculate VLSM for 4-6 Network Requirement with variable Host (Day 3)
  • What is OSI Layer (Day 4)
  • Explain 7 layers (Day 4)
  • Brief explanation for 3 way Handshake (Day 4)
  • Brief explanation for TCP Header (Day 4)
  • Comparison between OSI and TCP/IP Model (Day 4)
  • Define ICMP, ARP, DNS (Day 5)
  • Explain the uses and working of ICMP, ARP, DNS (Day 5)
  • How to use Packet Tracer? (Day 6)
  • Network setup using 2 pc and switch (Day 6)
  • Router Components and Different Modes (Day 6)
  • Router Configuration (Day 6)
  • Network setup using 2 pc, switch and router (Day 6)
  • DHCP Configuration using 4pcs(Classful & Classless) (Day 6)
  • What is Routing? (Day 7)
  • What is IGP and EGP? (Day 7)
  • Explain Different Vectors and Metrics (Day 7)
  • Different protocols under IGP and EGP (Day 7)
  • What is AS number and AD value? (Day 7)
  • What is Static Routing? (Day 8)
  • Static Routing Configuration using 2 and 3 Routers (Day 8)
  • What is Default Routing? (Day 8)
  • Default Routing Configuration using 2 and 3 Routers (Day 8)
  • Explain OSPF, AD Value, Cost (Day 9)
  • Explain Process ID, Wild Card Bits, Area (Day 9)
  • 7 stages of Establishment (Day 9)
  • OSPF Single Area Configuration using 2-3 routers (Day 9)
  • Explain EIGRP, Cost, Metrics (Day 10)
  • 5 Stages of Establishment (Day 10)
  • Configure EIGRP using 2-3 routers (Day 10)
  • What is and use of ACL? (Day 11)
  • What is Standard and Extended ACL? (Day 11)
  • Standard(Name,Number) ACL Configuration with 2 Routers (Day 11)
  • Extended(Name,Number) ACL Configuration with 2 Routers (Day 11)
  • Extended(Name,Number) ACL Configuration with 2 Routers blocking/allowing a network/hosts for ICMP,HTTP,HTTPS,FTP,TELNET (Day 11)
  • What is NAT? Different Types of NAT (Day 12)
  • Configure Static NAT (Only Inside Rule) with two router (Day 12)
  • Configure Dynamic NAT (Only Inside Rule) with two router using Pool and Interface (Day 12)
  • What is PAT? (Day 12)
  • Configure PAT (Only Inside Rule) with two router using Pool and Interface (Day 12)
  • What is Switching? (Day 13)
  • What is VLAN? (Day 13)
  • Different Modes(Access, Dynamic and Trunk) (Day 13)
  • Configure VLAN (2-3 VLANS) (Day 13)
  • Configure Intervlan Routing(Using Router with 2 interfaces, Router on Stick) (Day 13)
  • What is VTP? (Day 14)
  • Configure VTP(Server, Client, Transparent Mode) with 4 Switches (Day 14)
  • STP, RSTP (Day 14)
  • What is Port Security? (Day 15)
  • Configure Port Security(Restrict, Protect, Shutdown Mode) (Sticky, Dynamic MAC Address, Maximum Address) (Day 15)
  • What is DHCP Snooping? (Day 15)
  • Configure DHCP Snooping with 2 Servers (DHCP Configured inside) and 4 PCs (Day 15)
  • Explain Different WAN Technologies (Leased Line, Circuit Switching, Packet Switching) (Day 16)
  • What is Point to Point and Multiaccess Link? (Day 16)
  • Explain and Configure different Point to Point Link encapsulation technology (HDLC, PPP --> PAP, CHAP) (Day 16)
  • Explain Multiaccess Link (Frame Relay) (Day 16)
  • Why IPv6? (Day 17)
  • How to write IPv6 Address? (Day 17)
  • Different Types of IPv6 Address (Unicast, Multicast, Anycast) (Day 17)
  • Different Types of Unicast Address (Global Unicast, Unique local, link local) (Day 17)
  • Configure and Verify IP address on Router with 2PCs (Day 17)
  • Configure and Verify Static Autoconfig Address (Day 17)
  • Configure and Verify Static Routing with 2 Routers (Day 17)
  • Explain AAA and the working (Day 18)
  • Discuss the differences between TACACS+ and RADIUS (Day 18)
  • What is SNMP? Different SNMP Version (Day 19)
  • What is MIB, OID? What is SNMP Agent and Manager? (Day 19)
  • Different SNMP Queries (Day 19)
  • What is DMZ? Why is used? (Day 19)
  • Discuss How DMZ are formed? (Day 19)
  • What is Proxy? Why it is used? (Day 20)
  • What is VPN? (Day 20)
  • Different Types of VPN (Site-to-Site, Remote-access) (Day 20)
  • Different VPN Technologies (GRE, DMVPN, IPSEC) (Day 20)

Hacking Tutorials

Read All Tutorials »
Building a career in Digital Forensics - How promising is the future? A thorough career guide
Building a career in Digital Forensics - How promising is the future? A thorough career guide
Read Details »

Hacking Videos

Explore All Videos »
How to Hiding Your Secret File using Steganography?
View On Youtube »

Get In Touch



Captcha

Related Course


Enroll Now »
Know Your Faculty
Mr. Sandeep Sengupta
Mr. Sandeep Sengupta
CISA, Certified Ethical Hacker, ISO 27001:2013 Lead Auditor, Lead Privacy auditor, GDPR Implementer

21 years of experience working in India, New Zealand & Singapore; in Information Security domain as Ethical Hacker, ISO 27001 Lead Auditor / Tutor, BS 10012 Privacy Lead Auditor, Mr. Sandeep Sengupta has conducted security audit in companies like ONGC, KPMG, PWC, Airtel, Vodafone, Accenture, Capgemini, Vedanta, PayU, Bandhan Bank, ABP, etc.

He has been invited as a speaker at FICCI, VIT (Vellore), Nasscom, CII, BCCI, ICAI, ISACA, FICCI, CeBIT, US High Commission (Kolkata), etc. He has taken part in several Television shows on ABP, ETV, NDTV, AajTak, Times Now, etc. In 2005, Sandeep founded the online community "Hackers Library"; which had 80,000+ members, making it the largest Indian online forum for cyber-security professionals at its time. Mr. Sengupta is the committee member at Nasscom (East) & CII ICT-East.

Mr. Kirit Sankar Gupta
Mr. Kirit Sankar Gupta
B. Tech (IT), OSCP, CEH 10.0, CHFI 9.0, ISO Certified Lead Security Incident Manager (ISO/IEC 27035), ISO Certified Lead Forensic Examiner (CLFE), CCNA, CCNP

A Penetration Tester with 6 years of experience, Kirit has the expertise in Mobile Application Pentesting Network, IoT Penetration Testing, Source-code review, Fuzzing, Red teaming, Social Engineering, Digital Forensics and Incident Response, Dev(Sec)Ops, Malware Analysis as well as SOC analysis. He has been acknowledged for reporting critical vulnerabilities to Uber, Apple, Flipkart, and MIT. Mr. Kirit Sankar Gupta is the member of Data Security Council of India (Kolkata).

Mr. Sanchayan Bhaumik
Mr. Sanchayan Bhaumik
ME (Jadavpur University), MCA (WBUT), CEH, CHFI, CEI

With 7 years of experience in Information Security audit and Forensic Investigation, Mr. Sanchayan Bhaumik is working as Information Security Analyst at ISOEH and has successfully conducted various Vulnerability Assessment and Penetration Testing / audit, as well as Forensic Investigation for leading corporate houses and Government entities.

He has worked as an Assistant Professor at Sikkim Manipal University & Guest Faculty at National Institute of Pharmaceutical Education and Research. His research domain is AI, Machine Learning and Cryptography. He has presented several research papers in international conferences. At ISOEH his job profile includes VAPT, Forensic Assignments & Teaching advance courses on penetration testing, creating hacking tools using python, AI & ML.

Mr. Saumitra Biswas
Mr. Saumitra Biswas
M Tech - Computer Science, MSc (Statistics), GATE qualified

Mr. Saumitra Biswas is M.Tech in computer science from Netaji Subhash Engineering College, GATE qualified in computer science and a MSC in statistics from Kalyani University. He has 20 years of experience. His technical interests include Machine Learning, Neural Networks, Genetic Algorithms and Object Oriented Programming. He is skilled in C, C++, C#, Dotnet, Java, Python, Matlab, Unix, MS Windows XP, Windows 7, My SQL, Oracle, MS Access, HTML, XML, CSS and PHP. He take classes on AI & ML in ISOAH, as well as act as mentors to interns & project trainees.

Ms. Amrita Acharya
Ms. Amrita Acharya
M Tech in CSE, ISO 27001 Lead Auditor (IRCA/BSI)

After completion of her Master degree, she has worked with ISOAH as an intern for few years before joining full time as security analyst. She has been involved in internal audit, policy design, ISMS consultancy for more than 2 years. She is well versed in Kali Linux, Nmap, Metasploit, ITGC, ISO 27001 & COBIT framework. ISOAH clients she has provided active consultancy are CESC, Diadem, Lexplosion, Diamond Beverages, etc. As part of her hobby, she has been a professional model in her free time.

Mr. Subhendu Bhadra
Mr. Subhendu Bhadra
ECSA, CEH, CCNA, Android Pentesting, Reverse Engineering

A Certified Ethical Hacker & CCNA, Mr. Subhendu Bhadra has expertise in exploit writing using Python, Ruby and Bash and is working as a Information Security Analyst and Faculty at ISOEH. Passionate about gadgets and technology, he has created several projects using Arduino. Well versed with networking and various programming languages, Suvendu is developing new hacking tools using Python.

Mr. Anubhav Kettry
Mr. Anubhav Khettry
Certificate EC-Council Instructor (CEIv2), CEH, CHFI

Anubhav Khettry is a Certified Ethical Hacker. His area of interest includes Network Penetration Testing (NPT), Web Application Penetration Testing (WAPT) & RDBMS concepts. He is currently a part of ISOEH as Information Security Analyst and faculty.

Mr. Saugata Sil
Mr. Saugata Sil
MCA, CEH

Saugata Sil is a Certified Ethical Hacker (CEH). His area of interest is Python, Networking, Ethical Hacking, Front-end Development, Vulnerability Assessment, Web Application Pentesting, Android Application Pentesting and API Pentesting. Previously he worked as a Front-end developer and Software developer. As well as he also bug hunting and he has been acknowledged for reporting critical vulnerabilities to Dell, TripAdvisor, HealthifyMe, Spacex and many more. He has a passion for teaching & likes to guide students to apply cyber security knowledge in real-life scenarios. He is currently a part of ISOAH as a faculty member & Security Researcher Analyst.

Mr. Sagar Neogi
Mr. Sagar Neogi
MCA, CEH

Sagar Neogi is a Certified Ethical Hacker (CEH). His area of interest is Python, Reverse Engineering, Vulnerability Assessment and Penetration Testing. He is proficient in network design & hardening. He has a passion for teaching & likes to guide students to apply cyber security knowledge in the real-life scenario. He is currently a part of ISOEH as a faculty member & research analyst.

Mr. Somdeb Chakraborty
Mr. Somdeb Chakraborty
MSc in Computer Application, CEH, CCNA, Android Development

Somdeb Chakraborty is a Certified Ethical Hacker (CEH), whose expertise lies in penetration testing. His areas of interest are Networking, Python, Vulnerability Assessment and Penetration Testing. He is also CCNA Global Certified (CISCO ID# CSCO13549504). Previously he worked as a software and web development trainer at The EDGE College in tie up with Vinayaka mission Sikkim University. He is working as an Information Security Analyst in the Indian School of Ethical Hacking.

Mr. Soummya Mukhopadhyay
Mr. Soummya Mukhopadhyay
BCA, CEH Master

Mr. Soummya Mukhopadhyay is a CEH Master. He has an interest in Network Penetration Testing, Web Application Penetration Testing and in 802.11 attacks and mitigation, as well as Advanced Persistent Threat mitigation. Previously worked as a Web Application Back end developer using PHP. Over the last one year he has been active as a bug bounty hunter. For ISOAH he has taken an active role in Developing CTF Challenges.

Mr. Debraj Basak
Mr. Debraj Basak
B.Tech (EE), CEH v11, CCNA 3.0

Debraj Basak is a Certified Ethical Hacker (CEH). His area of interest is Advance Python, C Programming, Networking, Ethical Hacking, Hacking Tools Development, Vulnerability Assessment, Web Application Pentesting and Network Pentesting. He is also skilled in HTML, CSS, PHP & DBMS. Currently he is doing research on Malware Analysis and Reverse Engineering. He has a passion for teaching & likes to guide students to apply cyber security knowledge in real-life scenarios. He writes technical content as a hobby.

>
<

Ratings & Reviews

CCNA Essentials (Network Administration)

5.0
Course Rating
Based On
6350 Students Rating

Date: 31.12.2019
Course: CCNA Essentials (Network Administration)

I have done CCNP under shubendu Sir and CCNA under sagar sir..... I have so glad to have such a personality in our faculty....I have a nice experience in this institute

Date: 27.12.2019
Course: CCNA Essentials (Network Administration)

I have joined ISOEH for CCNA 3.0 and CCNP. My trainer is Subhendu sir, He is one of the best faculties.. He is well versed with the course, and he helped me to go through the entire syllabus theoretically and practically in detail. My overall experience was very Very good Thank you subhendu Sir & ISOEH...

Date: 26.12.2019
Course: CCNA Essentials (Network Administration)

Excellent Place to learn CCNA and Ethical Hacking. Best institute to learn on networking and Hacking. Lucky to be a part of this Institution.. Teachers and Faculties are very helpful and always ready to help. They got huge knowledge on every subject and every topic. I was under Subhendu Sir from very 1st day, he is too good and has good expertise and knowledge in his domain of Networking and also completed the course under him. For EH I was under Sanchayan Sir and Anubhav Sir they were also too good in teaching Hacking and its tools and how it works and cleared all my doubt. On other hand Kundan Sir also helped me with all my problems which I was facing and also help me to get rid from all my problems so i will be thankful to ISOEH for life. It was a good journey for me in learning and gathering knowledge and looking forward to do more courses from here and will also suggest my friend about this Institution. Thank You.

>
<

Job Prospects & Job Sources

In order to maintain ultimate cyber security for corporate networking component is the most important aspect of IT infrastructure. Thus the demand for trained CCNA practitioners is soaring highest in the market for IT jobs.

One of those industrial sectors where CCNA is the most sought after IT security service is the Medical. That is because it is important to secure the patient report and associated medical details from being seized by hackers. Cyber Security being a major threat in fields of human activities the demand for CCNA certified security professionals is the highest. However prospects of a CCNA professional depends mainly on two factors namely work experience and job title.

The various titles that a CCNA processional holds are as follows:

Network Engineer Senior Network Engineer Network Administrator
IT Manager Systems Administrator
Mobile Lead Software Engineer Mobile Developer IT Director
System Engineer

Out of all the varied titles of CCNA the position which commands the highest financial compensation is the managerial one which CCNA is a confirmed catalyst to reach.

Two important specializations of CCNA is ‘routing’ and ‘switching’. Job opportunities for both are increasing manifold owing to growing network and infrastructural complexities which demand trained individuals who can maintain complicated and critical hardware required to support the same. But these two specializations are at present the most in demand and financially alluring areas of CCNA.

Here is a pictorial representation of a CCNA career in India.

FAQs

What is the course content?

The topics include connecting to a WAN, implementing network security, network types, network media, routing and switching fundamentals, the TCP/IP and OSI models, IP addressing, WAN technologies, operating and configuring IOS devices, extending switched networks with VLANs, determining IP routes, managing IP traffic with access lists, and establishing point-to-point connections.

What is the course Duration?

The course lasts for 40 hours with 2 classes per week.

What is the course Methodology?

The course is primarily based on practical sessions with an apt degree of theoretical classes.

What is the course Prerequisites?

10+2 along with a basic aptitude and understanding of computer hardware knowledge.

What is the career path after doing this course?

In order to maintain ultimate cyber security for corporate networking component is the most important aspect of IT infrastructure. Thus the demand for trained CCNA practitioners is soaring highest in the market for IT jobs for data security. Hence plush security jobs in IT departments of corporate houses are the alluring future of CCNA aspirants.

What is the next step after doing CCNA Essentials?

You can upgrade yourself in CISCO approved security skill development courses like CCNP, CCIE etc.

Enroll Now

Fields marked with * are mandatory.

Online Interactive Classroom with dedicated Faculty

Course Fees

Rs.23,000/-Rs.13,000/-
Inclusive of all taxes

Batches
Weekday Batches:
Reg. Date
Start Date
End Date
04
Sep, 2021
06
Sep, 2021
10
Nov, 2021
08
Sep, 2021
10
Sep, 2021
19
Nov, 2021
22
Sep, 2021
24
Sep, 2021
03
Dec, 2021
28
Sep, 2021
30
Sep, 2021
09
Dec, 2021
Weekend Batches:
Reg. Date
Start Date
End Date
02
Sep, 2021
04
Sep, 2021
13
Nov, 2021
16
Sep, 2021
18
Sep, 2021
27
Nov, 2021
24
Sep, 2021
26
Sep, 2021
28
Nov, 2021
Pay Now

Member of:

NASSCOM
Data Security Council of India