If you do well in this course, you will be able to:
- Configure devices using security best practices.
- Explain how Layer 2 switches forward data.
- Implement VLANs and trunking in a switched network.
- Troubleshoot inter-VLAN routing on Layer 3 devices.
- Explain how STP enables redundancy in a layer 2 network.
- Troubleshoot EtherChannel on switched networks.
- Implement DHCPv4 to operate across multiple LANs.
- Configure dynamic address allocation in IPv6 networks.
- Explain how FHRPs provide default gateway services in a redundant network.
- Explain how vulnerabilities compromise LAN security.
- Configure switch security to mitigate LAN attacks.
- Explain how WLANs enable network connectivity.
- Implement a WLAN using a wireless router and a WLC.
- Explain how routers use information in packets to make forwarding decisions.
- Configure IPv4 and IPv6 static routes.
- Troubleshoot static and default routes.