1. **Charts and Graphs**
2. Quiz
2.1. 20 - 29
2.1.1. Day 28 - OSPF part 3
2.1.2. Day 29 - FHRP
2.2. 30 - 39
2.2.1. Day 30 - TCP & UDP
2.2.2. Day 31 - IPv6 part 1
2.2.3. Day 32 - IPv6 part 2
2.2.4. Day 33 - IPv6 part 3
2.2.5. Day 34 - Standard ACLs
2.2.6. Day 35 - Extended ACLs
2.2.7. Day 36 - CDP & LLDP
2.2.8. Day 37 - NTP
2.2.9. Day 38 - DNS
2.2.10. Day 39 - DHCP
2.3. 40 - 49
2.3.1. Day 40 - SNMP
2.3.2. Day 41 - Syslog
2.3.3. Day 42 - SSH
2.3.4. Day 43 - FTP & TFTP
2.3.5. Day 44 - NAT part 1
2.3.6. Day 45 - NAT part 2
2.3.7. Day 46 - QoS part 1
2.3.8. Day 47 - QoS part 2
2.3.9. Day 48 - Security Fundamentals
2.3.10. Day 49 - Port Security
2.4. 50 - 59
2.4.1. 50 - DHCP Snooping
2.4.2. 51 - Dynamic ARP Inspection
2.4.3. 52 - LAN Architectures
2.4.4. 53 - WAN Architecture
2.4.5. 54 part 1 - Virtualization & Cloud
2.4.6. 54 part 2 - Containers
2.4.7. 54 part 3 - Virtual Routing & Forwarding
2.4.8. 55 - Wireless Fundamentals
2.4.9. 56 - Wireless Architecture
2.4.10. 57 - Wireless Secuirty
3. Networking/ Logical Topology
3.1. Topology
3.1.1. Segment
3.1.2. BGR
3.2. Logical
3.2.1. OSI Model, TCP Suite
3.2.1.1. PDU
3.2.2. Redundancy
3.2.2.1. **FHRP, First Hop Redundancy Protocols**
3.2.2.1.1. Commands
3.2.2.1.2. Active/Standby Dynamic
3.2.2.1.3. VIP/ VMAC
3.2.2.1.4. Gratuitous ARP Replies
3.2.2.1.5. Versions
3.2.2.1.6. **Groups/ Load-Balancing**
3.2.3. AS, Autonomous System
3.3. Network Management/ Monitoring
3.3.1. VTY, Virtual Teletype Connections
3.3.1.1. SSH, Secure Shell
3.3.1.1.1. Configuration
3.3.1.2. Telnet
3.3.1.3. Console Port Security
3.3.1.3.1. Login Local
3.3.2. DNS, Domain Name System
3.3.2.1. Configuration
3.3.2.1.1. DNS Sever
3.3.2.1.2. DNS Client
3.3.2.2. DNS Cache
3.3.2.3. DNS Record Types
3.3.3. DHCP, Dynamic Host Configuration Protocol
3.3.3.1. PC Commands
3.3.3.2. DHCP Server
3.3.3.3. DHCP Client
3.3.3.4. DHCP Leasing/ Releasing
3.3.3.4.1. DHCP Discover
3.3.3.4.2. DHCP Offer
3.3.3.4.3. DHCP Request
3.3.3.4.4. DHCP Ack
3.3.3.5. DHCP Relay
3.3.4. SNMP, Simple Network Management Protocol
3.3.4.1. Versions
3.3.4.2. Configuration
3.3.4.3. SNMP Components
3.3.4.3.1. SNMP Managers
3.3.4.3.2. SNMP Agents
3.3.4.4. SNMP Messages
3.3.4.4.1. Read
3.3.4.4.2. Write
3.3.4.4.3. Notification
3.3.4.4.4. Responce
3.3.5. Syslog
3.3.5.1. Configuration
3.3.5.1.1. Logging Synchronous
3.3.5.1.2. Service Timestamps & Sequence Numbers
3.3.5.2. Syslog Message Format
3.3.5.2.1. Severity Levels
3.3.5.3. Syslog Logging Locations
3.4. NTP, Network Time Protocol
3.4.1. Configuration
3.4.1.1. Software/ Hardware Clock
3.4.1.2. Symmetric Active Mode
3.4.1.3. NTP Authentication
3.4.2. NTP Servers/ Clients
3.4.2.1. Reference Clock
3.4.2.2. NTP Heirarchy
3.4.3. Time Zone
3.4.4. Daylight Saving Time/ SummerTime
3.4.5. Authoritative Sources
3.5. NAT, Network Address Translation
3.5.1. Static NAT
3.5.1.1. Configuration
3.5.1.1.1. Inside Local/ Global
3.5.1.1.2. Outside Local/ Global
3.5.1.2. Command Summary
3.5.2. Dynamic NAT
3.5.2.1. Configuration
3.5.2.2. Dynamic PAT, Port Address Translation/ NAT Overload
3.5.2.2.1. Configuration
3.5.2.3. Command Summary
3.6. Virtualization & Cloud
3.6.1. Overview
3.6.2. Containers
3.6.2.1. Overview
3.6.3. VRF, Virtual Routing & Forwarding
3.6.3.1. Overview
4. Physical
4.1. Software
4.2. Topology
4.2.1. Access/ Distribution Layer Switches
4.2.2. LAN Architectures
4.2.2.1. 2-Tier Campus Design
4.2.2.2. 3-Tier Campus Design
4.2.2.3. Spine-Leaf Architecture
4.2.3. WAN Architectures
4.2.3.1. Leased Lines
4.2.3.2. Overview
4.2.3.2.1. Lab
4.2.4. SOHO Networks
4.2.5. Data Centers
4.2.6. Wireless Networks
4.2.6.1. Wireless Fundamentals
4.2.6.1.1. Overview
4.2.6.2. Wireless Architectures
4.2.6.2.1. Overview
4.2.6.2.2. Lightweight APs
4.2.6.3. Wireless Network Security
4.2.6.3.1. Authentication
4.2.6.3.2. Encryption Protocols
4.2.6.3.3. Integrity
4.2.6.3.4. WPA, Wi-Fi Protected Access
4.2.6.4. WLC, Wireless LAN Controller
4.2.6.4.1. Configuration
5. Layer 2
5.1. MAC Addresses
5.1.1. UAA
5.1.2. LAA
5.2. Numbering Systems
5.2.1. Hexadecimal
5.3. Pinging
5.3.1. Trace Route
5.4. Discovery Protocols
5.4.1. CDP, Cisco Discovery Protocol
5.4.2. LLDP, Link Layer Discovery Protocol
6. Layer 4
6.1. TCP & UDP
6.1.1. TCP, Transmission Control Protocol
6.1.1.1. TCP Header
6.1.1.2. Connections
6.1.1.2.1. Retransmission
6.1.1.3. Sequencing
6.1.1.4. Flow Control
6.1.2. UDP, User Datagram Protocol
6.1.2.1. UDP Header
6.1.3. Port Numbers
6.1.4. FTP & TFTP
6.1.4.1. IOS Upgrading
6.1.4.1.1. Using TFTP
6.1.4.1.2. Using FTP
6.1.4.2. FTP, File Transer Protocol
6.1.4.2.1. FTP Connections
6.1.4.3. TFTP, Trivial File Transfer Protocol
6.1.4.3.1. TFTP Relability
6.1.4.3.2. TFTP TID, Transfer Identifier
6.1.4.3.3. Phases
6.1.4.4. IOS File Systems
6.1.4.5. Command Summary
6.2. Session Multiplexing
6.3. Port Numbers
6.4. QoS, Quality of Service
6.4.1. Voice Traffic
6.4.1.1. IP Phones
6.4.1.1.1. Voice VLANs
6.4.1.1.2. POE, Power Over Ethernet
6.4.2. Queueing/ Tail Dropping
6.4.2.1. RED/ WRED
6.4.2.2. LLQ, Low Latency Queue
6.4.2.3. Shaping/ Policing
6.4.2.4. Congestion Management
6.4.2.4.1. RR/ WRR/ CBWFQ
6.4.3. Classification
6.4.3.1. PCP/ CoS
6.4.3.2. IP ToS Byte
6.4.3.2.1. DSCP Mark Breakdown
6.4.3.2.2. RFC 4954 Standard
6.4.3.3. Trust Boundaries
6.4.4. Standards
6.4.5. Configuration
7. Switches
7.1. Layer 2 Switches
7.1.1. VLANs
7.1.1.1. VTP, VLAN Trunking Protocol
7.1.1.2. VLAN Domains
7.1.1.3. Native VLAN
7.1.2. Management IP Address
7.1.3. ARP, Address Resolution Protocol
7.1.3.1. Broadcast Messaegs
7.1.3.2. Broadcast Storms
7.1.4. STP, Spanning Tree Protocol
7.1.4.1. PVST, Per-VLAN Spanning Tree Protocol
7.1.4.2. Election Process
7.1.4.2.1. Bridges
7.1.4.2.2. Ports
7.1.5. ROAS, Router On a Stick
7.2. Layer 3 Switches
8. Security Fundamentals
8.1. Physical
8.1.1. ACL Access Control Lists
8.1.1.1. Standard ACLs
8.1.1.1.1. Standard numbered ACLs
8.1.1.1.2. Standard named ACLs
8.1.1.2. Extended ACLs
8.1.1.2.1. Extended numbered ACLs
8.1.1.2.2. Extended named ACLS
8.1.1.3. ACL Configuration Mode
8.1.1.4. Resequencing ACLs
8.1.1.5. ACL Ranges
8.1.2. Dynamic ARP Inspection
8.1.2.1. Attacks
8.1.2.1.1. ARP Poisoning
8.1.2.2. Inspection Process
8.1.2.2.1. Inspection Validation
8.1.2.3. Configuration
8.1.2.3.1. ARP ACLs
8.1.2.4. Rate Limiting
8.1.2.5. Command Summary
8.1.3. Port Security
8.1.3.1. Configuration
8.1.3.1.1. Secure MAC Addresses Aging
8.1.3.1.2. Sticky Secure MAC addresses
8.1.3.1.3. Secure Table
8.1.3.2. Violation Modes
8.1.3.3. Re-Enabling Interfaces
8.1.3.3.1. Manual
8.1.3.3.2. ErrDisable Recovery
8.1.3.4. Command Summary
8.1.4. DHCP Snooping
8.1.4.1. Configuration
8.1.4.1.1. Option 82
8.1.4.2. Trusted/ Untrusted Ports
8.1.4.3. Rate Limiting
8.1.4.4. Common Attacks
8.1.4.5. Message Filtering
8.1.4.6. Command Summary
8.2. Logical
8.2.1. CIA Triad
8.2.2. Authentication
8.2.2.1. Multi-Factor Authentication
8.2.2.2. Security Program Elements
8.2.2.3. Digital Certificates
8.2.2.4. AAA Framework
8.2.3. Common Attacks
8.2.3.1. DoS, Denial of Service
8.2.3.2. Spoofing
8.2.3.3. Reflection/ Amplification
8.2.3.4. Man-In-the-Middle
8.2.3.5. Reconnaissance
8.2.3.6. Malware
8.2.3.7. Social Engineering
8.2.3.8. Password-Related
9. Routers
9.1. Configuring Routers
9.1.1. Setup/Startup
9.1.1.1. Troubleshooting
9.1.1.2. Initial Setup
9.1.1.2.1. Users/ Usernames
9.1.2. Interfaces
9.1.2.1. Loopback Interfaces
9.1.3. Addressing & Subnets
9.1.3.1. Broadcast Addresses
9.2. Serial Connections/ Interfaces
9.2.1. DCE/ DTE
9.2.1.1. DCE
9.2.1.2. DTE
9.3. Routing Protocols
9.3.1. Routing Types
9.3.1.1. IGP
9.3.1.1.1. Distance Vector
9.3.1.1.2. Link State
9.3.1.2. EGP
9.3.1.2.1. Path Vector
9.3.2. Administrative Distance
9.3.3. Multicast Addresses
9.4. IP Connectivity
9.4.1. IPv4
9.4.1.1. Static Route
9.4.1.1.1. Floating Static Route
9.4.1.2. Private IPv4 Addresses
9.4.2. IPv6
9.4.2.1. Commands
9.4.2.2. IPv6 Header
9.4.2.3. Specialized IPv6 Addresses
9.4.2.3.1. Link-Local Addresses
9.4.2.3.2. Global Unicast Address
9.4.2.3.3. Unique Local Address
9.4.2.3.4. Multicast Addresses
9.4.2.3.5. Anycast
9.4.2.3.6. Unspecified Address
9.4.2.3.7. Loopback Address
9.4.2.3.8. Routing Schemes
9.4.2.4. Configuring IPv6 Addresses
9.4.2.4.1. Static Route(ing)
9.4.2.5. EUI-64
9.4.2.6. NDP, Neighbor Discovery Protocol
9.4.2.6.1. NS, Neighbor Solicitation messages
9.4.2.6.2. NA, Neighbor Advertisement
9.4.2.6.3. IPv6 Neighbor Table
9.4.2.6.4. DAD, Duplicate Address Detection
9.4.2.7. SLAAC, Stateless Address Auto-Configuration
9.4.2.8. Address Types
9.4.3. IANA/ RIR