
1. **Charts and Graphs**
2. Physical
2.1. Devices
2.1.1. Routers
2.1.2. Cables
2.1.2.1. Rollover Cable
2.1.3. Switches
2.1.3.1. WAN Switch
2.1.3.2. Vritual Switch
2.1.4. Virtualization Devices
2.1.4.1. Nexus 1000v
2.1.4.2. Hypervisors
2.1.5. Ethernet
2.1.5.1. IEEE Auto-negotiation
2.1.5.2. Cross-Over Cable Connections
2.1.5.3. Duplex Options
2.1.6. Interfaces
2.2. Topology
2.2.1. Wireless Networks
2.2.1.1. WLC, Wireless LAN Controller
2.2.1.1.1. WLC Ports/Interfaces
2.2.1.1.2. Configuration
2.2.1.2. Wireless Network Security
2.2.1.2.1. WPA, Wi-Fi Protected Access
2.2.1.2.2. Integrity
2.2.1.2.3. Encryption Protocols
2.2.1.2.4. Authentication
2.2.1.3. Wireless Architectures
2.2.1.3.1. Lightweight APs
2.2.1.3.2. Overview
2.2.1.4. Wireless Fundamentals
2.2.1.4.1. Overview
2.2.2. Data Centers
2.2.3. SOHO Networks
2.2.4. WAN Architectures
2.2.4.1. WAN QoS
2.2.4.2. Overview
2.2.4.2.1. Lab
2.2.4.2.2. MPLS VPN Layers
2.2.4.3. Private WAN
2.2.4.3.1. Leased Lines
2.2.4.3.2. Metro Ethernet Services
2.2.4.3.3. MPLS Networks
2.2.5. LAN Architectures
2.2.5.1. Spine-Leaf Architecture
2.2.5.2. 3-Tier Campus Design
2.2.5.3. 2-Tier Campus Design
2.2.6. Access/ Distribution Layer Switches
2.3. Software
2.3.1. IOX-XE
3. Configurations Summaries
3.1. Troubleshooting
3.2. Layer 2
3.2.1. PPP, Point-to-Point Protocol
3.2.1.1. PPPoE, PPP over Ethernet
3.2.1.1.1. CHAP Authentication
3.2.1.2. MLPPP, Multilink PPP
3.2.1.2.1. CHAP Authentication
3.2.1.2.2. PAP Authentication
3.2.1.3. CHAP, Challenge Handshake Authentication Protocol
3.2.1.4. PAP, Password Authentication Protocol
3.2.2. Etherchannel
3.2.2.1. LACP, Link Aggregation Control Protocol
3.2.2.2. Static Etherchannel
3.2.2.3. PAgP, Port Aggregation Protocol
3.2.3. Switches
3.2.3.1. MAC Address Table
3.2.4. STP, Spannting Tree Protocol
3.2.4.1. Global Configuration
3.2.4.2. STP Toolkit
3.2.5. VLAN, Virtual LANs
3.2.5.1. Inter-VLAN Routing
3.2.5.1.1. SVI, Switch Virtual Interface
3.2.5.1.2. Sub-Interfaces
3.2.5.1.3. ROAS, Router on a Stick
3.2.5.2. VTP, VLAN Trunking Protocol
3.2.5.3. Trunks
3.2.6. Serial Connections
3.2.6.1. DTE/DCE
3.2.7. CDP, Cisco Discovery Protocol
3.2.7.1. LLDC, Link Layer Discovery Protocol
3.3. Layer 3
3.3.1. Routing
3.3.1.1. Routing Protocols
3.3.1.1.1. BGP, Border Gateway Protocol
3.3.1.1.2. OSPF
3.3.1.1.3. EIGRP
3.3.1.1.4. RIP
3.3.1.2. Default Routes
3.3.1.3. Static Routes
3.3.1.3.1. Floating Static Route
3.3.2. IP Address Configuration
3.3.2.1. IPv6
3.3.2.1.1. Static Route Configuration
3.3.2.1.2. SLAAC
3.3.3. Loopback Interface
3.3.4. Pinging/ICMP
3.3.4.1. TraceRoute
3.4. Network Management
3.4.1. FHRP, First Hop Redundancy Protocol
3.4.1.1. HSRP, Hot Standby Routing Protocol
3.4.2. Syslog
3.4.3. Static NAT, Network Address Translation
3.4.3.1. Dynamic NAT
3.4.3.1.1. PAT, Port Address Translation
3.4.4. DHCP, Dynamic Host Configuration Protocol
3.4.4.1. DNS, Domain Name System
3.4.4.2. PC Commands
3.4.5. NTP, Network Time Protocol
3.4.6. VTY, Virtual Teletype Lines
3.4.6.1. Line Timeout
3.4.7. SSH
3.4.7.1. PC Commands
3.4.7.2. DNS Domain Name
3.4.8. Telnet
3.4.8.1. SVI, Switch Virtual Interface
3.5. Console Port
3.5.1. Console Port Passwords
3.5.1.1. Login Local
3.6. Security
3.6.1. SPAN, Switched Port Analyzer
3.6.2. GRE Tunnel
3.6.3. ACL, Access Control List
3.6.3.1. VTY line ACL
3.6.3.2. Extended ACL
3.6.3.2.1. Named Extended ACL
3.6.3.3. Standard ACL
3.6.3.3.1. Named Standard ACL
3.6.4. Port Security
3.6.4.1. Static MAC Addresses
3.6.4.2. Sticky MAC Addresses
3.6.5. Users
3.6.6. Passwords
3.6.6.1. Passowrd Recovery
3.6.6.2. Enable Password
3.6.6.3. Enable Secret
3.6.6.4. Service Password Encryption
3.7. Startup
3.7.1. Saving Configurations To External Servers
3.7.2. System Configuration Dialogue
3.7.3. Banner
3.7.4. Configuring Hostnames
3.7.5. Reload
3.8. Running Configuration
3.8.1. Device Version
3.8.1.1. Updating IOS from TFTP server
3.8.1.2. Exporting IOS to TFTP server
3.8.2. Saving The Running Configuration
4. Networking/ Logical Topology
4.1. Network Automation
4.1.1. Cisco DevNet
4.1.1.1. DNA, Digital Network Architecture Center
4.1.1.1.1. Day Deployment Network Management.
4.1.2. Configuration Management
4.1.2.1. Chef
4.1.2.2. Puppet
4.1.2.3. Ansible
4.1.3. Data Serialization
4.1.3.1. YAML, YAML Ain't Markup Language
4.1.3.2. XML, Extensible Markup Langauge
4.1.3.3. JSON, JavaScript Object Notation
4.1.4. SDN, Software Defined Networking
4.1.4.1. SD-Access
4.1.4.1.1. Fabric
4.1.4.1.2. ACI, Application Centric Infrastructure
4.1.4.2. APIs, Application Programming Interfaces
4.1.4.2.1. SBI, Southbound Interface
4.1.4.2.2. NBI, Northbound Interface
4.1.4.2.3. REST APIs
4.2. Virtualization & Cloud
4.2.1. VRF, Virtual Routing & Forwarding
4.2.1.1. Overview
4.2.2. Containers
4.2.2.1. Overview
4.2.3. Overview
4.2.3.1. Virtual Machines
4.2.3.2. Cloud Services
4.2.3.2.1. 5 Cloud Services Characteristics
4.2.4. Cloud Migration
4.2.4.1. Intercloud Exchange
4.3. NAT, Network Address Translation
4.3.1. Dynamic NAT
4.3.1.1. Command Summary
4.3.1.2. Dynamic PAT, Port Address Translation/ NAT Overload
4.3.1.2.1. Configuration
4.3.1.3. Configuration
4.3.2. Static NAT
4.3.2.1. Command Summary
4.3.2.2. Configuration
4.3.2.2.1. Outside Local/ Global
4.3.2.2.2. Inside Local/ Global
4.4. NTP, Network Time Protocol
4.4.1. Authoritative Sources
4.4.2. Daylight Saving Time/ SummerTime
4.4.3. Time Zone
4.4.4. NTP Servers/ Clients
4.4.4.1. NTP Heirarchy
4.4.4.2. Reference Clock
4.4.5. Configuration
4.4.5.1. NTP Authentication
4.4.5.2. Symmetric Active Mode
4.4.5.3. Software/ Hardware Clock
4.5. Network Management/ Monitoring
4.5.1. Syslog
4.5.1.1. Syslog Logging Locations
4.5.1.2. Syslog Message Format
4.5.1.2.1. Severity Levels
4.5.1.3. Configuration
4.5.1.3.1. Service Timestamps & Sequence Numbers
4.5.1.3.2. Logging Synchronous
4.5.2. SNMP, Simple Network Management Protocol
4.5.2.1. SNMP Messages
4.5.2.1.1. Response
4.5.2.1.2. Notification
4.5.2.1.3. Write
4.5.2.1.4. Read
4.5.2.2. SNMP Components
4.5.2.2.1. SNMP Agents
4.5.2.2.2. SNMP Managers
4.5.2.3. Configuration
4.5.2.4. Versions
4.5.3. DHCP, Dynamic Host Configuration Protocol
4.5.3.1. DHCP Relay
4.5.3.2. DHCP Leasing/ Releasing
4.5.3.2.1. DHCP Ack
4.5.3.2.2. DHCP Request
4.5.3.2.3. DHCP Offer
4.5.3.2.4. DHCP Discover
4.5.3.3. DHCP Client
4.5.3.4. DHCP Server
4.5.3.5. PC Commands
4.5.4. DNS, Domain Name System
4.5.4.1. DNS Record Types
4.5.4.2. DNS Cache
4.5.4.3. Configuration
4.5.4.3.1. DNS Client
4.5.4.3.2. DNS Sever
4.5.5. VTY, Virtual Teletype Connections
4.5.5.1. Console Port Security
4.5.5.1.1. Login Local
4.5.5.2. Telnet
4.5.5.3. SSH, Secure Shell
4.5.5.3.1. Configuration
4.6. Logical
4.6.1. AS, Autonomous System
4.6.2. Redundancy
4.6.2.1. **FHRP, First Hop Redundancy Protocols**
4.6.2.1.1. **Groups/ Load-Balancing**
4.6.2.1.2. Versions
4.6.2.1.3. Gratuitous ARP Replies
4.6.2.1.4. VIP/ VMAC
4.6.2.1.5. Active/Standby Dynamic
4.6.2.1.6. Commands
4.6.3. Logical Planes
4.6.3.1. Management Plane
4.6.3.2. Control Plane
4.6.3.3. Data/Forwarding Plane
4.6.3.3.1. ASIC, Application Specific Integrated Circuit Chips
4.6.4. OSI Model, TCP IP Suite
4.6.4.1. PDU
4.6.4.2. Encapsulation/ De-Encapsulation
4.7. Topology
4.7.1. BGR
4.7.2. Segment
5. Quiz
5.1. 20 - 29
5.1.1. Day 28 - OSPF part 3
5.1.2. Day 29 - FHRP
5.2. 30 - 39
5.2.1. Day 38 - DNS
5.2.2. Day 39 - DHCP
5.2.3. Day 34 - Standard ACLs
5.2.4. Day 35 - Extended ACLs
5.2.5. Day 36 - CDP & LLDP
5.2.6. Day 37 - NTP
5.2.7. Day 30 - TCP & UDP
5.2.8. Day 31 - IPv6 part 1
5.2.9. Day 32 - IPv6 part 2
5.2.10. Day 33 - IPv6 part 3
5.3. 40 - 49
5.3.1. Day 48 - Security Fundamentals
5.3.2. Day 49 - Port Security
5.3.3. Day 44 - NAT part 1
5.3.4. Day 45 - NAT part 2
5.3.5. Day 46 - QoS part 1
5.3.6. Day 47 - QoS part 2
5.3.7. Day 40 - SNMP
5.3.8. Day 41 - Syslog
5.3.9. Day 42 - SSH
5.3.10. Day 43 - FTP & TFTP
5.4. 50 - 59
5.4.1. 56 - Wireless Architecture
5.4.2. 57 - Wireless Secuirty
5.4.3. 58 - Wireless Configuration
5.4.4. 59 - Network Automation
5.4.5. 54 part 1 - Virtualization & Cloud
5.4.6. 54 part 2 - Containers
5.4.7. 54 part 3 - Virtual Routing & Forwarding
5.4.8. 55 - Wireless Fundamentals
5.4.9. 50 - DHCP Snooping
5.4.10. 51 - Dynamic ARP Inspection
5.4.11. 52 - LAN Architectures
5.4.12. 53 - WAN Architecture
5.5. 60 - 63
5.5.1. Day 60 - Data Serialization Formats, JSON, XML, & YAML
5.5.2. Day 61 - REST APIs
5.5.3. Day 62 - SDN, Software-Defined Networking
5.5.4. Day 63 - Ansible, Puppet, Chef
6. Layer 2
6.1. MAC Addresses
6.1.1. UAA
6.1.2. LAA
6.1.3. OUI, Orgnizationally Unique Identifier
6.2. Numbering Systems
6.2.1. Hexadecimal
6.3. Ping/ICMP
6.3.1. Trace Route
6.4. Discovery Protocols
6.4.1. CDP, Cisco Discovery Protocol
6.4.2. LLDP, Link Layer Discovery Protocol
6.5. VLANs
6.5.1. VTP, VLAN Trunking Protocol
6.6. Ethernet
7. Routers
7.1. Configuring Routers
7.1.1. Setup/Startup
7.1.1.1. Troubleshooting
7.1.1.2. Initial Setup
7.1.1.2.1. Users/ Usernames
7.1.2. Interfaces
7.1.2.1. Loopback Interfaces
7.1.3. Addressing & Subnets
7.1.3.1. Broadcast Addresses
7.2. ISR, Integrated Services Router
7.2.1. License
7.3. Serial Connections/ Interfaces
7.3.1. DCE/ DTE
7.3.1.1. DCE
7.3.1.2. DTE
7.4. Routing Protocols
7.4.1. Routing Types
7.4.1.1. IGP
7.4.1.1.1. Distance Vector
7.4.1.1.2. Link State
7.4.1.2. EGP
7.4.1.2.1. Path Vector
7.4.2. Administrative Distance
7.5. IP Connectivity
7.5.1. IPv4
7.5.1.1. Static Route
7.5.1.1.1. Floating Static Route
7.5.1.2. Private IPv4 Addresses
7.5.2. IPv6
7.5.2.1. Commands
7.5.2.2. IPv6 Header
7.5.2.3. Specialized IPv6 Address Types
7.5.2.3.1. Demonstration Addresses
7.5.2.3.2. Link-Local Addresses
7.5.2.3.3. Global Unicast Address
7.5.2.3.4. Unique Local Address
7.5.2.3.5. Multicast Addresses
7.5.2.3.6. Anycast
7.5.2.3.7. Unspecified Address
7.5.2.3.8. Loopback Address
7.5.2.3.9. Routing Schemes
7.5.2.4. Configuring IPv6 Addresses
7.5.2.4.1. Static Route(ing)
7.5.2.5. EUI-64
7.5.2.5.1. IPv6 Subnetting
7.5.2.6. IPv6 Advanced Features
7.5.2.7. NDP, Neighbor Discovery Protocol
7.5.2.7.1. NS, Neighbor Solicitation messages
7.5.2.7.2. NA, Neighbor Advertisement
7.5.2.7.3. IPv6 Neighbor Table
7.5.2.7.4. DAD, Duplicate Address Detection
7.5.2.8. OSPFv3
7.5.3. IANA/ RIR
7.6. Broadcast/ Multicast Addresses
8. Switches
8.1. Layer 2 Switches
8.1.1. VLANs
8.1.1.1. VTP, VLAN Trunking Protocol
8.1.1.2. VLAN Domains
8.1.1.3. Native VLAN
8.1.2. Management IP Address
8.1.3. ARP, Address Resolution Protocol
8.1.3.1. Broadcast Messaegs
8.1.3.2. Broadcast Storms
8.1.4. STP, Spanning Tree Protocol
8.1.4.1. Election Process
8.1.4.1.1. Bridges
8.1.4.1.2. Ports
8.1.4.2. STP Versions
8.1.4.2.1. PVST, Per-VLAN Spanning Tree Protocol
8.1.4.2.2. RSTP, Rapid Spanning Tree Protocol
8.1.4.3. Bridge Priority
8.1.4.4. STP Toolkit
8.1.4.4.1. BPDU Guard
8.1.4.4.2. Portfast
8.1.4.4.3. Root/Loop Guard
8.1.4.5. STP Costs
8.1.4.5.1. STP Pathcost Mode
8.1.5. ROAS, Router On a Stick
8.1.6. Ethernet
8.2. Layer 3 Switches
9. Security Fundamentals
9.1. Physical
9.1.1. Port Security
9.1.1.1. Command Summary
9.1.1.2. Configuration
9.1.1.2.1. Secure MAC Addresses Aging
9.1.1.2.2. Sticky Secure MAC addresses
9.1.1.2.3. Secure Table
9.1.1.3. Violation Modes
9.1.1.4. Re-Enabling Interfaces
9.1.1.4.1. Manual
9.1.1.4.2. ErrDisable Recovery
9.1.2. DHCP Snooping
9.1.2.1. Common Attacks
9.1.2.2. Message Filtering
9.1.2.3. Command Summary
9.1.2.4. Configuration
9.1.2.4.1. Rogue DHCP Servers
9.1.2.4.2. Option 82
9.1.2.5. Trusted/ Untrusted Ports
9.1.2.6. Rate Limiting
9.1.3. Passwords
9.1.3.1. Password Recovery
9.1.4. ACL Access Control Lists
9.1.4.1. Resequencing ACLs
9.1.4.2. ACL Ranges
9.1.4.3. Standard ACLs
9.1.4.3.1. Standard numbered ACLs
9.1.4.3.2. Standard named ACLs
9.1.4.4. Extended ACLs
9.1.4.4.1. Extended numbered ACLs
9.1.4.4.2. Extended named ACLS
9.1.4.5. ACL Configuration Mode
9.1.4.6. APIC-EM Path Trace ACL Analysis Tool
9.1.5. Next Generation IPS, Intrusion Prevention System
9.1.5.1. Traditional IPS
9.1.6. DAI, Dynamic ARP Inspection
9.1.6.1. Rate Limiting
9.1.6.2. Command Summary
9.1.6.3. Attacks
9.1.6.3.1. ARP Poisoning
9.1.6.4. Inspection Process
9.1.6.4.1. Inspection Validation
9.1.6.5. Configuration
9.1.6.5.1. ARP ACLs
9.1.7. Firewall
9.1.7.1. Stateful
9.1.7.2. Stateless
9.2. Logical
9.2.1. Security Zones
9.2.1.1. Guest Zone
9.2.1.2. DMZ, Demilitarized Zone
9.2.1.3. Inside Zone
9.2.1.4. Outside Zone
9.2.1.5. Management Zone
9.2.2. CIA Triad
9.2.3. Authentication
9.2.3.1. AAA Framework
9.2.3.1.1. Cisco ISE, Identity Services Engine
9.2.3.2. Multi-Factor Authentication
9.2.3.3. Security Program Elements
9.2.3.4. Digital Certificates
9.2.4. Common Attacks
9.2.4.1. Social Engineering
9.2.4.2. Password-Related
9.2.4.3. Man-In-the-Middle
9.2.4.4. Reconnaissance
9.2.4.5. Malware
9.2.4.6. DoS, Denial of Service
9.2.4.7. Spoofing
9.2.4.8. Reflection/ Amplification
10. Layer 4
10.1. QoS, Quality of Service
10.1.1. Standards
10.1.2. Configuration
10.1.3. Voice Traffic
10.1.3.1. IP Phones
10.1.3.1.1. Voice VLANs
10.1.3.1.2. POE, Power Over Ethernet
10.1.4. Queueing/ Tail Dropping
10.1.4.1. Congestion Management
10.1.4.1.1. RR/ WRR/ CBWFQ
10.1.4.2. RED/ WRED
10.1.4.3. LLQ, Low Latency Queue
10.1.4.4. Shaping/ Policing
10.1.5. Classification
10.1.5.1. PCP/ CoS
10.1.5.2. IP ToS Byte
10.1.5.2.1. DSCP Mark Breakdown
10.1.5.2.2. RFC 4954 Standard
10.1.5.3. Trust Boundaries
10.2. TCP & UDP
10.2.1. FTP & TFTP
10.2.1.1. IOS File Systems
10.2.1.2. Command Summary
10.2.1.3. IOS Upgrading
10.2.1.3.1. Using TFTP
10.2.1.3.2. Using FTP
10.2.1.4. FTP, File Transer Protocol
10.2.1.4.1. FTP Connections
10.2.1.4.2. FTPS, FTP Secure
10.2.1.5. TFTP, Trivial File Transfer Protocol
10.2.1.5.1. TFTP Relability
10.2.1.5.2. TFTP TID, Transfer Identifier
10.2.1.5.3. Phases
10.2.2. TCP, Transmission Control Protocol
10.2.2.1. Flow Control
10.2.2.2. TCP Header
10.2.2.3. Connections
10.2.2.3.1. Retransmission
10.2.2.4. Sequencing
10.2.3. UDP, User Datagram Protocol
10.2.3.1. UDP Header
10.2.4. Port Numbers
10.3. Session Multiplexing
10.4. Port Number Ranges
10.4.1. Web Server/Client Communication