CCNA Objectives and Exam Topics
Below are the CCNA objectives (and their respective tags), according to Cisco's site as of 11/11/2023.
- Network Fundamentals (20%)
- Network Access (20%)
- IP Connectivity (25%)
- IP Services (10%)
- Security Fundamentals (15%)
- Automation and Programmability (10%)
I have currently linked files up to extops-4-7. Topics that should be covered but are currently without any linked files are highlighted.
Note: This does not mean the articles don't already exist, just that they have not been linked here.
| Tag | Topic |
|---|---|
| #extop-1-1 | Explain the role and function of network components |
| #extop-1-2 | Describe characteristics of network topology architectures |
| #extop-1-3 | Compare physical interface and cabling types |
| #extop-1-4 | Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed) |
| #extop-1-5 | Compare TCP and UDP |
| #extop-1-6 | Configure and verify IPv4 addressing and subnetting |
| #extop-1-7 | Describe the need for private IPv4 addressing |
| #extop-1-8 | Configure and verify IPv6 addressing and prefix |
| #extop-1-9 | Describe IPv6 address types |
| #extop-1-10 | Verify the IP parameters for Client OS (Windows, Mac OS, Linux) |
| #extop-1-11 | Describe wireless principles |
| #extop-1-12 | Explain virtualization fundamentals (server virtualization, containers, and VRFs) |
| #extop-1-13 | Describe switching concepts |
| #extop-2-1 | Configure and verify VLANs (normal range) spanning multiple switches |
| #extop-2-2 | Configure and verify interswitch connectivity |
| #extop-2-3 | Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP) |
| #extop-2-4 | Configure and verify (Layer 2/Layer 3) EtherChannel (LACP) |
| #extop-2-5 | Interpret basic operations of Rapid PVST+ Spanning Tree Protocol |
| #extop-2-6 | Describe Cisco Wireless Architectures and AP modes |
| #extop-2-7 | Describe physical infrastructure connections of WLAN components (AP, WLC, access/trunk ports, and LAG) |
| #extop-2-8 | Describe AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, console, and TACACS+/RADIUS) |
| #extop-2-9 | Interpret the wireless LAN GUI configuration for client connectivity, such as WLAN creation, security settings, QoS profiles, and advanced settings |
| #extop-3-1 | Interpret the components of routing table |
| #extop-3-2 | Determine how a router makes a forwarding decision by default |
| #extop-3-3 | Configure and verify IPv4 and IPv6 static routing |
| #extop-3-4 | Configure and verify single area OSPFv2 |
| #extop-3-5 | Describe the purpose, functions, and concepts of first hop redundancy protocols |
| #extop-4-1 | Configure and verify inside source NAT using static and pools |
| #extop-4-2 | Configure and verify NTP operating in a client and server mode |
| #extop-4-3 | Explain the role of DHCP and DNS within the network |
| #extop-4-4 | Explain the function of SNMP in network operations |
| #extop-4-5 | Describe the use of syslog features including facilities and levels |
| #extop-4-6 | Configure and verify DHCP client and relay |
| #extop-4-7 | Explain the forwarding per-hop behavior (PHB) for QoS, such as classification, marking, queuing, congestion, policing, and shaping |
| #extop-4-8 | Configure network devices for remote access using SSH |
| #extop-4-9 | Describe the capabilities and functions of TFTP/FTP in the network |
| #extop-5-1 | Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques) |
| #extop-5-2 | Describe security program elements (user awareness, training, and physical access control) |
| #extop-5-3 | Configure and verify device access control using local passwords |
| #extop-5-4 | Describe security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics) |
| #extop-5-5 | Describe IPsec remote access and site-to-site VPNs |
| #extop-5-6 | Configure and verify access control lists |
| #extop-5-7 | Configure and verify Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security) |
| #extop-5-8 | Compare authentication, authorization, and accounting concepts |
| #extop-5-9 | Describe wireless security protocols (WPA, WPA2, and WPA3) |
| #extop-5-10 | Configure and verify WLAN within the GUI using WPA2 PSK |
| #extop-6-1 | Explain how automation impacts network management |
| #extop-6-2 | Compare traditional networks with controller-based networking |
| #extop-6-3 | Describe controller-based, software defined architecture (overlay, underlay, and fabric) |
| #extop-6-4 | Compare traditional campus device management with Cisco DNA Center enabled device management |
| #extop-6-5 | Describe characteristics of REST-based APIs (CRUD, HTTP verbs, and data encoding) |
| #extop-6-6 | Recognize the capabilities of configuration management mechanisms Puppet, Chef, and Ansible |
| #extop-6-7 | Recognize components of JSON-encoded data |