<div style="margin:20px 0 0 200px"> To view the site, enable JavaScript by changing your browser options, then <a href="">Try Again</a>.</div>
EC-Council Accredited Training Center

CCNA or Cisco Certified Network Associate is an Information Technology certification from CISCO, the American multinational and leader in IT, networking and cyber security solutions. CCNA certification is an associate level Cisco Career Certification.

The content of the exams is propriety.

The CCNA certification is valid for a period of 3 years. Renewal of the certification requires the present holders to register and pass the same or higher level Cisco re certification exam every 3 years.

The topics include connecting to a WAN, implementing network security, network types, network media, routing and switching fundamentals, the TCP/IP and OSI models, IP addressing, WAN technologies, operating and configuring IOS devices, extending switched networks with VLANs, determining IP routes, managing IP traffic with access lists, and establishing point-to-point connections.

Course Rating

View All Reviews »

Students Enrolled and Counting…

Full List of Alumni »

Why learn CCNA Essentials?

Enhances industry interface. Essential for
Networking Industry

Course Syllabus »

Imparts in depth knowledge of

Provides essential
Networking Knowledge
Ethical Hacking.

Fulfils eligibility for
CCNA Global by CISCO.

Jobs »


40 hours - 2 classes per week



10+2 along with a basic aptitude and understanding of computer hardware knowledge.

Course Fees

Course Fees

Class Room Training

Inclusive of all taxes

Online Training

Inclusive of all taxes

What You Will Get?

40 Hours
in-depth training by Cisco Certified Trainer

Study Materials

CCNA Essentials
Certificate of Completion after examination and alumni status

Course Details

  1. Essential to understand ethical hacking
  2. Prerequisite for CEH
Module 1 2 Hours - 5 Topics
  • Compare and contrast OSI and TCP/IP models (Day 1)
  • Compare and contrast TCP and UDP protocols (Day 1)
  • Compare and contrast network topologies (Day 1)
    1. Star
    2. Mesh
    3. Hybrid
  • Configure, verify and troubleshoot IPv4 addressing and subnetting (Day 1)
  • Compare and contrast IPv4 address types (Day 1)
    1. Unicast
    2. Multicast
    3. Broadcast
  • Describe the need for private IPv4 addressing (Day 2)
  • Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment (Day 2)
  • Configure, verify,and troubleshoot IPv6 addressing (Day 2)
  • Configure and verify IPv6 Stateless Address Auto Configuration (Day 2)
  • Compare and contrast IPv6 address types (Day 2)
    1. Global Unicast
    2. Unique Local
    3. Link Local
    4. Multicast
    5. Modified EUI 64
    6. Autoconfiguration
    7. Anycast
  • Describe and verify switching concepts (Day 3)
    1. MAC learning and aging
    2. Frame switching
    3. Frame flooding
    4. MAC address table
  • Interpret Ethernet frame forma (Day 3)t
  • Troubleshoot interface and cable issues (collisions, errors, duplex, speed) (Day 3)
  • Configure, verify,and troubleshoot VLANs (normal/extended range) spanning multiple switches (Day 4)
    1. Access ports (data and voice)
    2. Default VLAN
  • Configure, verify,and troubleshoot interswitch connectivity (Day 4)
    1. Trunk ports
    2. Add and remove VLANs on a trunk
    3. DTP, VTP (v1&v2), and 802.1Q
    4. Native VLAN
  • Configure, verify,and troubleshoot STP protocols (Day 5)
    1. STP mode (PVST+ and RPVST+)
    2. STP root bridge selection
  • Configure, verify and troubleshoot STP related optional features (Day 5)
    1. Port Fast
    2. BPDU guard
  • Configure and verify Layer 2 protocols (Day 6)
    1. Cisco Discovery Protocol
    2. LLDP
  • Configure, verify,and troubleshoot (Layer 2/Layer 3) EtherChannel (Day 6)
    1. Static
    2. PAGP
    3. LACP
  • Describe the routing concepts (Day 7)
    1. Packet handling along the path through a network
    2. Forwarding decision based on route lookup
    3. Frame rewrite
  • Interpret the components of a routing table (Day 7)
    1. Prefix
    2. Network mask
    3. Next hop
    4. Routing protocol code
    5. Administrative distance
    6. Metric
    7. Gateway of last resort
  • Describe how a routing table is populated by different routing information sources (Day 7)
    1. Admin distance
  • Configure, verify,and troubleshoot inter-VLAN routing (Day 7)
    1. Router on a stick
    2. SVI
  • Compare and contrast static routing and dynamic routing (Day 8)
  • Compare and contrast distance vector and link state routing protocols (Day 8)
  • Compare and contrast interior and exterior routing protocols (Day 8)
  • Configure, verify,and troubleshoot IPv4 and IPv6 static routing (Day 8)
    1. Default Route
    2. Network Route
    3. Host Route
    4. Floating Static
  • Configure, verify,and troubleshoot single area and multi-area OSPFv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs) (Day 9)
  • Configure, verify,and troubleshoot single area and multi-area OSPFv3 for IPv6 (excluding authentication, filtering, manual summarization,redistribution, stub, virtual-link, and LSAs (Day 9)
  • Configure, verify,and troubleshoot EIGRP for IPv4 (excluding authentication, filtering,manual summarization, redistribution,stub) (Day 10)
  • Configure, verify,and troubleshoot EIGRP for IPv6 (excluding authentication,filtering,manual summarization, redistribution, stub) (Day 10)
  • Configure, verify,and troubleshoot RIPv2 for IPv4(excludingauthentication,filtering,manual summarization, redistribution) (Day 11)
  • Troubleshoot basic Layer 3 end-to-end connectivity issues (Day 11)
  • Configure and verify PPP and MLPPP on WAN interfaces using local authentication (Day 12)
  • Configure, verify,and troubleshoot PPPoE client-side interfaces using local authentication (Day 12)
  • Configure, verify,and troubleshoot GRE tunnel connectivity (Day 12)
  • Describe WAN topology options (Day 13)
    1. Point-to-point
    2. Hub and spoke
    3. Full mesh
    4. Single vs dual-homed
  • Describe WAN access connectivity options (Day 13)
    1. MPLS
    4. Internet VPN (DMVPN, site-to-site VPN,client VPN)
  • Internet VPN (DMVPN, site-to-site VPN, client VPN) (Day 14)
  • Describe basic QoS concepts (Day 14)
    1. Marking
    2. Device trust
    3. Prioritization
      1. voice
      2. video
      3. data
  • Shaping (Day 14)
  • Policing (Day 14)
  • Congestion Management (Day 14)
  • Describe DNS lookup operation (Day 15)
  • Troubleshoot client connectivity issues involving DNS (Day 15)
  • Configure and verify DHCP on a router(excluding staticreservations) (Day 15)
    1. Server
    2. Relay
    3. Client
    4. TFTP, DNS, and gateway options
  • Troubleshoot client-and router-based DHCP connectivity issues (Day 15)
  • Configure, verify, and troubleshoot basic HSRP (Day 16)
    1. Priority
    2. Preemption
    3. Version
  • Configure, verify, and troubleshoot inside source NAT (Day 16)
    1. Static
    2. Pool
    3. PAT
  • Configure and verify NTP operating in a client/server mode (Day 16)
  • Configure, verify, and troubleshoot port security (Day 17)
    1. Static
    2. Dynamic
    3. Sticky
    4. Max MAC addresses
    5. Violation actions
    6. Err-disable recovery
  • Describe common access layer threat mitigation techniques (Day 17)
    1. 802.1x
    2. DHCP snooping
    3. Nondefault native VLAN
  • Configure, verify, and troubleshoot IPv4 and IPv6 access list for traffic filtering (Day 17)
    1. Standard
    2. Extended
    3. Named
  • Verify ACLs using the APIC-EM Path Trace ACL Analysis tool (Day 18)
  • Configure, verify, and troubleshoot basic device hardening (Day 18)
    1. Local authentication
    2. Secure password
    3. Access to device
      1. Source address
      2. Telnet/SSH
    4. Login banner
  • Describe device security using AAA with TACACS+ and RADIUS (Day 18)
  • Configure and verify device-monitoring protocols (Day 19)
    1. SNMPv2
    2. SNMPv3
    3. Syslog
  • Troubleshoot network connectivity issues using ICMP echo-based IP SLA (Day 19)
    1. Backup and restore device configuration
    2. Using Cisco Discovery Protocol or LLDP for device discovery
    3. Licensing
    4. Logging
    5. Timezone
    6. Loopback
  • Configure and verify initial device configuration (Day 19)
  • Perform device maintenance (Day 20)
    1. Cisco IOS upgrades and recovery (SCP, FTP, TFTP, and MD5 verify)
    2. Password recovery and configuration register
    3. File system management
  • Use Cisco IOS tools to troubleshoot and resolve problems (Day 20)
    1. Ping and traceroute with extended option
    2. Terminal monitor
    3. Log events
    4. Local SPAN
  • Describe network programmability in enterprise network architecture (Day 20)
    1. Function of a controller
    2. Separation of control plane and data plane
    3. Northbound and southbound APIs

Hacking Tutorials

Read All Tutorials »
Building a career in Digital Forensics - How promising is the future? A thorough career guide
Building a career in Digital Forensics - How promising is the future? A thorough career guide
Read Details »

Hacking Videos

Explore All Videos »
How to Hiding Your Secret File using Steganography?
View On Youtube »

Get In Touch


Related Course

Enroll Now »
Know Your Faculty
Mr. Sandeep Sengupta
Mr. Sandeep Sengupta
CISA, Certified Ethical Hacker, ISO 27001:2013 Lead Auditor, Lead Privacy auditor, GDPR Implementer

21 years of experience working in India, New Zealand & Singapore; in Information Security domain as Ethical Hacker, ISO 27001 Lead Auditor / Tutor, BS 10012 Privacy Lead Auditor, Mr. Sandeep Sengupupta has conducted security audit in companies like ONGC, KPMG, PWC, Airtel, Vodafone, Accenture, Capgemini, Vedanta, PayU, Bandhan Bank, ABP, etc.

He has been invited as a speaker at FICCI, VIT (Vellore), Nasscom, CII, BCCI, ICAI, ISACA, FICCI, CeBIT, US High Commission (Kolkata), etc. He has taken part in several Television shows on ABP, ETV, NDTV, AajTak, Times Now, etc. In 2005, Sandeep founded the online community "Hackers Library"; which had 80,000+ members, making it the largest Indian online forum for cyber-security professionals at its time. Mr. Sengupta is the committee member at Nasscom (East) & CII ICT-East.

Mr. Kirit Sankar Gupta
Mr. Kirit Sankar Gupta
B. Tech (IT), OSCP, CEH 10.0, CHFI 9.0, ISO Certified Lead Security Incident Manager (ISO/IEC 27035), ISO Certified Lead Forensic Examiner (CLFE), CCNA, CCNP

A Penetration Tester with 6 years of experience, Kirit has the expertise in Mobile Application Pentesting Network, IoT Penetration Testing, Source-code review, Fuzzing, Red teaming, Social Engineering, Digital Forensics and Incident Response, Dev(Sec)Ops, Malware Analysis as well as SOC analysis. He has been acknowledged for reporting critical vulnerabilities to Uber, Apple, Flipkart, and MIT. Mr. Kirit Sankar Gupta is the member of Data Security Council of India (Kolkata).

Mr. Sanchayan Bhaumik
Mr. Sanchayan Bhaumik
ME (Jadavpur University), MCA (WBUT), CEH, CHFI, CEI

With 7 years of experience in Information Security audit and Forensic Investigation, Mr. Sanchayan Bhaumik is working as Information Security Analyst at ISOEH and has successfully conducted various Vulnerability Assessment and Penetration Testing / audit, as well as Forensic Investigation for leading corporate houses and Government entities.

He has worked as an Assistant Professor at Sikkim Manipal University & Guest Faculty at National Institute of Pharmaceutical Education and Research. His research domain is AI, Machine Learning and Cryptography. He has presented several research papers in international conferences. At ISOEH his job profile includes VAPT, Forensic Assignments & Teaching advance courses on penetration testing, creating hacking tools using python, AI & ML.

Mr. Saumitra Biswas
Mr. Saumitra Biswas
M Tech - Computer Science, MSc (Statistics), GATE qualified

Mr. Saumitra Biswas is M.Tech in computer science from Netaji Subhash Engineering College, GATE qualified in computer science and a MSC in statistics from Kalyani University. He has 20 years of experience. His technical interests include Machine Learning, Neural Networks, Genetic Algorithms and Object Oriented Programming. He is skilled in C, C++, C#, Dotnet, Java, Python, Matlab, Unix, MS Windows XP, Windows 7, My SQL, Oracle, MS Access, HTML, XML, CSS and PHP. He take classes on AI & ML in ISOAH, as well as act as mentors to interns & project trainees.

Ms. Amrita Acharya
Ms. Amrita Acharya
M Tech in CSE, ISO 27001 Lead Auditor (IRCA/BSI)

After completion of her Master degree, she has worked with ISOAH as an intern for few years before joining full time as secuity analyst. She has been involved in internal audit, policy design, ISMS consultancy for more than 2 years. She is well versed in Kali Linux, Nmap, Metasploit, ITGC, ISO 27001 & COBIT framework. ISOAH clients she has provided active consultancy are CESC, Diadem, Lexplosion, Diamond Beverages, etc. As part of her hobby, she has been a professional model in her free time.

Mr. Subhendu Bhadra
Mr. Subhendu Bhadra
ECSA, CEH, CCNA, Android Pentesting, Reverse Engineering

A Certified Ethical Hacker & CCNA, Mr. Subhendu Bhadra has expertise in exploit writing using Python, Ruby and Bash and is working as a Information Security Analyst and Faculty at ISOEH. Passionate about gadgets and technology, he has created several projects using Arduino. Well versed with networking and various programming languages, Suvendu is developing new hacking tools using Python.

Mr. Anubhav Kettry
Mr. Anubhav Khettry
Certificate EC-Council Instructor(CEIv2), CEH, CHFI

Anubhav Khettry is a Certified Ethical Hacker. His area of interest includes Network Penetration Testing (NPT), Web Application Penetration Testing (WAPT) & RDBMS concepts. He is currently a part of ISOEH as Information Security Analyst and faculty.

Mr. Avirup Ukil
Mr. Avirup Ukil

Information Security Analyst & Faculty. His research domain is python (Network programming and hacking toolkits), privilege escalation attack & mitigation, advance penetration testing.

Mr. Sagar Neogi
Mr. Sagar Neogi

Sagar Neogi is a Certified Ethical Hacker (CEH). His area of interest is Python, Reverse Engineering, Vulnerability Assessment and Penetration Testing. He is proficient in network design & hardening. He has a passion for teaching & likes to guide students to apply cyber security knowledge in the real-life scenario. He is currently a part of ISOEH as a faculty member & research analyst.

Mr. Somdeb Chakraborty
Mr. Somdeb Chakraborty
CEH, CCNA, Android Development

Somdeb Chakraborty is a Certified Ethical Hacker (CEH), whose expertise lies in penetration testing. His areas of interest are Networking, Python, Vulnerability Assessment and Penetration Testing. He is also CCNA Global Certified (CISCO ID# CSCO13549504). Previously he worked as a software and web development trainer at The EDGE College in tie up with Vinayaka mission Sikkim University. He is working as an Information Security Analyst in the Indian School of Ethical Hacking.


Ratings & Reviews

CCNA Essentials (Network Administration)

Course Rating
Based On
6350 Students Rating

Date: 31.12.2019
Course: CCNA Essentials (Network Administration)

I have done CCNP under shubendu Sir and CCNA under sagar sir..... I have so glad to have such a personality in our faculty....I have a nice experience in this institute

Date: 27.12.2019
Course: CCNA Essentials (Network Administration)

I have joined ISOEH for CCNA 3.0 and CCNP. My trainer is Subhendu sir, He is one of the best faculties.. He is well versed with the course, and he helped me to go through the entire syllabus theoretically and practically in detail. My overall experience was very Very good Thank you subhendu Sir & ISOEH...

Date: 26.12.2019
Course: CCNA Essentials (Network Administration)

Excellent Place to learn CCNA and Ethical Hacking. Best institute to learn on networking and Hacking. Lucky to be a part of this Institution.. Teachers and Faculties are very helpful and always ready to help. They got huge knowledge on every subject and every topic. I was under Subhendu Sir from very 1st day, he is too good and has good expertise and knowledge in his domain of Networking and also completed the course under him. For EH I was under Sanchayan Sir and Anubhav Sir they were also too good in teaching Hacking and its tools and how it works and cleared all my doubt. On other hand Kundan Sir also helped me with all my problems which I was facing and also help me to get rid from all my problems so i will be thankful to ISOEH for life. It was a good journey for me in learning and gathering knowledge and looking forward to do more courses from here and will also suggest my friend about this Institution. Thank You.


Job Prospects & Job Sources

In order to maintain ultimate cyber security for corporate networking component is the most important aspect of IT infrastructure. Thus the demand for trained CCNA practitioners is soaring highest in the market for IT jobs.

One of those industrial sectors where CCNA is the most sought after IT security service is the Medical. That is because it is important to secure the patient report and associated medical details from being seized by hackers. Cyber Security being a major threat in fields of human activities the demand for CCNA certified security professionals is the highest. However prospects of a CCNA professional depends mainly on two factors namely work experience and job title.

The various titles that a CCNA processional holds are as follows:

Network Engineer Senior Network Engineer Network Administrator
IT Manager Systems Administrator
Mobile Lead Software Engineer Mobile Developer IT Director
System Engineer

Out of all the varied titles of CCNA the position which commands the highest financial compensation is the managerial one which CCNA is a confirmed catalyst to reach.

Two important specializations of CCNA is ‘routing’ and ‘switching’. Job opportunities for both are increasing manifold owing to growing network and infrastructural complexities which demand trained individuals who can maintain complicated and critical hardware required to support the same. But these two specializations are at present the most in demand and financially alluring areas of CCNA.

Here is a pictorial representation of a CCNA career in India.


What is the course content?

The topics include connecting to a WAN, implementing network security, network types, network media, routing and switching fundamentals, the TCP/IP and OSI models, IP addressing, WAN technologies, operating and configuring IOS devices, extending switched networks with VLANs, determining IP routes, managing IP traffic with access lists, and establishing point-to-point connections.

What is the course Duration?

The course lasts for 40 hours with 2 classes per week.

What is the course Methodology?

The course is primarily based on practical sessions with an apt degree of theoretical classes.

What is the course Prerequisites?

10+2 along with a basic aptitude and understanding of computer hardware knowledge.

What is the career path after doing this course?

In order to maintain ultimate cyber security for corporate networking component is the most important aspect of IT infrastructure. Thus the demand for trained CCNA practitioners is soaring highest in the market for IT jobs for data security. Hence plush security jobs in IT departments of corporate houses are the alluring future of CCNA aspirants.

What is the next step after doing CCNA Essentials?

You can upgrade yourself in CISCO approved security skill development courses like CCNP, CCIE etc.

Enroll Now

Fields marked with * are mandatory.

Online Interactive Classroom with dedicated Faculty

Course Fees

Inclusive of all taxes

Weekday Batches:
Reg. Date
Start Date
End Date
Feb, 2021
Feb, 2021
Apr, 2021
Feb, 2021
Feb, 2021
May, 2021
Weekend Batches:
Reg. Date
Start Date
End Date
Feb, 2021
Feb, 2021
Apr, 2021
Feb, 2021
Feb, 2021
Apr, 2021
Feb, 2021
Feb, 2021
May, 2021

Member of:

Data Security Council of India