This course is several hours in length and will cover Layer 2 switching in detail. I will explain the Technology and media access control method for Ethernet networks, network segmentation, switching concepts and the operation of Cisco switches.DISCLAIMER:Please note that the simulators/emulators used in this course are not part of the course. It is the students responsibility to have these to practice with. The Cisco Packet Tracer and/or VIRAL (Virtual Internet Routing Lab) are Cisco proprietary software and can only be obtained through Cisco. It is up to each student to obtain the simulator/emulator of their choice to study along with this course. Students will get a thorough understanding of switching and how we would implement it in a real world environment.We will discuss the following concepts switching services and rules we should follow when segmenting networks. We will also compare bridging vs. LAN switching focusing in great detail on the Spanning-tree protocol. We will look at the switch Functions at layer two, such as how a switch learns about the nodes on the network and how it makes its decisions to forward the information and most definitely how to secure our ports on the switches.Once get an understanding of how switches work and their administrative configurations we will then go into explain and creating vlans and inter-vlan connectivity and what would be the benefits of using VLANs on our network. You will learn the different port types and encapsulation methods we use when using vlans, and will fully understand the difference between trunking a port and the VTP protocol.This is a lecture based course using the Touch-IT Technology Smart board, which will make learning very interactive and engaging. Hands on labs will be used to drill down the concepts learned in each lecture using Cisco's Packet Tracer.My method will make you feel like you are sitting in a classroom environment and give the most needed hands on experience!
Facilities
Location
Start date
Online
Start date
Different dates availableEnrolment now open
About this course
Once you finish my course, you will have a strong grasp on the switching concepts and the methods to use in different networking environments. You will be able to configure the cisco switch with all its administrative tasks, STP, RSTP, VTP and switch port security. You will learn how to improve the performance of the switches by turning off services on certain ports so information can start transmitting much quicker. The understanding of Layer2 concepts is an essential element for any Networking and/or IT Professional. This course will prepare the student for any networking certification such as N+, CCNA, MCSE to include any Computer Science Degree
Mastering this knowledge will make the student, Networking and/or IT Professional a much more valuable asset in any IT environment
Questions & Answers
Add your question
Our advisors and other users will be able to reply to you
We are verifying your question adjusts to our publishing rules. According to your answers, we noticed you might not be elegible to enroll into this course, possibly because of: qualification requirements, location or others. It is important you consult this with the Centre.
Thank you!
We are reviewing your question. We will publish it shortly.
Or do you prefer the center to contact you?
Reviews
Have you taken this course? Share your opinion
This centre's achievements
2021
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 4 years
Subjects
Mac
Network Training
Technology
Switches
CCNA
Protocol
Network
Works
Server
Cisco
Networks
Course programme
Layer 2 Switching
4 lectures01:05:57Introduction to layer 2 switching This Lesson is an overview of the subjects that you will be learning in this course.How the switch populates its MAC address table In this lesson I will demonstrate using the Packet Tracer how exactly, a switch learns MAC addresses from the nodes that are connected to it.
Switching Loops at layer 2 This lesson will explain how having redundant switch connections you could have loops at layer 2 and the protocol that will help you prevent those loops.Port Security This lesson will show you how to configure security on individual or a range of ports, to only allow a certain number of mac address on those ports.
Layer 2 Switching
4 lectures01:05:57Introduction to layer 2 switching This Lesson is an overview of the subjects that you will be learning in this course.How the switch populates its MAC address table In this lesson I will demonstrate using the Packet Tracer how exactly, a switch learns MAC addresses from the nodes that are connected to it.
Switching Loops at layer 2 This lesson will explain how having redundant switch connections you could have loops at layer 2 and the protocol that will help you prevent those loops.Port Security This lesson will show you how to configure security on individual or a range of ports, to only allow a certain number of mac address on those ports.Introduction to layer 2 switching This Lesson is an overview of the subjects that you will be learning in this course.
Introduction to layer 2 switching This Lesson is an overview of the subjects that you will be learning in this course.
Introduction to layer 2 switching This Lesson is an overview of the subjects that you will be learning in this course.
Introduction to layer 2 switching This Lesson is an overview of the subjects that you will be learning in this course.
This Lesson is an overview of the subjects that you will be learning in this course.
This Lesson is an overview of the subjects that you will be learning in this course.
How the switch populates its MAC address table In this lesson I will demonstrate using the Packet Tracer how exactly, a switch learns MAC addresses from the nodes that are connected to it.How the switch populates its MAC address table In this lesson I will demonstrate using the Packet Tracer how exactly, a switch learns MAC addresses from the nodes that are connected to it.How the switch populates its MAC address table In this lesson I will demonstrate using the Packet Tracer how exactly, a switch learns MAC addresses from the nodes that are connected to it.How the switch populates its MAC address table In this lesson I will demonstrate using the Packet Tracer how exactly, a switch learns MAC addresses from the nodes that are connected to it.In this lesson I will demonstrate using the Packet Tracer how exactly, a switch learns MAC addresses from the nodes that are connected to it.In this lesson I will demonstrate using the Packet Tracer how exactly, a switch learns MAC addresses from the nodes that are connected to it.Switching Loops at layer 2 This lesson will explain how having redundant switch connections you could have loops at layer 2 and the protocol that will help you prevent those loops.
Switching Loops at layer 2 This lesson will explain how having redundant switch connections you could have loops at layer 2 and the protocol that will help you prevent those loops.
Switching Loops at layer 2 This lesson will explain how having redundant switch connections you could have loops at layer 2 and the protocol that will help you prevent those loops.
Switching Loops at layer 2 This lesson will explain how having redundant switch connections you could have loops at layer 2 and the protocol that will help you prevent those loops.
This lesson will explain how having redundant switch connections you could have loops at layer 2 and the protocol that will help you prevent those loops.
This lesson will explain how having redundant switch connections you could have loops at layer 2 and the protocol that will help you prevent those loops.
Port Security This lesson will show you how to configure security on individual or a range of ports, to only allow a certain number of mac address on those ports.Port Security This lesson will show you how to configure security on individual or a range of ports, to only allow a certain number of mac address on those ports.Port Security This lesson will show you how to configure security on individual or a range of ports, to only allow a certain number of mac address on those ports.Port Security This lesson will show you how to configure security on individual or a range of ports, to only allow a certain number of mac address on those ports.This lesson will show you how to configure security on individual or a range of ports, to only allow a certain number of mac address on those ports.This lesson will show you how to configure security on individual or a range of ports, to only allow a certain number of mac address on those ports.
Configuring Catalyst Switches
4 lectures01:07:02Basic Administration Configuration This lesson will demonstrate some of the basic configurations that you would configure on a switch.
Advanced Administration Configuration This lesson will demonstrate some of the advanced configurations that you would configure on a switch.Verifying Cisco Catalyst Switches In this lesson you will learn various commands, that you could use to verify your configurations on your Cisco Catalyst Switches.Backing up Switch configurations In this lesson you will learn to back up not only your configuration but your IOS as well to a TFTP server.
Configuring Catalyst Switches
4 lectures01:07:02Basic Administration Configuration This lesson will demonstrate some of the basic configurations that you would configure on a switch.
Advanced Administration Configuration This lesson will demonstrate some of the advanced configurations that you would configure on a switch.Verifying Cisco Catalyst Switches In this lesson you will learn various commands, that you could use to verify your configurations on your Cisco Catalyst Switches.Backing up Switch configurations In this lesson you will learn to back up not only your configuration but your IOS as well to a TFTP server.Basic Administration Configuration This lesson will demonstrate some of the basic configurations that you would configure on a switch.Basic Administration Configuration This lesson will demonstrate some of the basic configurations that you would configure on a switch.Basic Administration Configuration This lesson will demonstrate some of the basic configurations that you would configure on a switch.Basic Administration Configuration This lesson will demonstrate some of the basic configurations that you would configure on a switch.This lesson will demonstrate some of the basic configurations that you would configure on a switch.This lesson will demonstrate some of the basic configurations that you would configure on a switch.Advanced Administration Configuration This lesson will demonstrate some of the advanced configurations that you would configure on a switch.
Advanced Administration Configuration This lesson will demonstrate some of the advanced configurations that you would configure on a switch.
Advanced Administration Configuration This lesson will demonstrate some of the advanced configurations that you would configure on a switch.
Advanced Administration Configuration This lesson will demonstrate some of the advanced configurations that you would configure on a switch.
This lesson will demonstrate some of the advanced configurations that you would configure on a switch.
This lesson will demonstrate some of the advanced configurations that you would configure on a switch.
Verifying Cisco Catalyst Switches In this lesson you will learn various commands, that you could use to verify your configurations on your Cisco Catalyst Switches.
Verifying Cisco Catalyst Switches In this lesson you will learn various commands, that you could use to verify your configurations on your Cisco Catalyst Switches.
Verifying Cisco Catalyst Switches In this lesson you will learn various commands, that you could use to verify your configurations on your Cisco Catalyst Switches.
Verifying Cisco Catalyst Switches In this lesson you will learn various commands, that you could use to verify your configurations on your Cisco Catalyst Switches.
In this lesson you will learn various commands, that you could use to verify your configurations on your Cisco Catalyst Switches.
In this lesson you will learn various commands, that you could use to verify your configurations on your Cisco Catalyst Switches.
Backing up Switch configurations In this lesson you will learn to back up not only your configuration but your IOS as well to a TFTP server.Backing up Switch configurations In this lesson you will learn to back up not only your configuration but your IOS as well to a TFTP server.Backing up Switch configurations In this lesson you will learn to back up not only your configuration but your IOS as well to a TFTP server.Backing up Switch configurations In this lesson you will learn to back up not only your configuration but your IOS as well to a TFTP server.In this lesson you will learn to back up not only your configuration but your IOS as well to a TFTP server.In this lesson you will learn to back up not only your configuration but your IOS as well to a TFTP server.
Enhanced Switched Techonologies
4 lectures58:00The Spanning-Tree Protocol This lesson will explain to you how the Spanning-Tree Protocol works, specifically when its deciding which switch will be the root bridge and wich switch will have a blocked port to prevent the BPDU's from fowarding out a specific port.
Types of Spanning-Tree In this lesson you will briefly learn that there are different types of STP that you could configure on your Cisco Catalyst Switch.
Per-vlan Spanning-Tree This lesson will explain how you can have Per-Vlan Spanning-Tree, depending on the STP version you use.
Modifying the Switch Bridge ID
Enhanced Switched Techonologies.
4 lectures58:00The Spanning-Tree Protocol This lesson will explain to you how the Spanning-Tree Protocol works, specifically when its deciding which switch will be the root bridge and wich switch will have a blocked port to prevent the BPDU's from fowarding out a specific port.
Types of Spanning-Tree In this lesson you will briefly learn that there are different types of STP that you could configure on your Cisco Catalyst Switch.
Per-vlan Spanning-Tree This lesson will explain how you can have Per-Vlan Spanning-Tree, depending on the STP version you use.
Modifying the Switch Bridge IDThe Spanning-Tree Protocol This lesson will explain to you how the Spanning-Tree Protocol works, specifically when its deciding which switch will be the root bridge and wich switch will have a blocked port to prevent the BPDU's from fowarding out a specific port.The Spanning-Tree Protocol This lesson will explain to you how the Spanning-Tree Protocol works, specifically when its deciding which switch will be the root bridge and wich switch will have a blocked port to prevent the BPDU's from fowarding out a specific port.The Spanning-Tree Protocol This lesson will explain to you how the Spanning-Tree Protocol works, specifically when its deciding which switch will be the root bridge and wich switch will have a blocked port to prevent the BPDU's from fowarding out a specific port.The Spanning-Tree Protocol This lesson will explain to you how the Spanning-Tree Protocol works, specifically when its deciding which switch will be the root bridge and wich switch will have a blocked port to prevent the BPDU's from fowarding out a specific port.This lesson will explain to you how the Spanning-Tree Protocol works, specifically when its deciding which switch will be the root bridge and wich switch will have a blocked port to prevent the BPDU's from fowarding out a specific port.This lesson will explain to you how the Spanning-Tree Protocol works, specifically when its deciding which switch will be the root bridge and wich switch will have a blocked port to prevent the BPDU's from fowarding out a specific port witchport modes and how to configure them.
Frame...
Additional information
Students should have an understanding of basic networking
The Cisco Packet Tracer or similar simulator
The desire to learn and apply the knowledge obtained in a testing environment or real world scenario