SRWE-Bridge v7 Scope and Sequence
SRWE-Bridge v7 Scope and Sequence
SRWE-Bridge v7 Scope and Sequence
Target Audience
The Cisco Networking Academy® CCNAv7 Switching, Routing and Wireless Essentials (SRWE) Bridging course is designed for
students who have or are currently taking CCNAv6 and will be taking the Cisco Certified Network Associate v2.0 (CCNA 200-301)
Certification Exam. This course covers new content not covered in CCNAv6 in the form of four modules: LAN Security Concepts,
Switch Security Configuration, WLAN Concepts, and WLAN Configuration. These module provide learners extensive opportunities for
hands-on practical experience and career skills development.
The curriculum is appropriate for learners at many education levels and types of institutions, including high schools, secondary schools,
universities, colleges, career and technical schools, and community centers.
Prerequisites
Students are required to have successfully completed the CCNAv6 Routing and Switching Essentials course prior to beginning the
SRWE Bridging course. Learners are also expected to have the following skills:
ã 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 4 www.netacad.com
● Assessments and practice activities are focused on specific competencies to increase retention and provide flexibility in the
learning path.
● Multimedia learning tools, including videos, games, and quizzes, address a variety of learning styles and help stimulate learning
and promote increased knowledge retention.
● Hands-on labs and Cisco® Packet Tracer simulation-based learning activities help students develop critical thinking and complex
problem-solving skills.
● Embedded assessments provide immediate feedback to support the evaluation of knowledge and acquired skills.
● Cisco Packet Tracer activities are designed for use with the latest version of Packet Tracer.
• 2 x ISR4221/K9 Routers
• 2 x WS-C2960+24TC-L Catalyst switches
• 1 wireless router (generic brand) with WPA2 support
• Ethernet patch cables
• PCs - minimum system requirements
o CPU: Intel Pentium 4, 2.53 GHz or equivalent •
o OS: Microsoft Windows 7, Microsoft Windows 8.1, Microsoft Windows 10, Ubuntu 14.04 LTS, macOS High Sierra and
Mojave •
o RAM: 4 GB
o Storage: 500 MB of free disk space
o Display resolution: 1024 x 768
o Language fonts supporting Unicode encoding (if viewing in languages other than English)
o Latest video card drivers and operating system updates
• Internet connection for lab and study PCs
• Optional equipment for connecting to a WLAN
o 1 printer or integrated printer/scanner/copier for the class to share
o Smartphones and tablets are desirable for use with the labs
Software:
• Cisco IOS versions:
o Routers: Version 15.0 or higher, IP Base feature set.
o Switches: Version 15.0 or higher, lanbaseK9 feature set.
• Packet Tracer v7.3
• Open-source server software:
o For various services and protocols, such as Telnet, SSH, HTTP, DHCP, FTP, TFTP, etc.
• Tera Term source SSH client software for lab PCs.
• Oracle VirtualBox, most recent version.
• Wireshark version 2.5 or higher.
Listed below are the current set of modules and their associated competencies outlined for this course. Each module is an integrated
unit of learning that consists of content, activities and assessments that target a specific set of competencies. The size of the module
will depend on the depth of knowledge and skill needed to master the competency. Some modules are considered foundational, in that
the artifacts presented, while not assessed, enable learning of concepts that are covered on the CCNA certification exam.
Access Control Explain how AAA and 802.1x are used to authenticate LAN
endpoints and devices.
MAC Address Table Attack Explain how a MAC address table attack compromises LAN
security.
Implement Port Security Implement port security to mitigate MAC address table
attacks.
Mitigate VLAN Attacks Explain how to configure DTP and native VLAN to mitigate
VLAN attacks.
Mitigate DHCP Attacks Explain how to configure DHCP snooping to mitigate DHCP
attacks.
Mitigate ARP Attacks Explain how to configure ARP inspection to mitigate ARP
attacks.
Mitigate STP Attacks Explain how to configure Portfast and BPDU Guard to
mitigate STP attacks.
CAPWAP Operation Explain how a WLC uses CAPWAP to manage multiple APs.
ã 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 3 of 4 www.netacad.com
Channel Management Describe channel management in a WLAN.
Configure a Basic WLC on the Configure a WLC WLAN to use the management interface
WLC and WPA2 PSK authentication.
Configure a WPA2 Enterprise Configure a WLC WLAN to use a VLAN interface, a DHCP
WLAN on the WLC server, and WPA2 Enterprise authentication.
ã 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 4 of 4 www.netacad.com