The Cisco Certified Network Associate (CCNA) certification remains an entry gate for networking professionals, providing a robust foundation in networking principles and practices.
With the evolving network technology, the CCNA syllabus is also frequently updated, ensuring that candidates are equipped with the latest skills and knowledge required in the industry.
In 2025, the CCNA syllabus underwent significant updates to stay relevant. Some of the notable changes include the addition of new topics such as cloud computing, automation, artificial intelligence (AI), and enhanced security measures. Conversely, some outdated topics have been removed to streamline the learning process and focus on more pertinent skills.
In this guide, we have provided the updated CCNA Syllabus for 2025, ensuring students do not lack in preparation and get a complete understanding of all CCNA Exam topics.
Further, if you are interested in learning about Cisco or networking, our networking courses provide a deep understanding of fundamentals and advanced concepts of networking.
The CCNA certification exam broadly asks questions from 6 domains, and their distribution is:
1. Network fundamentals: 20% 2. Network Access: 20% 3. IP Connectivity: 25% 4. IP Services: 10% 5. Security Fundamentals: 15% 6. Automation and programmability: 10% |
The detailed list of topics of the CCNA exam is explained below, with relevant learning materials:
Covers basic networking concepts, hardware, topologies, IP addressing, wireless principles, and virtualization.
● Routers
● Layer 2 and Layer 3 switches
● Next-generation firewalls and IPS
● Access points
● Controllers (Cisco DNA Center and WLC)
● Endpoints
● Servers
● PoE
1.2 Types of network topologies
● Two-tier
● Three-tier
● Spine-leaf
● WAN
● Small office/home office (SOHO)
● On-premises and cloud
1.3 Computer Network Cable Types
● Single-mode fiber, multimode fiber, copper
● Connections (Ethernet shared media and point-to-point)
1.4 Interface and cable issues (collisions, errors, mismatch duplex, and/or speed)
1.5 TCP and UDP
1.6 IPv4 addressing and subnetting
1.7 Private IPv4 addressing
1.8 IPv6 addressing and prefix
● Unicast (global, unique local, and link local)
● Anycast
● Multicast
● Modified EUI 64
1.10 Verification of IP parameters for Client OS (Windows, Mac OS, Linux)
1.11 Wireless principles
● Nonoverlapping Wi-Fi channels
● SSID
● RF
● Encryption
1.12 Virtualization fundamentals (server virtualization, containers, and VRFs)
1.13 Switching concepts
● MAC learning and aging
● Frame switching
● Frame flooding
● MAC address table
Focuses on VLANs, interswitch connectivity, discovery protocols, EtherChannel, Spanning Tree, and wireless architectures.
2.1 VLAN Configuration and Verification
● Access ports (data and voice)
● Default VLAN
● InterVLAN connectivity
● Trunk ports
● 802.1Q
● Native VLAN
2.3 Layer 2 Discovery Protocols
● Cisco Discovery Protocol (CDP)
● Link Layer Discovery Protocol (LLDP)
2.4 EtherChannel Configuration and Verification
● Layer 2/Layer 3 EtherChannel (LACP)
2.5 Rapid PVST+ Spanning Tree Protocol
● Root port, root bridge, and other port names
● Port states (forwarding/blocking)
● PortFast
2.6 Cisco Wireless Architectures and AP Modes
● Basics of wireless communication or principles
2.7 WLAN Physical Infrastructure Connections
● Access points (AP)
● Wireless LAN controllers (WLC)
● Access/trunk ports
● Link Aggregation Groups (LAG)
2.8 AP and WLC Management Access
● Telnet, SSH, HTTP, HTTPS, console, and TACACS+/RADIUS
2.9 Wireless LAN GUI Configuration
● Client connectivity
● WLAN creation
● Security settings
● QoS profiles
● Advanced settings
Includes routing concepts, static routing, OSPFv2, and redundancy protocols.
● Routing protocol code
● Prefix
● Network mask
● Next hop
● Administrative distance
● Metric
● Gateway of last resort
3.2 Router Forwarding Decisions
● Longest prefix match
● Administrative distance
● Routing protocol metric
3.3 Static Routing Configuration and Verification
● Default route
● Network route
● Host route
● Floating static
3.4 Single Area OSPFv2 Configuration and Verification
● Neighbor adjacencies
● Point-to-point
● Broadcast (DR/BDR selection)
● Router ID
3.5 First Hop Redundancy Protocols
Explores NAT, NTP, DHCP, DNS, SNMP, syslog, QoS, and remote access.
4.1 NAT Configuration and Verification
4.2 NTP Configuration and Verification
4.4 SNMP Function
4.5 Syslog Features
4.6 DHCP Client and Relay
4.7 QoS Forwarding Per-Hop Behavior
4.8 Remote Access Configuration
● Enable SSH on Cisco switch
4.9 TFTP/FTP Capabilities
Covers security concepts, device access control, VPNs, ACLs, Layer 2 security, and wireless security.
5.1 Key Security Concepts
● Threats, vulnerabilities, and exploits
● Mitigation techniques
5.2 Security Program Elements
● User awareness and Training
● Physical access control
5.3 Device Access Control
● Configure local passwords
● Verify local passwords
5.4 Security Password Policies
● Management of passwords
● Password complexity
● Password alternatives (multifactor authentication, certificates, biometrics)
5.5 IPsec VPNs
● Remote access VPNs
● Site-to-site VPNs
● Configure access control lists
● Verify access control lists
5.7 Layer 2 Security Features
● DHCP snooping
● Dynamic ARP inspection
● Port security
5.8 AAA Concepts (Authentication, Authorization, and Accounting)
5.9 Wireless Security Protocols
● WPA
● WPA2
● WPA3
5.10 WLAN Configuration
● Configure WLAN within the GUI
● Verify WLAN using WPA2 PSK
Focuses on network automation, controller-based networking, REST APIs, configuration management, and JSON data.
6.1 Impact of Automation on Network Management
● How automation improves efficiency
● Reduces manual errors
● Enhances scalability
6.2 Traditional vs. Controller-Based Networking
● Differences in architecture
● Benefits of controller-based networking
6.3 Controller-Based, Software-Defined Architecture
● Overlay, underlay, and fabric
● Separation of control plane and data plane
● Northbound and Southbound APIs
6.4 Device Management Comparison
● Traditional campus device management
● Cisco DNA Center enabled device management
6.5 Characteristics of REST-Based APIs
● CRUD operations (Create, Read, Update, Delete)
● HTTP verbs (GET, POST, PUT, DELETE)
● Data encoding (JSON, XML)
6.6 Configuration Management Mechanisms
● Capabilities of Puppet
● Capabilities of Chef
● Capabilities of Ansible
6.7 JSON-Encoded Data
● Components and structure of JSON data
He is a senior solution network architect and currently working with one of the largest financial company. He has an impressive academic and training background. He has completed his B.Tech and MBA, which makes him both technically and managerial proficient. He has also completed more than 450 online and offline training courses, both in India and ...
More... | Author`s Bog | Book a Meeting#Explore latest news and articles
Share this post with others