Online CCNA Courses

Cisco Learning

LearnCisco.net is a community, trying to give you all of the information
that you need to make your first steps into the networking
and to prepare for your future exams.

Feel free to spread the word and invite
other professionals or beginners.

The Newest Courses

ICND2
CUCM Basics

Need to know

Troubleshooting Multiarea OSPF Issues

After completing this topic, you should be able to identify potential causes of OSPF neighbor issues.
Read more

Dynamic Trunking Protocol (DTP) Configuration

After completing this topic, you should be able to recognize the characteristics of Dynamic Trunking Protocol (DTP).
Read more

CUC Manager Express Call Flows and Call Legs

Identify how Cisco Unified Communications Manager Express call flows and call legs use dial peers.
Read more

Network Address Translation

Providing Internet access by configuring network address translation (NAT) in your Internet router. Port address translation (PAT) explained.
Read more

Troubleshooting Switch Issues

Using Cisco IOS command-line interface to identify the common issues and problems in networking
Read more

Developing an Optimum Design for Layer 2

Typical causes of network congestion. Presenting the bridge and the switch as alternative options to alleviate those issues.
Read more

Latest security threats

Fri, 16 Aug 2019 20:11:41 PDT

Cisco Nexus 9000 Series ACI Mode Switch Software Link Layer Discovery Protocol Buffer Overflow Vulnerability

Read more
Fri, 16 Aug 2019 16:00:00 PDT

Cisco Firepower Threat Defense Software HTTP Filtering Bypass Vulnerability

Read more
Fri, 16 Aug 2019 16:00:00 PDT

Cisco Firepower Threat Defense Software Stream Reassembly Bypass Vulnerability

Read more
Fri, 16 Aug 2019 16:00:00 PDT

Cisco Firepower Threat Defense Software NULL Character Obfuscation Detection Bypass Vulnerability

Read more
Fri, 16 Aug 2019 16:00:00 PDT

Cisco Firepower Threat Defense Software Nonstandard Protocol Detection Bypass Vulnerability

Read more
Tue, 13 Aug 2019 17:00:00 PDT

Key Negotiation of Bluetooth Vulnerability

Read more