Online CCNA Courses

Cisco Learning

LearnCisco.net is a community, trying to give you all of the information
that you need to make your first steps into the networking
and to prepare for your future exams.

Feel free to spread the word and invite
other professionals or beginners.

The Newest Courses

ICND2
CUCM Basics

Need to know

Configuring Regions and Locations based CAC

Configure codec's and location based call admission control in a given multi-site Cisco Unified Communications Manager deployment.
Read more

IPv6 Address Types

Describe the types of addresses supported by IPv6. Match the basic types of IPv6 unicast addresses with their descriptions.
Read more

Access Control Lists Wildcard Masking

After completing this topic, you should be able to convert a subnet mask to a wildcard mask.
Read more

Hot Standby Router Protocol

After completing this topic, you should be able to differentiate between how active and standby routers function in HSRP.
Read more

Spanning-Tree Protocol Types

After completing this topic, you should be able to describe the characteristics of the different spanning-tree protocol types.
Read more

Discovering Neighbors on the Network

This lesson introduces the Cisco discovery protocol, or CDP. Describe the features and functions of Cisco discovery protocol. Learn how to configure it.
Read more

Latest security threats

Fri, 16 Aug 2019 20:11:41 PDT

Cisco Nexus 9000 Series ACI Mode Switch Software Link Layer Discovery Protocol Buffer Overflow Vulnerability

Read more
Fri, 16 Aug 2019 16:00:00 PDT

Cisco Firepower Threat Defense Software HTTP Filtering Bypass Vulnerability

Read more
Fri, 16 Aug 2019 16:00:00 PDT

Cisco Firepower Threat Defense Software Stream Reassembly Bypass Vulnerability

Read more
Fri, 16 Aug 2019 16:00:00 PDT

Cisco Firepower Threat Defense Software NULL Character Obfuscation Detection Bypass Vulnerability

Read more
Fri, 16 Aug 2019 16:00:00 PDT

Cisco Firepower Threat Defense Software Nonstandard Protocol Detection Bypass Vulnerability

Read more
Tue, 13 Aug 2019 17:00:00 PDT

Key Negotiation of Bluetooth Vulnerability

Read more