CCNA Certification: Overview and Career Path

Introduction

Newcomers in any field usually have many unanswered questions on their minds. Those just entering or transitioning into the networking field want to know where to start, how to progress, and which certifications (if any) to acquire.

In this article, we will explore one of the industry’s most recognized networking certifications, the Cisco Certified Network Associate (CCNA) certification. We will consider topics such as the target audience of the certification, the experience needed, whether it’s still worth acquiring, and the ways to train for the exam.

What Is the CCNA Routing and Switching Certification?

People are probably more familiar with the “CCNA” certification than even the “Cisco” name itself. The CCNA Routing and Switching certification is a Cisco entry-level certification for the networking field. While the certification is provided by Cisco and can be Cisco-focused in some areas, it covers general networking fundamentals, routing and switching technologies, wide area networks (WAN), security, and other networking topics.

Note: This certification used to simply be called “CCNA.” However, as more entry-level certifications became available for other fields such as the CCNA Security and CCNA Wireless, Cisco decided to call it CCNA Routing and Switching. Therefore, when we say “CCNA,” we mean the CCNA Routing and Switching certification.

As is evident from the name, the CCNA certification is administered by Cisco. In simple terms, Cisco is a networking equipment vendor that manufactures devices such as routers, switches, and even firewalls. They have been at this for a while (since 1984), have built a strong brand, and are the market leader in areas such as enterprise routing and switching.

Who Should Earn the CCNA?

According to Cisco, the CCNA certification is targeted at people who want to go into job roles such as network support engineer and network administrator. Basically, (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Adeolu Owokade. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/6GQjP_6sVmQ/