One of the things you need to be strong in from Semester 1 is subnetting, you will need this for Semester 3. Also, know how to count in binary and that you fully understand how to convert as in Semester 3 you will cover Access Lists which weigh heavily on binary to decimal conversion and will aid in your understanding of how an ACL works. Have a very solid understanding of Semester 2 related to the router as it makes up 25% of the CCNA exam and much of the 2nd Semester final. Semester 4 is the beginning of in-depth coverage of WAN's and WAN Design. Many people take the CCNA after Semester 3, but keep in mind that if you don't take Semester 4 the questions asked on the CCNA about it can make or break you. There are 8-12 questions on the CCNA related to WAN's and WAN Design.
As for the labs, Semester 2 is where you want to take
ALL of them. Get lots of time in the Router Lab and work in groups if you can, they usually encourage it starting Semester 2. The lab final during Semester 2 will require your group to setup 5 routers from a default configuration so that they can ping end to end. I would encourage you to stay away from using the
setup command to configure the router once you are familiar with the IOS commands.
I have had a great time in the class and will be taking 10-Week Fast Track CCNP starting the beginning of December. I'm sure I have TONS more to tell you but this will do for now

I'm more than happy to answer any other questions you have and help out anyway I can.
SEMESTER 2
Chapter 1: Review
Chapter 2: WANs and Routers
2.1 WANs
2.1.1 WANs and devices
2.1.2 WAN standards
2.1.3 WAN technologies
2.2 WANs and Routers
2.2.1 Router Basics
2.2.2 The function of a router in a WAN
Chapter 3: Router CLI
3.1 Router User Interface
3.1.1 User and privileged modes
3.1.2 User mode command list
3.1.3 Privileged-mode command list
3.1.4 User router help functions
3.1.5 Using IOS editing commands
3.1.6 Using IOS command history
3.2 Using The Router Interface and Interface Modes
Chapter 4: Router Components
4.1 Router Components
4.1.1 Ext router configuration sources
4.1.2 Int router's configuration components
4.1.3 RAM for working storage in the router
4.1.4 Router modes
4.2 Router Show Commands 4.2.1 Examining router status by using router status commands
4.2.2 The show running-config and show startup-config commands
4.2.3 The show interfaces, show version and show protocols commands
4.2.4 Lab: router show commands
4.3 Router's Network Neighbors
4.3.1 Gaining Access to other routers by using Cisco Discovery Protocol (CDP)
4.3.2 Showing CDP neighbor entries
4.3.3 A CDP configuration example
4.3.4 Showing CDP entries for a device and CDP neighbors
4.4 Basic Networking Testing
4.4.1 Testing process that uses the OSI model
4.4.2 Testing the application layer by using telnet
4.4.3 Testing the network layer using the ping command
4.4.4 Testing the network layer with the trace command
4.4.5 Testing network layer with the show ip route command
4.4.6 Using the show interfaces serial command to test the physical and data link layers
4.4.7 The show interfaces and clear counters commands
4.4.8 Checking real-time traffic with debug
Chapter 5: Router Startup and Setup
5.1 Router Boot Sequence and Setup Mode
5.1.1 Router startup routine
5.1.2 Router startup sequence
5.1.3 Commands related to router startup
5.2 System Configuration Dialog 5.2.1 Using the setup command
5.2.2 Setting up global parameters
5.2.3 Setting up interface parameters
5.2.4 Setting up script review and use
Chapter 6: Router Configuration 1
6.1 Router Configuration Files
6.1.1 Router configuration file information
6.1.2 Working with Release 11.x configuration files
6.1.3 Working with pre-Release 11.0 configuration files
6.1.4 Using the copy running-config tftp and copy tftp running-config commands
6.1.5 Describe using NVRAM with Release 11.x.
6.1.6 Using NVRAM with Pre-11.0 IOS software
6.2 Router Configuration Modes
6.2.1 Using router configuration modes
6.2.2 Global configuration modes
6.2.3 Configuring routing protocols
6.2.4 Interface configuration commands
6.2.5 Configuring a specific interface
6.3 Configuration methods
6.3.1 Release 11.x configuration methods
6.3.2 Pre-Release 11.0 configuration methods
6.3.3 Password configuration methods
6.3.4 Router identification configuration
Chapter 7: IOS Images
7.1 The Basics of IOS Versions
7.1.1 Locating the Cisco IOS software
7.1.2 Configuration register values
7.1.3 The show version command
7.2 Bootstrap Options in Software
7.2.1 Boot system commands
7.2.2 Preparing for the use of TFTP
7.2.3 The show flash command
7.3 IOS Naming and Software Image Backup
7.3.1 Cisco's IOS naming conventions
7.3.2 The copy flash tftp command
7.3.3 The copy tftp flash command
7.3.4 How to load a software image backup
Chapter 8: Router Configuration 2
8.1 Configuring a Router from the CLI after Start-up Config has been Erased
8.1.1 Router configuration process
8.1.2 Router password recovery procedure on 1600 and 2500 series routers
Chapter 9: TCP/IP
9.1 The TCP/IP Protocol Suite
9.1.1 The Internet TCP/IP protocols and the OSI model
9.1.2 NTCP/IP protocol stack and the application layer
9.1.3 NTCP/IP protocol stack and the transport layer
9.1.4 TCP and UDP segment format
9.1.5 TCP and UDP port numbers
9.1.6 TCP three-way handshake/open connection
9.1.7 TCP simple acknowledgment and windowing
9.2 2 Layer 3 Concepts
9.2.1 TCP/IP and the Internet Layer
9.2.2 Diagram the IP datagram
9.2.3 Internet Control Message Protocol(ICMP)
9.2.4 How ARP works
Chapter 10: IP Addressing
10.1 IP Addressing and Subletting
10.1.1 The purpose of IP address
10.1.2 The role of host address on a routed network
10.1.3 The role of broadcast addresses on a routed network
10.1.4 The assignment of router interface and network IP addresses
10.2 The Role of DNS in Router Configurations
10.2.1 The ip address command
10.2.2 The ip host command
10.2.3 Describe the ip name-server command
10.2.4 How to enable and disable DNS on a router
10.2.5 Show hosts command
10.3 Verifying Address Configuration
10.3.1 Verification commands
10.3.2 The telnet and ping commands
10.3.3 The trace command
10.4 Assigning New Subnet Numbers to the Topology
Chapter 11: Routing
11.1 Routing Basics
11.1.1 Path determination
11.1.2 How routers route packets from source to destination
11.1.3 Network and host addressing
11.1.4 Path selection and packet switching
11.1.5 Routed versus routing protocol
11.1.6 Network-layer protocol operations
11.1.7 Multiprotocol routing
11.2 Why Routing Protocols are Necessary
11.2.1 Static versus dynamic routes
11.2.2 Why use a static route
11.2.3 How a default route is used
11.2.4 Why dynamic routing is necessary
11.2.5 Dynamic routing operations
11.2.6 How distances on network paths are determined by various metrics
11.2.7 Three classes of routing protocols
11.2.8 Time to convergence
11.3 Distance-Vector Routing
11.3.1 Distance-vector routing basics
11.3.2 How distance-vector protocols exchange routing tables
11.3.3 How topology changes propagate through the network of routers
11.3.4 The problem of routing loops
11.3.5 The problem of counting to infinity
11.3.6 The solution of defining a maximum
11.3.7 The solution of split horizon
11.3.8 The solution of hold-down timers
11.4 Link-State Routing
11.4.1 Link-state routing basics
11.4.2 How link-state protocols exchange routing tables
11.4.3 How topology changes propagate through the network of routers
11.4.4 Two link-state concerns
11.4.5 Unsynchronized link-state advertisements (LSAs) leading to inconsistent path decisions amongst routers
11.5 The Context of Different Routing Protocols
11.5.1 Distance-vectors versus link-state routing protocols
11.5.2 Hybrid routing protocols
11.5.3 LAN-to-LAN routing
11.5.4 LAN-to-WAN routing
11.5.5 Path selection and switching of multiple protocols and media
Chapter 12: Routing Protocols
12.1 Initial Router Configuration
12.1.1 Setup mode
12.1.2 The initial IP routing table
12.1.3 How a router learns about destinations
12.1.4 The ip route command
12.1.5 Using the ip route command
12.1.6 The ip default-network command
12.1.7 Using the ip default-network command
12.2 Interior and Exterior Routing Protocols
12.2.1 Autonomous system
12.2.2 Interior versus exterior routing protocols
12.2.3 Interior IP routing protocols
12.2.4 IP routing configuration tasks
12.2.5 Using the router and network commands
12.3 RIP
12.3.1 Key elements of RIP
12.3.2 Using router rip and network commands to enable RIP
12.3.3 Enabling RIP on an IP-addressed network
12.3.4 Monitoring of IP packet flow using the show ip protocol command
12.3.5 The show ip route command
12.4 IGRP
12.4.1 Key characteristics of IGRP
12.4.2 Using router igrp and network commands to enable IGRP
12.4.3 Enabling IGRP on an IP-addressed network
12.4.4 Monitoring IP packet flow using the show ip protocol command
12.4.5 The show ip interfaces command
12.4.6 The show ip route command
12.4.7 The debug ip rip command
12.5.1 Rip convergence challenge
12.5.2 Routing loops setup challenge
12.5.3 Preventing routing loops
Chapter 13: Network Troubleshooting
13.1 Troubleshooting the 5-Router Network
13.1.1 The standard configuration
13.1.2 Describe typical layer 1 errors
13.1.3 Typical layer 2 errors
13.1.4 Typical layer 3 errors
13.1.5 Network troubleshooting strategies
13.1.6 Troubleshooting lab on a 5-router network
SEMESTER 3
Chapter 1: Review
Chapter 2: LAN Switching
2.1 Various LAN Communication Problems
2.1.1 Factors that impact on network performance
2.1.2 Elements of Ethernet/802.3 networks
2.1.3 Half-duplex Ethernet
2.1.4 Network congestion
2.1.5 Network latency
2.1.6 Ethernet 10BaseT transmission time
2.1.7 The benefit of using repeaters
2.2 Full-Duplex Transmitting, Fast Ethernet Standard and LAN Segmentation
2.2.1 Full-duplex Ethernetl
2.2.2 LAN segmentationl
2.2.3 LAN segmentation with bridges
2.2.4 The pros and cons of LAN segmentation with routers
2.2.5 Pros and cons of LAN segmentation with switches
2.3 Switching and VLANs
2.3.1 Describe the two basic operations of a switch
2.3.2 Ethernet switch latency
2.3.3 Layer 2 and Layer 3 switching
2.3.4 Microsegmentation
2.3.5 How a switch learns addresses
2.3.6 Benefits of LAN switching
2.3.7 Symmetric and asymmetric switching
2.3.8 Memory buffering
2.3.9 Two switching methods
2.3.10 How to set up VLANs
2.4 The Spanning-Tree Protocol
2.4.1 Overview of the spanning-tree protocol
2.4.2 Describe the five spanning-tree protocol states
Chapter 3: VLANS
3.1 VLANs
3.1.1 Existing shared LAN configurations
3.2 Segmentation with switching architectures
3.2.1 Grouping geographically separate users into network-wide virtual topologies
3.2.2 Differences between traditional switched LAN and VLANs
3.2.3 The transport of VLANs across backbones
3.2.4 The role of routers in VLANs
3.2.5 How frames are used in VLANs
3.3 VLAN Implementation
3.3.1 The relationship between ports, VLANs, and broadcasts
3.3.2 Why port-centric VLANs make an administrator's job easier
3.3.3 Static VLANs
3.3.4 Dynamic VLANs
3.4 Benefits of VLANs
3.4.1 How VLANs make additions, moves, and changes easier
3.4.2 How VLANs help control broadcast activity
3.4.3 How VLANs can improve network security
3.4.4 How VLANs can save money
Chapter 4: LAN Design
4.1 LAN Design Goals and Components
4.1.1 LAN design goals
4.1.2 Critical components of LAN Design
4.1.3 The function and placement of servers when designing a network
4.1.4 Intranet
4.1.5 Why contention is an issue with Ethernet
4.1.6 How broadcast domains relate to segmentation
4.1.7 The difference between bandwidth and broadcast domains
4.2 Network Design Methodology
4.2.1 Gathering and analyzing requirements
4.2.2 Factors that affect network availability
4.2.3 Physical topologies used in networking
4.3 Layer 1 Design
4.3.1 Designing the Layer 1 Topology : signaling method, medium type, and maximum length
4.3.2 Diagramming a standards-based Ethernet cable run from the workstation to the HCC, including distances
4.3.3 HCC, VCC, MDF, IDF, and POP
4.3.4 10Base-T and 100Base-TX Ethernet
4.3.5 Elements of a logical topology diagram
4.4 Layer 2 Design
4.4.1 Common Layer 2 devices and their impact on network domains
4.4.2 Asymmetric switching
4.4.3 The effect microsegmentation can have on a network
4.4.4 Determining the number of cable runs and drops
4.4.5 Determining the size of collision domains in hubbed and switched networks
4.4.6 Diagraming hub placement in a standards-based extended star topology
4.4.7 Migrating a network from 10 Mbps to 100 Mbps
4.5 Layer 3 Design
4.5.1 Using routers as the basis for Layer 3 network design
4.5.2 How VLANs can create smaller broadcast domains
4.5.3 Explain how a router provides structure to a network
4.5.4 Why large, scalable LANs need to incorporate routers
4.5.5 Diagramming a standards-based LAN that uses routers
4.5.6 Logical and physical network maps
Chapter 5: Routing Protocols: IGRP
5.1 The Network Layer Basics
5.1.1 Explain path determination
5.1.2 Path determination
5.1.3 The operation of routing tables
5.1.4 Metrics
5.1.5 Router forwarding decisions
5.2 Routed and Routing Protocols
5.2.1 Routing Protocols
5.2.2 Multiprotocol routing
5.3 IP Routing Protocols
5.3.1 Differentiating one routing protocol from another
5.3.2 The goals of routing protocols
5.3.3 Routing loops
5.3.4 Static and dynamic routing
5.3.5 Classifications of routing protocols
5.3.6 IP Routing Configuration: Choosing a routing protocol
5.4 IGRP Operation
5.4.1 IGRP's Metrics
5.4.2 Differentiating from interior, system, and exterior routes
5.4.3 Write out a correct command sequence for enabling IGRP on arouter
5.4.4 Describe three features of IGRP which enhance its stability
5.4.5 IGRP metrics and routing updates
5.4.6 The maximum hop count of IGRP
Chapter 6: ACLs
6.1 Access Control Lists (ACLs)
6.1.1 What are ACLs
6.1.2 Reasons to create ACLs
6.1.3 Testing packets with ACLs
6.1.4 How ACLs work
6.1.5 Flowchart of the ACL test matching process
6.2 ACL Configuration Tasks
6.2.1 Creating ACLs
6.2.2 The purpose and function of wildcard mask bits
6.2.3 The any command
6.2.4 The host command
6.3 Standard ACLs
6.3.1 What are standard ACLs
6.3.2 Writing a valid standard ACL command using all available parameters
6.3.3 How to verify access lists
6.3.4 Writing a standard ACL to permit traffic from a source network
6.3.5 Writing a standard ACL to deny a specific host
6.3.6 Writing a standard ACL to deny a specific subnet
6.4 Extended ACLs
6.4.1 What are extended ACLs
6.4.2 Extended ACL parameters
6.4.3 UDP and TCP port numbers
6.4.4 Writing an ACL for denying FTP on an Ethernet interface
6.4.5 Writing an ACL that denies Telnet out of an Ethernet port and permits all other traffic
6.5 Named ACLs
6.5.1 Configuring named ACLs
6.5.2 The deny command
6.5.3 The permit command
6.6 Using ACLs with protocols
6.6.1 Protocols for which ACLs can be created
6.7 Placing ACLs
6.7.1 Rule: "Putting the extended ACL as close as possible to the source of traffic denied"
6.7.2 Using ACLs in firewall routers
6.7.3 A firewall architecture to protect you from intruders
6.8 Verifying ACLs
6.8.1 How to verify ACLs and interpret the output
Chapter 7: Novell IPX
7.1 Cisco Routers in Netware Networks
7.1.1 The Novell IPX protocols suite
7.1.2 IPX features
7.1.3 IPX addressing
7.2 Novell Encapsulation
7.2.1 Netware Ethernet encapsulation terms
7.2.2 The IOS encapsulation names for Ethernet, FDDI, and Token Ring
7.2.3 The IPX packet format
7.3 Novell Routing
7.3.1 Novell RIP
7.3.2 Service advertising protocol
7.3.3 Get nearest server protocol
7.4 Novell IPX Configuration
7.4.1 Novell IPX configuration tasks
7.4.2 Writing a valid IOS command sequence to assign IPX network numbers to interface
7.4.3 Writing a valid IOS commands for monitoring and troubleshooting IPX
7.5 Monitoring and Managing an IPX Network
7.5.1 Writing a valid IOS commands for monitoring the status of an IPX interface
7.5.2 Writing a valid IOS command sequence to monitor IPX routing tables
7.5.3 Writing a valid IOS command sequence for monitoring Novell IPX servers
7.5.4 Writing a valid IOS command to monitor IPX traffic, and describe some of the field options for that command
7.5.5 Writing a valid IOS command for troubleshooting IPX routing
7.5.6 Writing a valid IOS command for troubleshooting IPX SAP
7.5.7 Using the privileged IPX ping command
7.5.8 Using the user IPX IPX ping command