CCNA + CCNP Enterprise v1.1

Course Content

CCNA 200-301

  • 1.1 Explain the role and function of network components
  • 1.1.a Routers
  • 1.1.b Layer 2 and Layer 3 switches
  • 1.1.c Next-generation firewalls and IPS
  • 1.1.d Access points
  • 1.1.e Controllers (Cisco DNA Center and WLC)
  • 1.1.f Endpoints
  • 1.1.g Servers
  • 1.1.h PoE
  • 1.2 Describe characteristics of network topology architectures
  • 1.2.a Two-tier
  • 1.2.b Three-tier
  • 1.2.c Spine-leaf
  • 1.2.d WAN
  • 1.2.e Small office/home office (SOHO)
  • 1.2.f On-premise and cloud
  • 1.3 Compare physical interface and cabling types
  • 1.3.a Single-mode fiber, multimode fiber, copper
  • 1.3.b Connections (Ethernet shared media and point-to-point)
  • 1.4 Identify interface and cable issues (collisions, errors, mismatch duplex, and/or
    speed)
  • 1.5 Compare TCP to UDP
  • 1.6 Configure and verify IPv4 addressing and subnetting
  • 1.7 Describe the need for private IPv4 addressing
  • 1.8 Configure and verify IPv6 addressing and prefix
  • 1.9 Describe IPv6 address types
  • 1.9.a Unicast (global, unique local, and link local)
  • 1.9.b Anycast
  • 1.9.c Multicast
  • 1.9.d Modified EUI 64
  • 1.10 Verify IP parameters for Client OS (Windows, Mac OS, Linux)
  • 1.11 Describe wireless principles
  • 1.11.a Nonoverlapping Wi-Fi channels
  • 1.11.b SSID
  • 1.11.c RF
  • 1.11.d Encryption
  • 1.12 Explain virtualization fundamentals (server virtualization, containers, and VRFs)
  • 1.13 Describe switching concepts
  • 1.13.a MAC learning and aging
  • 1.13.b Frame switching
  • 1.13.c Frame flooding
  • 1.13.d MAC address table

CCNP Encor 350-401 v1.1

  • 1.1 Explain the different design principles used in an enterprise network
  • 1.1.a Enterprise network design such as Tier 2, Tier 3, and Fabric Capacity planning
  • 1.1.b High availability techniques such as redundancy, FHRP, and SSO
  • 1.2 Analyze design principles of a WLAN deployment
  • 1.2.a Wireless deployment models (centralized, distributed, controller-less, controller
    based, cloud, remote branch)
  • 1.2.b Location services in a WLAN design
  • 1.3 Differentiate between on-premises and cloud infrastructure deployments
  • 1.4 Explain the working principles of the Cisco SD-WAN solution
  • 1.4.a SD-WAN control and data planes elements
  • 1.4.b Traditional WAN and SD-WAN solutions
  • 1.5 Explain the working principles of the Cisco SD-Access solution
  • 1.5.a SD-Access control and data planes elements
  • 1.5.b Traditional campus interoperating with SD-Access
  • 1.6 Describe concepts of wired and wireless QoS
  • 1.6.a QoS components
  • 1.6.b QoS policy
  • 1.7 Differentiate hardware and software switching mechanisms
  • 1.7.a Process and CEF
  • 1.7.b MAC address table and TCAM
  • 1.7.c FIB vs. RI
  • 2.1 Describe device virtualization technologies
    2.1.a Hypervisor type 1 and 2
  • 2.1.b Virtual machine
  • 2.1.c Virtual switching
  • 2.2 Configure and verify data path virtualization technologies
  • 2.2.a VRF
  • 2.2.b GRE and IPsec tunneling
  • 2.3 Describe network virtualization concepts
  • 2.3.a LISP
  • 2.3.b VXLAN
  • 3.1 Layer 2
  • 3.1.a Troubleshoot static and dynamic 802.1q trunking protocols
  • 3.1.b Troubleshoot static and dynamic EtherChannels
  • 3.1.c Configure and verify common Spanning Tree Protocols (RSTP and MST)
  • 3.2 Layer 3
  • 3.2.a Compare routing concepts of EIGRP and OSPF (advanced distance vector vs.
    linked state, load balancing, path selection, path operations, metrics)
  • 3.2.b Configure and verify simple OSPF environments, including multiple normal
    areas, summarization, and filtering (neighbor adjacency, point-to-point and
    broadcast network types, and passive interface)
  • 3.2.c Configure and verify eBGP between directly connected neighbors (best path
    selection algorithm and neighbor relationships)
  • 3.3 Wireless
  • 3.3.a Describe Layer 1 concepts, such as RF power, RSSI, SNR, interference noise,
    band and channels, and wireless client devices capabilities
  • 3.3.b Describe AP modes and antenna types
  • 3.3.c Describe access point discovery and join process (discovery algorithms, WLC
    selection process)
  • 3.3.d Describe the main principles and use cases for Layer 2 and Layer 3 roaming
  • 3.3.e Troubleshoot WLAN configuration and wireless client connectivity issues
  • 3.4 IP Services
  • 3.4.a Describe Network Time Protocol (NTP)
  • 3.4.b Configure and verify NAT/PAT
  • 3.4.c Configure first hop redundancy protocols, such as HSRP and VRRP
  • 3.4.d Describe multicast protocols, such as PIM and IGMP v2/v3
  • 4.1 Diagnose network problems using tools such as debugs, conditional debugs, trace route,
    ping, SNMP, and syslog
  • 4.2 Configure and verify device monitoring using syslog for remote logging
  • 4.3 Configure and verify NetFlow and Flexible NetFlow
  • 4.4 Configure and verify SPAN/RSPAN/ERSPAN
  • 4.5 Configure and verify IPSLA
  • 4.6 Describe Cisco DNA Center workflows to apply network configuration, monitoring, and
    management
  • 4.7 Configure and verify NETCONF and RESTCONF
  • 5.1 Configure and verify device access control
  • 5.1.a Lines and password protection
  • 5.1.b Authentication and authorization using AAA
  • 5.2 Configure and verify infrastructure security features
  • 5.2.a ACLs
  • 5.2.b CoPP
  • 5.3 Describe REST API security
  • 5.4 Configure and verify wireless security features
  • 5.4.a EAP
  • 5.4.b WebAuth
  • 5.4.c PSK
  • 5.5 Describe the components of network security design
  • 5.5.a Threat defense
  • 5.5.b Endpoint security
  • 5.5.c Next-generation firewall
  • 5.5.d TrustSec, MACsec
  • 5.5.e Network access control with 802.1X, MAB, and WebAuth
  • 6.1 Interpret basic Python components and scripts
  • 6.2 Construct valid JSON encoded file
  • 6.3 Describe the high-level principles and benefits of a data modeling language, such as
    YANG
  • 6.4 Describe APIs for Cisco DNA Center and vManage
  • 6.5 Interpret REST API response codes and results in payload using Cisco DNA Center and
    RESTCONF
  • 6.6 Construct EEM applet to automate configuration, troubleshooting, or data collection
  • 6.7 Compare agent vs. agentless orchestration tools, such as Chef, Puppet, Ansible, and
    SaltStack

CCNP ENARSI 300-410 v1.1

  • 1.1 Troubleshoot administrative distance (all routing protocols)
  • 1.2 Troubleshoot route map for any routing protocol (attributes, tagging, filtering)
  • 1.3 Troubleshoot loop prevention mechanisms (filtering, tagging, split horizon, route
    poisoning)
  • 1.4 Troubleshoot redistribution between any routing protocols or routing sources
  • 1.5 Troubleshoot manual and auto-summarization with any routing protocol
  • 1.6 Configure and verify policy-based routing
  • 1.7 Configure and verify VRF-Lite
  • 1.8 Describe Bidirectional Forwarding Detection
  • 1.9 Troubleshoot EIGRP (classic and named mode)
  • 1.9.a Address families (IPv4, IPv6)
  • 1.9.b Neighbor relationship and authentication
  • 1.9.c Loop-free path selections (RD, FD, FC, successor, feasible successor, stuck in
    active)
  • 1.9.d Stubs
  • 1.9.e Load balancing (equal and unequal cost)
  • 1.9.f Metrics
  • 1.10 Troubleshoot OSPF (v2/v3)
  • 1.10.a Address families (IPv4, IPv6)
  • 1.10.b Neighbor relationship and authentication
  • 1.10.c Network types, area types, and router types
  • 1.10.c (i) Point-to-point, multipoint, broadcast, nonbroadcast
  • 1.10.c (ii) Area type: backbone, normal, transit, stub, NSSA, totally stub
  • 1.10.c (iii) Internal router, backbone router, ABR, ASBR
  • 1.10.c (iv)Virtual link
  • 1.10.d Path preference
  • 1.11 Troubleshoot BGP (Internal and External)
  • 1.11.a Address families (IPv4, IPv6)
  • 1.11.b Neighbor relationship and authentication (next-hop, mulithop, 4-byte AS, private
    AS, route refresh, synchronization, operation, peer group, states and timers)
  • 1.11.c Path preference (attributes and best-path)
  • 1.11.d Route reflector (excluding multiple route reflectors, confederations, dynamic
    peer)
  • 1.11.e Policies (inbound/outbound filtering, path manipulation)
  • 2.1 Describe MPLS operations (LSR, LDP, label switching, LSP)
  • 2.2 Describe MPLS Layer 3 VPN
  • 2.3 Configure and verify DMVPN (single hub)
  • 2.3.a GRE/mGRE
  • 2.3.b NHRP
  • 2.3.c IPsec
  • 2.3.d Dynamic neighbor
  • 2.3.e Spoke-to-spoke
  • 3.1 Troubleshoot device security using IOS AAA (TACACS+, RADIUS, local database)
  • 3.2 Troubleshoot router security features
  • 3.2.a IPv4 access control lists (standard, extended, time-based)
  • 3.2.b IPv6 traffic filter
  • 3.2.c Unicast reverse path forwarding (uRPF)
  • 3.3 Troubleshoot control plane policing (CoPP) (Telnet, SSH, HTTP(S), SNMP, EIGRP, OSPF,
    BGP)
  • 3.4 Describe IPv6 First Hop security features (RA guard, DHCP guard, binding table, ND
    inspection/snooping, source guard)
  • 4.1 Troubleshoot device management
    4.1.a Console and VTY
  • 4.1.b Telnet, HTTP, HTTPS, SSH, SCP
    4.1.c (T)FTP
  • 4.2 Troubleshoot SNMP (v2c, v3)
  • 4.3 Troubleshoot network problems using logging (local, syslog, debugs, conditional debugs,
    timestamps)
  • 4.4 Troubleshoot IPv4 and IPv6 DHCP (DHCP client, IOS DHCP server, DHCP relay, DHCP
    options)
  • 4.5 Troubleshoot network performance issues using IP SLA (jitter, tracking objects, delay,
    connectivity
  • 4.6 Troubleshoot NetFlow (v5, v9, flexible NetFlow)
  • 4.7 Troubleshoot network problems using Cisco DNA Center assurance (connectivity,
    monitoring, device health, network health)

Contact Us

Fill out the form below. We will contact you soon!