Network Engineer Training Course

Network building and maintenance requires a certain level of expertise, and certification training courses are a popular way of increasing one’s knowledge and scope of learning as well as validating t...

  • All levels
  • English

Course Description

Network building and maintenance requires a certain level of expertise, and certification training courses are a popular way of increasing one’s knowledge and scope of learning as well as validating their skills in the field. All IT professionals, from the beginner level to expert, can benefit from a certification in terms of their career. Certification training courses in networking from various...

Network building and maintenance requires a certain level of expertise, and certification training courses are a popular way of increasing one’s knowledge and scope of learning as well as validating their skills in the field. All IT professionals, from the beginner level to expert, can benefit from a certification in terms of their career. Certification training courses in networking from various vendors offer different levels of learning using different platforms to successfully build, operate as well as manage both physical and virtual networks. Networking certification training courses offer various knowledge and expertise levels in terms of network building, implementation, management, and optimization. A networking certified professional is held in high regard by the organization, and they are typically offered better job opportunities with higher pay. The certification training courses offered in network security from Cisco and CompTIA are in great demand.

What you’ll learn
  • Live Class Practical Oriented Training
  • Timely Doubt Resolution
  • Dedicated Student Success Mentor
  • Certification & Job Assistance
  • Free Access to Workshop & Webinar
  • No Cost EMI Option
  • Network fundamentals in the form of network components, topology, virtualization, switching concepts, and more
  • Install, operate, configure IPV4 to IPV6 networks. Installing switches to perform the initial configuration
  • Understanding routing and implementation of a Cisco router. Host-to-host communication through routers and switches
  • Resolve network issues and common problems with IPv4 addressing. VLANs, trunks, and inter-VLAN Routing
  • Advance routing and infrastructure technologies covered in ENCOR
  • Best practices for configuring routing protocols in the data center and branch
  • Overlay network design by using solutions such as SD-Access and SD-WAN
  • Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers
  • Troubleshoot Layer 2 connectivity using VLANs and trunking
  • Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP)
  • Implementing External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed netw...
  • Overlay network design by using solutions such as SD-Access and SD-WAN
  • Describe the components and features of the Cisco SD-Access solution, including the nodes, fabric control plane, and dat...
  • Describe the concepts, purpose, and features of multicast protocols, including Internet Group Management Protocol (IGMP)...

Covering Topics

1
Module-1 CompTIA N+

2
Module-2 (CCNA) - 200-301 Cisco Certified Network Associate

3
Module-3 (CCNP) 350-401 ENCOR

4
Module 4 Choose any 1 Specialization Field

5
Module 4 Exam:300-410 (A)

6
Module 4 Exam:300-415 (B)

7
Module-4 Exam:300-420 (C)

8
Module-4 Exam:300-425 (D)

9
Module-4 Exam:300-430 (E)

10
Module-4 Exam:300-435 (F)

Curriculum

      Module-1 CompTIA N+
    Part 1: Networking Concepts 
    ·      Lecture 1: Explain the purposes and uses of ports and protocols.
    
    ·      Protocols and ports
    
    ·      Protocol types
    
    ·      Connection-oriented vs. connectionless
    
    ·      Practical Exercise              
    
    ·      Lecture 2: Explain  devices, applications, protocols and services at their appropriate OSI layers
    
    ·      Layer 1-   Physical
    
    ·      Layer 2 -  Data link
    
    ·      Layer3 - Network
    
    ·      Layer4 – Transport
    
    ·      Layers - Session
    
    ·      Layer6 – Presentation
    
    ·      Layer7 –Application
    
    ·      Practical Exercise              
    
    ·      Lecture 3: Explain  the concepts and characteristics of routing and switching
    
    ·      Properties of network traffic
    
    ·      Segmentation and interface properties
    
    ·      Routing
    
    ·      1Pv6 concepts
    
    ·      Performance concepts
    
    ·      NAT/PAT
    
    ·      Port forwarding
    
    ·      Access control list
    
    ·      Distributed switching
    
    ·      Packet-switched vs. circuit
    
    ·      switched network
    
    ·      Software-defined networking
    
    ·      Practical Exercise              
    
    ·      Lecture 4: Given a scenario, configure  the appropriate IP addressing components
    
    ·      Private  vs. public
    
    ·      Loop back and reserved
    
    ·      Default  gateway
    
    ·      Virtual  IP
    
    ·      Subnet  mask
    
    ·      Subnetting
    
    ·      Address assignments
    
    ·      Practical Exercise              
    
    ·      Lecture 5: Compare and contrast the characteristics of network topologies, types and technologies
    
    ·      Wired  topologies
    
    ·      Types         
    
    ·      Technologies  that  facilitate the Internet of Things (loT)
    
    ·      Wireless  topologies          
    
    ·      Practical Exercise  
    
    ·      Lecture 6: Given a scenario, implement the appropriate wireless technologies and configurations
    
    ·      802.11   standards
    
    ·      Cellula
    
    ·      Frequencies
    
    ·      Speed and distance  requirements
    
    ·      Channel bandwidth
    
    ·      Channel bonding
    
    ·      MIMO/MU-MIMO
    
    ·      Unidirectional/omnidirectional
    
    ·      Site surveys           
    
    ·      Practical Exercise  
    
    ·      Lecture 7: Summarize cloud concepts and their purposes
    
    ·      Types of services
    
    ·      Cloud delivery models
    
    ·      Connectivity methods
    
    ·      Security implications/considerations
    
    ·      Relationship between  local and cloud resources              
    
    ·      Practical Exercise
    
    ·      Lecture 8: Explain the functions of network services
    
    ·      DNS  service
    
    ·      DHCP  service
    
    ·      NTP
    
    ·      IPAM
    
    ·      Practical Exercise              
    
    Part 2: Infrastructure 
    ·      Lecture 9: Given a scenario, deploy the appropriate cabling solution
    
    ·      Media types
    
    ·      Plenum vs. PVC
    
    ·      Connector  types
    
    ·      Transceivers
    
    ·      Termination   points
    
    ·      Copper cable standards
    
    ·      Copper termination  standards
    
    ·      Ethernet deployment standards    
    
    ·      Practical Exercise  
    
    ·     Lecture 10: Given a scenario, determine  the appropriate placement of networking devices on a network and install/configure them
    
    ·      Firewall
    
    ·      Router
    
    ·      Switch
    
    ·      Hub
    
    ·      Bridge
    
    ·      Modems
    
    ·      Wireless  access point
    
    ·      Media converter
    
    ·      Wireless  range extender
    
    ·      VoIP endpoint      
    
    ·      Practical Exercise  
    
    ·      Lecture 11: Explain the purposes and use cases  for advanced networking devices
    
    ·      Multilayer switch
    
    ·      Proxy server
    
    ·      NGFW/Layer 7 firewall
    
    ·      Wireless  controller
    
    ·      VPN concentrator
    
    ·      VoIP PBX
    
    ·      Load balancer
    
    ·      IDS/IPS     
    
    ·      AANRADIUS server
    
    ·      UTM appliance      
    
    ·      VoIP gateway
    
    ·      Content  filter        
    
    ·      Practical Exercise  
    
    ·      Lecture 12: Explain the purposes of virtualization and network storage  technologies
    
    ·      Virtual  networking components
    
    ·      Network  storage  types
    
    ·      Connection  type
    
    ·      Jumbo frame
    
    ·      Practical Exercise              
    
    ·      Lecture 13: Compare and contrast WAN technologies
    
    ·      Service type
    
    ·      Transmission  mediums
    
    ·      Characteristics   of service
    
    ·      Termination
    
    ·      Practical Exercise              
    
    Part 3: Network Operations 
    ·     Lecture 14: Given a scenario, use appropriate documentation and diagrams to manage  the network
    
    ·      Diagram symbols
    
    ·      Standard operating procedures/
    
    ·      work instructions
    
    ·      Logical vs. physical diagrams
    
    ·      Rack diagrams
    
    ·      Change management documentation
    
    ·      Wiring and port locations
    
    ·      IDF/MDF documentation
    
    ·      Labelling
    
    ·      Network configuration and performance baselines
    
    ·      Inventory management
    
    ·      Practical Exercise              
    
    ·      Lecture 15: Compare and contrast business continuity and disaster recovery concepts
    
    ·      Availability concepts
    
    ·      Recovery
    
    ·      MTBF
    
    ·      SLA  requirements
    
    ·      Practical Exercise  
    
    ·     Lecture 16: Explain common scanning, monitoring and patching processes and summarize their expected outputs
    
    ·      Processes
    
    ·      Event management
    
    ·      Metrics
    
    ·      SNMP monitors    
    
    ·      Practical Exercise  
    
    ·      Lecture 17: Given a scenario, use remote access methods
    
    ·      VPN
    
    ·      RDP
    
    ·      SSH
    
    ·      VNC
    
    ·      Telnet
    
    ·      HTTPS/management  URL
    
    ·      Remote tile access
    
    ·      Out-of-band  management
    
    ·      Practical Exercise  
    
    ·      Lecture 18: Identify policies and best practices
    
    ·      Privileged  user agreement
    
    ·      Password  policy
    
    ·      On-boarding/off-boarding procedures
    
    ·      Licensing  restrictions
    
    ·      International  export  controls
    
    ·      Data loss prevention
    
    ·      Remote access policies
    
    ·      Incident response  policies
    
    ·      BYOD
    
    ·      AUP
    
    ·      NDA
    
    ·      System life cycle
    
    ·      Safety procedures  and policies    
    
    ·      Practical Exercise  
    
    Part 4: Network Security 
    ·      Lecture 19: Summarize the purposes of physical security devices
    
    ·      Detection
    
    ·      Prevention             
    
    ·      Practical Exercise
    
    ·      Lecture 20: Explain authentication and access controls
    
    ·      Authorization, authentication and accounting
    
    ·      Multi factor authentication
    
    ·      Access control
    
    ·      Practical Exercise              
    
    ·      Lecture 21: Given a scenario, secure a basic wireless network
    
    ·      WPA
    
    ·      WPA2
    
    ·      TKIP-RC4
    
    ·      CCMP-AES
    
    ·      Authentication  and authorization
    
    ·      Geofencing
    
    ·      Practical Exercise  
    
    ·      Lecture 22: Summarize common networking attacks
    
    ·      Dos
    
    ·      Rogue access point
    
    ·      Spoofing
    
    ·      Evil twin
    
    ·      Deauthentication
    
    ·      War-driving
    
    ·      Brute force
    
    ·      Phishing
    
    ·      VLAN hopping
    
    ·      Social engineering
    
    ·      Ransomware
    
    ·      Man-in-the-middle
    
    ·      Insider  threat
    
    ·      DNS poisoning
    
    ·      Exploits  vs. vulnerabilities
    
    ·      Logic bomb
    
    ·      ARP poisoning      
    
    ·      Practical Exercise  
    
    ·      Lecture 23: Given a scenario, implement network  device hardening
    
    ·      Changing  default  credentials
    
    ·      Avoiding  common  passwords
    
    ·      Upgrading  firmware
    
    ·      Patching  and updates
    
    ·      File hashing
    
    ·      Disabling  unnecessary  services
    
    ·      Using secure protocols
    
    ·      Generating  new keys
    
    ·      Disabling  unused ports     
    
    ·      Practical Exercise  
    
    ·      Lecture 24: Explain common mitigation techniques and their purposes
    
    ·      Signature  management
    
    ·      Device hardening
    
    ·      Change native  VLAN
    
    ·      Switch  port  protection
    
    ·      Network  segmentation
    
    ·      Privileged  user account
    
    ·      File integrity  monitoring
    
    ·      Role separation
    
    ·      Restricting  access via ACLs
    
    ·      Honeypot/honeynet
    
    ·      Penetration testing
    
    ·      Practical Exercise  
    
    Part 5: Network Troubleshooting and Tools 
    ·      Lecture 25: Explain the network troubleshooting methodology
    
    ·      Identify the problem
    
    ·      Establish a theory of probable cause
    
    ·      Test the theory to determine the cause
    
    ·      Document findings, actions, and outcomes
    
    ·      Establish a plan of action to resolve the problem and identify potential effects
    
    ·      Implement the solution or escalate as necessary
    
    ·      Verify full system functionality and, if applicable, implement preventive measures
    
    ·      Practical Exercise
    
    ·      Lecture 26: Given a scenario, use the appropriate tool
    
    ·      Hardware tools
    
    ·      Software tools       
    
    ·      Practical Exercise  
    
    ·      Lecture 27: Given a scenario, troubleshoot common wired connectivity and performance issues
    
    ·      Attenuation
    
    ·      Latency
    
    ·      Jitter
    
    ·      Crosstalk
    
    ·      EMI
    
    ·      Open/short
    
    ·      Incorrect  pin-out
    
    ·      Incorrect  cable type
    
    ·      Bad port
    
    ·      Transceiver  mismatch
    
    ·      TX/RX reverse
    
    ·      Duplex/speed   mismatch
    
    ·      Damaged cables
    
    ·      Bent pins
    
    ·      Bottlenecks
    
    ·      VLAN mismatch
    
    ·      Network  connection LED status indicators                     
    
    ·      Practical Exercise
    
    ·      Lecture 28: Given a scenario, troubleshoot common wireless connectivity and performance issues
    
    ·      Reflection
    
    ·      Refraction
    
    ·      Absorption
    
    ·      Latency     
    
    ·      Jitter
    
    ·      Attenuation
    
    ·      Incorrect antenna type
    
    ·      Interference
    
    ·      Incorrect antenna placement
    
    ·      Channel overlap
    
    ·      Overcapacity
    
    ·      Distance limitations
    
    ·      Frequency mismatch
    
    ·      Wrong SSID
    
    ·      Wrong passphrase
    
    ·      Security type mismatch
    
    ·      Power levels
    
    ·      Signal-to-noise ratio
    
    ·      Practical Exercise              
    
    ·      Lecture 29: Given a scenario, troubleshoot common network service issues
    
    ·      Names not resolving
    
    ·      Incorrect gateway
    
    ·      Incorrect netmask
    
    ·      Duplicate IP addresses
    
    ·      Duplicate MAC addresses
    
    ·      Expired  IP address
    
    ·      Rogue DHCP server
    
    ·      Untrusted SSL certificate
    
    ·      Incorrect  time
    
    ·      Exhausted  DHCP scope
    
    ·      Blocked TCP/UDP ports
    
    ·      Incorrect host-based firewall settings
    
    ·      Incorrect ACL settings
    
    ·      Unresponsive service
    
    ·      Hardware failure
    
    ·      Practical Exercise
      Module-2 (CCNA) - 200-301 Cisco Certified Network Associate
    Part-1 Network Fundamentals 
    ·       Lecture 1: Explain the role and function of network components 
    
    ·       Routers
    
    ·       L2 and L3 switches
    
    ·       Next-generation firewalls and IPS
    
    ·       Access points
    
    ·       Controllers (Cisco DNA Center and WLC)
    
    ·       Endpoints
    
    ·       Servers
    
    ·       Practical Exercise   
    
    ·       Lecture 2: Describe characteristics of network topology architectures 
    
    ·       2 tier
    
    ·       3 tier
    
    ·       Spine-leaf
    
    ·       WAN
    
    ·       Small office/home office (SOHO)
    
    ·       On-premises and cloud
    
    ·       Practical Exercise  
    
    ·       Lecture 3: Compare physical interface and cabling types 
    
    ·       Single-mode fiber, multimode fiber, copper
    
    ·       Connections (Ethernet shared media and point-to-point)
    
    ·       Concepts of PoE
    
    ·       Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)
    
    ·       Compare TCP to UDP
    
    ·       Configure and verify IPv4 addressing and subnetting
    
    ·       Describe the need for private IPv4 addressing
    
    ·       Configure and verify IPv6 addressing and prefix 
    
    ·       Practical Exercise
    
    ·       Lecture 4: Compare IPv6 address types
    
    ·       Global unicast
    
    ·       Unique local
    
    ·       Link local
    
    ·       Anycast
    
    ·       Multicast
    
    ·       Modified EUI 64
    
    ·       Windows, Mac OS, Linux
    
    ·       Practical Exercise
    
    ·       Lecture 5: Verify IP parameters for Client OS 
    
    ·       Windows
    
    ·       Mac OS
    
    ·       Linux
    
    ·       Practical Exercise
    
    ·       Lecture 6: Describe wireless principles and virtualization fundamentals 
    
    ·       Non overlapping Wi-Fi channels
    
    ·       SSID
    
    ·       RF
    
    ·       Encryption 
    
    ·       Practical Exercise  
    
    ·       Lecture 7: Describe switching concepts 
    
    ·       MAC learning and aging
    
    ·       Frame switching
    
    ·       Frame flooding
    
    ·       MAC address table
    
    ·       Practical Exercise
    
    Part-2 Network Access 
    ·       Lecture 8: Configure and verify VLANs (normal range) spanning multiple switches 
    
    ·       Access ports (data and voice)
    
    ·       Default VLAN
    
    ·       Connectivity
    
    ·       Practical Exercise
    
    ·       Lecture 9: Configure and verify inter-switch connectivity
    
    ·       Trunk ports
    
    ·       802.1Q
    
    ·       Native VLAN
    
    ·       Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)
    
    ·       Configure and verify (Layer 2/Layer 3) Ether Channel (LACP)
    
    ·       Practical Exercise
    
    ·       Lecture 10: Describe the need for and basic operations of Rapid PVST+ Spanning Tree
    
    ·       Protocol and identify basic operations 
    
    ·       Root port, root bridge (primary/secondary), and other port names
    
    ·       Port states (forwarding/blocking)
    
    ·       PortFast benefits
    
    ·       Compare Cisco Wireless Architectures and AP modes
    
    ·       Describe physical infrastructure connections of WLAN components (AP,WLC, access/trunk
    
    ·       ports, and LAG)
    
    ·       Describe AP and WLC management access connections (Telnet, SSH, HTTP,HTTPS,
    
    ·       console, and TACACS+/RADIUS)
    
    ·       Configure the components of a wireless LAN access for client  connectivity using GUI only
    
    ·       such as WLAN creation, security settings, QoS profiles, and advanced WLAN settings
    
    ·       Practical Exercise
    
    Part-3 IP Connectivity 
    ·       Lecture 11: Interpret the components of routing table
    
    ·       Routing protocol code
    
    ·       Prefix
    
    ·       Network mask
    
    ·       Next hop
    
    ·       Administrative distance
    
    ·       Metric
    
    ·       Gateway of last resort
    
    ·       Practical Exercise
    
    ·       Lecture 12: Determine how a router makes a forwarding decision by default
    
    ·       Longest match
    
    ·       Administrative distance
    
    ·       Routing protocol metric
    
    ·       Practical Exercise
    
    ·       Lecture 13: Configure and verify IPv4 and IPv6 static routing 
    
    ·       Default route
    
    ·       Network route
    
    ·       Host route
    
    ·       Floating static
    
    ·       Practical Exercise
    
    ·       Lecture 14: Configure and verify single area OSPFv2
    
    ·       Neighbour adjacencies
    
    ·       Point-to-point
    
    ·       Broadcast (DR/BDR selection)
    
    ·       Router ID
    
    ·       Describe the purpose of first hop redundancy protocol
    
    ·       Practical Exercise
    
    Part-4 IP Services 
    ·       Lecture 15: Configure and verify inside source NAT using static and pools
    
    ·       Lecture 16: Configure and verify NTP operating in a client and server mode
    
    ·       Lecture 17: Explain the role of DHCP and DNS within the network
    
    ·       Lecture 18: Explain the function of SNMP in network operations
    
    ·       Lecture 29: Describe the use of syslog features including facilities and levels
    
    ·       Lecture 20: Configure and verify DHCP client and relay
    
    ·       Lecture 21: Explain the forwarding per-hop behavior (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping
    
    ·       Lecture 22: Configure network devices for remote access using SSH
    
    ·       Lecture 23: Describe the capabilities and function of TFTP/FTP in the network
    
    Part-5 Security Fundamentals 
    ·      Lecture 24: Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)
    
    ·      Lecture 25: Describe security program elements (user awareness, training, and physical access control)
    
    ·      Lecture 26: Configure device access control using local passwords
    
    ·      Lecture 27: Describe security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics)
    
    ·      Lecture 28: Describe remote access and site-to-site VPNs
    
    ·      Lecture 29: Configure and verify access control lists
    
    ·      Lecture 30: Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security)
    
    ·      Lecture 31: Differentiate authentication, authorization, and accounting concepts
    
    ·      Lecture 32: Describe wireless security protocols (WPA, WPA2, and WPA3)
    
    ·      Lecture 33: Configure WLAN using WPA2 PSK using the GUI    
    
    Part-6 Automation and Programmability 
    ·       Lecture 34: Describe controller-based and software defined architectures (overlay, underlay and fabric) 
    
    ·       Separation of control plane and data plane
    
    ·       North-bound and south-bound APIs
    
    ·       Explain how automation impacts network management
    
    ·       Compare traditional networks with controller-based networking
    
    ·       Compare traditional campus device management with Cisco DNA Center enabled device
    
    ·       Management
    
    ·       Describe characteristics of REST-based APIs (CRUD, HTTP verbs, and data encoding)
    
    ·       Recognize the capabilities of configuration management mechanisms Puppet, Chef, and
    
    ·       Ansible
    
    ·       Interpret JSON encoded data
    
    ·       Practical Exercise
      Module-3 (CCNP) 350-401 ENCOR
    Part-1 Architecture 
    ·       Lecture-1 Explain the different design principles used in an enterprise network
    
    ·       Enterprise network design such as Tier 2, Tier 3, and Fabric Capacity planning
    
    ·       High availability techniques such as redundancy, FHRP, and SSO
    
    ·       Analyze design principles of a WLAN deployment
    
    ·       Lecture-2 Analyze design principles of a WLAN deployment
    
    ·       Wireless deployment models (centralized, distributed, controller-less, controller based, cloud, remote branch)
    
    ·       Location services in a WLAN design
    
    ·       Differentiate between on-premises and cloud infrastructure deployments
    
    ·       Lecture-3 Explain the working principles of the Cisco SD-WAN solution
    
    ·       SD-WAN control and data planes elements
    
    ·       Traditional WAN and SD-WAN solutions
    
    ·       Lecture-4 Explain the working principles of the Cisco SD-Access solution
    
    ·       SD-Access control and data planes elements
    
    ·       Traditional campus interoperating with SD-Access
    
    ·       Lecture-5 Describe concepts of wired and wireless QoS
    
    ·       QoS components
    
    ·       QoS policy
    
    ·       Lecture-6 Differentiate hardware and software switching mechanisms
    
    ·       Process and CEF
    
    ·       MAC address table and TCAM
    
    ·       FIB vs. RIB
    
    Part-2 Virtualization 
    ·       Lecture-7 Describe device virtualization technologies
    
    ·       Hypervisor type 1 and 2
    
    ·       Virtual machine
    
    ·       Virtual switching
    
    ·       Lecture-8 Configure and verify data path virtualization technologies
    
    ·       VRF
    
    ·       GRE and IPsec tunneling
    
    ·       Lecture-9 Describe network virtualization concepts
    
    ·       LISP
    
    ·       VXLAN
    
    Part-3 Infrastructure 
    ·       Lecture-10 Layer 2
    
    ·       Troubleshoot static and dynamic 802.1q trunking protocols
    
    ·       Troubleshoot static and dynamic EtherChannels
    
    ·       Configure and verify common Spanning Tree Protocols (RSTP and MST)
    
    ·       Lecture-11 Layer 3
    
    ·       Compare routing concepts of EIGRP and OSPF (advanced distance vector vs. linked state, load balancing, path selection, path operations, metrics)
    
    ·       Configure and verify simple OSPF environments, including multiple normal areas, summarization, and filtering (neighbor adjacency, point-to-point and broadcast network types, and passive interface)
    
    ·       Configure and verify eBGP between directly connected neighbors (best path selection algorithm and neighbor relationships)
    
    ·       Lecture-12 Wireless
    
    ·       Describe Layer 1 concepts, such as RF power, RSSI, SNR, interference noise,band and channels, and wireless client devices capabilities
    
    ·       Describe AP modes and antenna types
    
    ·       Describe access point discovery and join process (discovery algorithms, WLC selection process)
    
    ·       Describe the main principles and use cases for Layer 2 and Layer 3 roaming
    
    ·       Troubleshoot WLAN configuration and wireless client connectivity issues
    
    ·       Lecture-13 IPsa Services
    
    ·       Describe Network Time Protocol (NTP)
    
    ·       Configure and verify NAT/PAT
    
    ·       Configure first hop redundancy protocols, such as HSRP and VRRP
    
    ·       Describe multicast protocols, such as PIM and IGMP v2/v3
    
    Part-4 Network Assurance 
    ·       Lecture-14 Diagnose network problems using tools such as debugs, conditional debugs, trace route,ping, SNMP, and syslog
    
    ·       Lecture-15 Configure and verify device monitoring using syslog for remote logging
    
    ·       Lecture-16 Configure and verify NetFlow and Flexible NetFlow
    
    ·       Lecture-17 Configure and verify SPAN/RSPAN/ERSPAN
    
    ·       Lecture-18 Configure and verify IPSLA
    
    ·       Lecture-19 Describe Cisco DNA Center workflows to apply network configuration, monitoring, and management
    
    ·       Lecture-20 Configure and verify NETCONF and RESTCONF
    
    Part-5 Security 
    ·       Lecture-21 Configure and verify device access control
    
    ·       Lines and password protection
    
    ·       Authentication and authorization using AAA
    
    ·       Lecture-22 Configure and verify infrastructure security features
    
    ·       ACLs
    
    ·       CoPP
    
    ·       Describe REST API security
    
    ·       Lecture-23 Configure and verify wireless security features
    
    ·       EAP
    
    ·       WebAuth
    
    ·       PSK
    
    ·       Lecture-24 Describe the components of network security design
    
    ·       Threat defense
    
    ·       Endpoint security
    
    ·       Next-generation firewall
    
    ·       TrustSec, MACsec
    
    ·       Network access control with 802.1X, MAB, and WebAuth
    
    Part-6 Automation 
    ·       Lecture-25 Construct valid JSON encoded file
    
    ·       Lecture-26 Describe the high-level principles and benefits of a data modeling language, such as YANG
    
    ·       Lecture-27 Describe APIs for Cisco DNA Center and vManage
    
    ·       Lecture-28 Interpret REST API response codes and results in payload using Cisco DNA Center and RESTCONF
    
    ·       Lecture-29 Construct EEM applet to automate configuration, troubleshooting, or data collection
    
    ·       Lecture-30 Compare agent vs. agentless orchestration tools, such as Chef, Puppet, Ansible, and SaltStack
      Module 4 Choose any 1 Specialization Field
    Specialization Training 
    To earn CCNP Enterprise, you pass two exams: a core exam and an enterprise concentration exam of your choice. And every exam in the CCNP Enterprise program earns an individual Specialist certification, so you get recognized for your accomplishments along the way.
    
     
    
    The core exam focuses on your knowledge of enterprise infrastructure including dual-stack (IPv4 and IPv6) architecture, virtualization, infrastructure, network assurance, security, and automation. The core exam is also the qualifying exam for CCIE Enterprise Infrastructure and CCIE Enterprise Wireless certifications. Passing the core exam will qualify candidates to schedule and take the CCIE lab within the validity of their core exam.Concentration exams focus on emerging and industry-specific topics such as network design, SD-WAN, wireless, and automation.
      Module 4 Exam:300-410 (A)
    Part-1 Layer 3 technologies 
    ·       Lecture-1 Troubleshoot administrative distance (all routing protocols)
    
    ·       Lecture-2 Troubleshoot route map for any routing protocol (attributes, tagging, filtering)
    
    ·       Lecture-3 Troubleshoot loop prevention mechanisms (filtering, tagging, split horizon, route poisoning)
    
    ·       Lecture-4 Troubleshoot redistribution between any routing protocols or routing sources
    
    ·       Lecture-5 Troubleshoot manual and auto-summarization with any routing protocol
    
    ·       Lecture-6 Configure and verify policy-based routing
    
    ·       Lecture-7 Configure and verify VRF-Lite
    
    ·       Lecture-8 Describe Bidirectional Forwarding Detection
    
    ·       Lecture-9 Troubleshoot EIGRP (classic and named mode)
    
    ·       Address families (IPv4, IPv6)
    
    ·       Neighbor relationship and authentication
    
    ·       Loop-free path selections (RD, FD, FC, successor, feasible successor, stuck in active)
    
    ·       Stubs
    
    ·       Load balancing (equal and unequal cost)
    
    ·       Metrics
    
    ·       Lecture-10 Troubleshoot OSPF (v2/v3)
    
    ·       Address families (IPv4, IPv6)
    
    ·       Neighbor relationship and authentication
    
    ·       Network types, area types, and router types
    
    ·       Point-to-point, multipoint, broadcast, nonbroadcast
    
    ·       Area type: backbone, normal, transit, stub, NSSA, totally stub
    
    ·       Internal router, backbone router, ABR, ASBR
    
    ·       Virtual link
    
    ·       Path preference
    
    ·       Lecture-11 Troubleshoot BGP (Internal and External)
    
    ·       Address families (IPv4, IPv6)
    
    ·       Neighbor relationship and authentication (next-hop, mulithop, 4-byte AS, private AS, route refresh, synchronization, operation, peer group, states and timers)
    
    ·       Path preference (attributes and best-path)
    
    ·       Route reflector (excluding multiple route reflectors, confederations, dynamic peer)
    
    ·       Policies (inbound/outbound filtering, path manipulation)
    
    Part-2 VPN Technologies 
    ·       Lecture-12 Describe MPLS operations (LSR, LDP, label switching, LSP)
    
    ·       Lecture-13 Describe MPLS Layer 3 VPN
    
    ·       Lecture-14 Configure and verify DMVPN (single hub)
    
    ·       GRE/mGRE
    
    ·       NHRP
    
    ·       IPsec
    
    ·       Dynamic neighbor
    
    ·       Spoke-to-spoke
    
    Part-3 Infrastructure Services 
    ·       Lecture-15 Troubleshoot device management
    
    ·       Console and VTY
    
    ·       Telnet, HTTP, HTTPS, SSH, SCP
    
    ·       (T)FTP
    
    ·       Lecture-16 Troubleshoot SNMP (v2c, v3)
    
    ·       Lecture-17 Troubleshoot network problems using logging (local, syslog, debugs, conditional debugs, timestamps)
    
    ·       Lecture-18 Troubleshoot IPv4 and IPv6 DHCP (DHCP client, IOS DHCP server, DHCP relay, DHCP options)
    
    ·       Lecture-19 Troubleshoot network performance issues using IP SLA (jitter, tracking objects, delay, connectivity)
    
    ·       Lecture-201Troubleshoot NetFlow (v5, v9, flexible NetFlow)
    
    ·       Lecture-21 Troubleshoot network problems using Cisco DNA Center assurance (connectivity,monitoring, device health, network health)
      Module 4 Exam:300-415 (B)
    Part-1 Infrastructure Services 
    ·       Lecture-1 Describe Cisco SD-WAN Architecture and Components
    
    ·       Orchestration plane (vBond, NAT)
    
    ·       Management plane (vManage)
    
    ·       Control plane (vSmart, OMP)
    
    ·       Data plane (vEdge)
    
    ·       TLOC
    
    ·       IPsec
    
    ·       vRoute
    
    ·       BFD
    
    ·       Lecture-2 Describe WAN Edge platform types, capabilities (vEdges, cEdges)
    
    Part-2 Controller Deployment 
    ·       Lecture-3 Describe controller cloud deployment
    
    ·       Lecture-4 Describe Controller on-Prem Deployment
    
    ·       Hosting platform (KVM/Hypervisor)
    
    ·       Installing controllers
    
    ·       Scalability and redundancy
    
    ·       Lecture-5 Configure and verify certificates and whitelisting
    
    ·       Lecture-6 Troubleshoot control-plane connectivity between controllers
    
    Part-3 Router Deployment 
    ·       Lecture- 7 Describe WAN Edge deployment
    
    ·       On-boarding
    
    ·       Orchestration with zero-touch provisioning/plug-and-play
    
    ·       Single/multi data center/regional hub deployments
    
    ·       Lecture-8 Configure and verify SD-WAN data plane
    
    ·       Circuit termination/TLOC-extension
    
    ·       Underlay-overlay connectivity
    
    ·       Lecture-9 Configure and verify OMP
    
    ·       Lecture-10 Configure and verify TLOCs
    
    ·       Lecture-11 Configure and verify CLI and vManage feature configuration templates
    
    ·       VRRP
    
    ·       OSPF
    
    ·       BGP
    
    Part-4 Policies 
    ·       Lecture-12 Configure and verify control policies
    
    ·       Lecture-13 Configure and verify data policies
    
    ·       Configure and verify end-to-end segmentation
    
    ·       VPN segmentation
    
    ·       Topologies
    
    ·       Lecture-14 Configure and verify SD-WAN application-aware routing
    
    ·       Lecture-15 Configure and verify direct Internet access
    
    Part-5 Security and Quality of Service 
    ·       Lecture-16 Configure and verify service insertion
    
    ·       Lecture-17 Describe application-aware firewall
    
    ·       Lecture-18 Configure and verify QoS treatment on WAN edge routers
    
    ·       Scheduling
    
    ·       Queuing
    
    ·       Shaping
    
    ·       Policing
    
    Part-6 Management and Operations 
    ·       Lecture-19 Describe monitoring and reporting from vManage
    
    ·       Lecture-20 Configure and verify monitoring and reporting
    
    ·       Lecture-21 Describe REST API monitoring
    
    ·       Lecture-22 Describe software upgrade from vManage
      Module-4 Exam:300-420 (C)
    Part-1 Advanced Addressing and Routing Solutions 
    ·       Lecture-1 Create structured addressing plans for IPv4 and IPv6
    
    ·       Lecture-2 Create stable, secure, and scalable routing designs for IS-IS
    
    ·       Lecture-3 Create stable, secure, and scalable routing designs for EIGRP
    
    ·       Lecture-4 Create stable, secure, and scalable routing designs for OSPF
    
    ·       Lecture-5 Create stable, secure, and scalable routing designs for BGP
    
    ·       Address families
    
    ·       Basic route filtering
    
    ·       Attributes for path preference
    
    ·       Route reflectors
    
    ·       Load sharing
    
    ·       Lecture-6 Determine IPv6 migration strategies
    
    ·       Overlay (tunneling)
    
    ·       Native (dual-stacking)
    
    ·       Boundaries (IPv4/IPv6 translations)
    
    Part-2 Advanced Enterprise Campus Networks 
    ·       Lecture-7 Design campus networks for high availability
    
    ·       First Hop Redundancy Protocols
    
    ·       Platform abstraction techniques
    
    ·       Graceful restart
    
    ·       BFD
    
    ·       Lecture-8 Design campus Layer 2 infrastructures
    
    ·       STP scalability
    
    ·       Fast convergence
    
    ·       Loop-free technologies
    
    ·       PoE and WoL
    
    ·       Lecture-9 Design multicampus Layer 3 infrastructures
    
    ·       Convergence
    
    ·       Load sharing
    
    ·       Route summarization
    
    ·       Route filtering
    
    ·       VRFs
    
    ·       Optimal topologies
    
    ·       Redistribution
    
    ·       Lecture-10 Describe SD-Access Architecture (underlay, overlay, control and data plane, automation, wireless, and security)
    
    ·       Lecture-11 Describe SD-Access fabric design considerations for wired and wireless access (overlay, fabric design, control plan design, border design, segmentation, virtual networks, scalability, over the top and fabric for wireless, multicast)
    
    Part-3 WAN for Enterprise Networks 
    ·       Lecture- 12 Compare WAN connectivity options
    
    ·       Layer 2 VPN
    
    ·       MPLS Layer 3 VPN
    
    ·       Metro Ethernet
    
    ·       DWDM
    
    ·       4G/5G
    
    ·       SD-WAN customer edge
    
    ·       Lecture-13 Design site-to-site VPN
    
    ·       Dynamic Multipoint VPN (DMVPN)
    
    ·       Layer 2 VPN
    
    ·       MPLS Layer 3 VPN
    
    ·       IPsec
    
    ·       Generic Routing Encapsulation (GRE)
    
    ·       Group Encrypted Transport VPN (GET VPN)
    
    ·       Lecture-14 Design high availability for enterprise WAN
    
    ·       Single-homed
    
    ·       Multihomed
    
    ·       Backup connectivity
    
    ·       Failover
    
    ·       Lecture-15 Describe Cisco SD-WAN Architecture (orchestration plane, management plane, control plane, data plane, on-boarding and provisioning, security)
    
    ·       Lecture-16 Describe Cisco SD-WAN design considerations (control plane design, overlay design, LAN design, high availability, redundancy, scalability, security design, QoS and multicast over SD-WAN fabric)
    
    Part-4 Network Services 
    ·       Lecture-17 Select appropriate QoS strategies to meet customer requirements (DiffServ, IntServ)
    
    ·       Lecture-18 Design end-to-end QoS policies
    
    ·       Classification and marking
    
    ·       Shaping
    
    ·       Policing
    
    ·       Queuing
    
    ·       Lecture-19 Design network management techniques
    
    ·       In-band vs. out-of-band
    
    ·       Segmented management networks
    
    ·       Prioritizing network management traffic
    
    ·       Describe multicast routing concepts (source trees, shared trees, RPF, rendezvous points)
    
    ·       Design multicast services (SSM, PIM bidirectional, MSDP)
    
    Part-5 Automation 
    ·       Lecture-20 Choose the correct YANG data model set based on requirements
    
    ·       Lecture-21 Differentiate between IETF, Openconfig, and Cisco native YANG models
    
    ·       Lecture-22 Differentiate between NETCONF and RESTCONF
    
    ·       Lecture-23 Describe the impact of model-driven telemetry on the network
    
    ·       Periodic publication
    
    ·       On-change publication
    
    ·       Lecture-24 Compare dial-in and dial-out approaches to model-driven telemetry
      Module-4 Exam:300-425 (D)
    Part-1 Wireless Site Survey 
    ·       Lecture-1 Collect design requirements and evaluate constraints
    
    ·       Client density
    
    ·       Real time applications
    
    ·       AP type
    
    ·       Deployment type (data, location, voice, video)
    
    ·       Security
    
    ·       Lecture-2 Describe material attenuation and its effect on wireless design
    
    ·       Lecture-3 Perform and analyze a Layer 1 site survey
    
    ·       Lecture-4 Perform a pre-deployment site survey
    
    ·       Lecture-5 Perform a post deployment site survey
    
    ·       Lecture-6 Perform a predictive site survey
    
    ·       Lecture-7 Utilize planning tools and evaluate key network metrics (Ekahau, AirMagnet, PI, Chanalyzer, Spectrum Analyzer)
    
    Part-2 Wired and Wireless Infrastructure 
    ·       Lecture-8 Determine physical infrastructure requirements such as AP power, cabling, switch port capacity, mounting, and grounding
    
    ·       Lecture-9 Determine logical infrastructure requirements such as WLC/AP licensing requirements based on the type of wireless architecture
    
    ·       Lecture-10 Design radio management
    
    ·       RRM
    
    ·       RF profiles
    
    ·       RxSOP
    
    ·       Lecture-11 Apply design requirements for these types of wireless networks
    
    ·       Data
    
    ·       Voice and video
    
    ·       Location
    
    ·       Hyperlocation
    
    ·       Lecture-12 Design high-density wireless networks and their associated components (campus,lecture halls, conference rooms)
    
    ·       Lecture-13 Design wireless bridging (mesh)
    
    ·       Modes of operation
    
    ·       Ethernet bridging
    
    ·       WGB and roaming
    
    ·       Lecture-14 Mobility
    
    ·       Design mobility groups based on mobility roles
    
    ·       Optimize client roaming
    
    ·       Validate mobility tunneling for data and control path
    
    Part-3 Mobility 
    ·       Lecture-15 Design high availability for controllers
    
    ·       Network availability through LAG
    
    ·       Stateful Switchover (SSO)
    
    ·       Anchor controller priority and redundancy
    
    ·       Lecture-16 Design high availability for APs
    
    ·       AP prioritization
    
    ·       Fall-back (assigning primary, secondary, and tertiary)
      Module-4 Exam:300-430 (E)
    Part-1 Flex Connect 
    ·       Lecture-1 Deploy FlexConnect components such as switching and operating modes
    
    ·       Lecture-2 Deploy FlexConnect capabilities
    
    ·       FlexConnect groups and roaming
    
    ·       Split tunneling and fault tolerance
    
    ·       VLAN-based central switching and Flex ACL
    
    ·       Smart AP image upgrade
    
    ·       Lecture-3 Implement Office Extend
    
    Part-2 QoS on a Wireless Network 
    ·       Lecture-4 Implement QoS schemes based on requirements including wired to wireless mapping
    
    ·       Lecture-5 Implement QoS for wireless clients
    
    ·       Lecture-6 Implement AVC including Fastlane (only on WLC)
    
    Part-3 Multicast 
    ·       Lecture-7 Implement multicast components
    
    ·       Lecture-8 Describe how multicast can affect wireless networks
    
    ·       Lecture-9 Implement multicast on a WLAN
    
    ·       Lecture-10 Implement mDNS
    
    ·       Lecture-11 Implement Multicast Direct
    
    Part-4 Location Services 
    ·       Lecture-12 Deploy MSE and CMX on a wireless network
    
    ·       Lecture-13 Implement location services
    
    ·       client tracking
    
    ·       RFID tags (tracking only)
    
    ·       Interferers
    
    ·       Rogue Aps
    
    ·       Clients
    
    Part-5 Advanced Location Services 
    ·       Lecture-14 Implement CMX components
    
    ·       Detect and locate
    
    ·       Analytics
    
    ·       Presence services
    
    ·       Lecture-15 Implement location-aware guest services using custom portal and Facebook Wi-Fi
    
    ·       Lecture-16 Troubleshoot location accuracy using Cisco Hyperlocation
    
    ·       Lecture-17 Troubleshoot CMX high availability
    
    ·       Lecture-18 Implement wIPS using MSE
    
    Part-6 Security for Wireless Client Connectivity 
    ·       Lecture-19 Configure client profiling on WLC and ISE
    
    ·       Lecture-20 Implement BYOD and guest
    
    ·       CWA using ISE (including self-registration portal)
    
    ·       LWA using ISE or WLC
    
    ·       Native supplicant provisioning using ISE
    
    ·       Certificate provisioning on the controller
    
    ·       Lecture-21 Implement 802.1X and AAA on different wireless architectures and ISE
    
    ·       Lecture-22 Implement Identity-Based Networking on different wireless architectures (VLANs, QoS,ACLs)
    
    Part-7 Monitoring 
    ·       Lecture-23 Utilize reports on PI and Cisco DNA center
    
    ·       Lecture-24 Manage alarms and rogues (APs and clients)
    
    ·       WLC
    
    ·       PI
    
    ·       Cisco DNA center
    
    ·       Lecture-25 Manage RF interferers
    
    ·       WLC
    
    ·       PI
    
    ·       Cisco DNA center
    
    ·       Lecture-26 Troubleshoot client connectivity
    
    ·       WLC
    
    ·       ISE
    
    ·       PI
    
    ·       Cisco DNA center
    
    Part-8 Device Hardening 
    ·       Lecture-27 Implement device access controls (including RADIUS and TACACS+)
    
    ·       Lecture-28 Implement access point authentication (including 802.1X)
    
    ·       Lecture-29 Implement CPU ACLs on the controller
      Module-4 Exam:300-435 (F)
    Part-1 Network Programmability Foundation 
    ·       Lecture-1 Utilize common version control operations with git (add, clone, push, commit, diff, branching, merging conflict)
    
    ·       Lecture-2 Describe characteristics of API styles (REST and RPC)
    
    ·       Lecture-3 Describe the challenges encountered and patterns used when consuming APIs synchronously and asynchronously
    
    ·       Lecture-4 Interpret Python scripts containing data types, functions, classes, conditions, and looping
    
    ·       Lecture-5 Describe the benefits of Python virtual environments
    
    ·       Lecture-6 Explain the benefits of using network configuration tools such as Ansible and Puppet for automating IOS XE platforms
    
    Part-2 Automate APIs and Protocols 
    ·       Lecture-7 Identify the JSON instance based on a YANG model
    
    ·       Lecture-8 Identify the XML instance based on a YANG model
    
    ·       Lecture-9 Interpret a YANG module tree generated per RFC8340
    
    ·       Lecture-10 Compare functionality, benefits, and uses of OpenConfig, IETF, and native YANG models
    
    ·       Lecture-11 Compare functionality, benefits, and uses of NETCONF and RESTCONF
    
    Part-3 Network Device Programmability 
    ·       Lecture-12 Implement device management and monitoring using NetMiko
    
    ·       Lecture-13 Construct a Python script using ncclient that uses NETCONF to manage and monitor an IOS XE device
    
    ·       Lecture-14 Configure device using RESTCONF API utilizing Python requests library
    
    ·       Lecture-15 Utilize Ansible to configure an IOS XE device
    
    ·       Lecture-16 Configure a subscription for model driven telemetry on an IOS XE device (CLI, NETCONF, and RESTCONF)
    
    ·       Lecture-17 Compare publication and subscription telemetry models
    
    ·       Periodic / cadence
    
    ·       On-change
    
    ·       Lecture-18 Describe the benefits and usage of telemetry data in troubleshooting the network
    
    ·       Lecture-19 Describe Day 0 provisioning methods
    
    ·       iPXE
    
    ·       PnP
    
    ·       ZTP
    
    Part-4 Cisco DNA Center 
    ·       Lecture-20 Compare traditional versus software-defined networks
    
    ·       Lecture-21 Describe the features and capabilities of Cisco DNA Center
    
    ·       Network assurance APIs
    
    ·       Intent APIs
    
    ·       Multivendor support (3rd party SDKs)
    
    ·       Events and notifications
    
    ·       Lecture-22 Implement Cisco DNA Center event outbound webhooks
    
    ·       Lecture-23 Implement API requests for Cisco DNA Center to accomplish network management tasks
    
    ·       Intent APIs
    
    ·       Command Runner APIs
    
    ·       Site APIs
    
    ·       Lecture-24 Implement API requests for Cisco DNA Center to accomplish network management tasks using these APIs
    
    ·       Network discovery and device APIs
    
    ·       Template APIs (Apply a template)
    
    ·       Lecture-25 Troubleshoot Cisco DNA Center automation process using Intent APIs
    
    Part-5 Cisco SD-WAN 
    ·       Lecture-26 Describe features and capabilities of Cisco SD-WAN vManage Certificate Management APIs
    
    ·       Lecture-27 Implement a Python script to perform API requests for Cisco SD-WAN vManage Device Inventory APIs to retrieve and display data
    
    ·       Lecture-28 Construct API requests for Cisco SD-WAN vManage Administration APIs
    
    ·       Lecture-29 Implement a Python script to perform API requests for Cisco SD-WAN vManage Configuration APIs to modify Cisco SD-WAN fabric configuration
    
    ·       Lecture-30 Construct API requests for Cisco SD-WAN vManage Monitoring APIs (Including real-time)
    
    ·       Lecture-31 Troubleshoot a Cisco SD-WAN deployment using vManage APIs
    
    Part-6 Cisco Meraki 
    ·       Lecture-32Describe features and capabilities of Cisco Meraki
    
    ·       Location Scanning APIs
    
    ·       MV Sense APIs
    
    ·       External Captive Portal APIs
    
    ·       WebHook Alert APIs
    
    ·       Lecture-33 Create a network using Cisco Meraki APIs
    
    ·       Lecture-34 Configure a network using Cisco Meraki APIs
    
    ·       Lecture-35 Implement a Python script for Cisco Meraki Alert WebHooks

Frequently Asked Questions

It is also recommended but not mandatory that participants have basic IP addressing skills and knowledge of networking fundamentals

The course offers a variety of online training options, including: Live Virtual Classroom Training: Participate in real-time interactive sessions with instructors and peers. 1:1 Doubt Resolution Sessions: Get personalized assistance and clarification on course-related queries. Recorded Live Lectures*: Access recorded sessions for review or to catch up on missed classes. Flexible Schedule: Enjoy the flexibility to learn at your own pace and according to your schedule.

Live Virtual Classroom Training allows you to attend instructor-led sessions in real-time through an online platform. You can interact with the instructor, ask questions, participate in discussions, and collaborate with fellow learners, simulating the experience of a traditional classroom setting from the comfort of your own space.

If you miss a live session, you can access recorded lectures* to review the content covered during the session. This allows you to catch up on any missed material at your own pace and ensures that you don't fall behind in your learning journey.

The course offers a flexible schedule, allowing you to learn at times that suit you best. Whether you have other commitments or prefer to study during specific hours, the course structure accommodates your needs, enabling you to balance your learning with other responsibilities effectively. *Note: Availability of recorded live lectures may vary depending on the course and training provider.