CCIE

by Inter Networkz Claim Listing

The CCIE R&S Program  has now been replaced by the CCIE Enterprise Infrastructure Certification and Training. This is the latest certification track to join the brigade of Cisco’s routine up gradation.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Inter Networkz Logo

img Duration

Please Enquire

Course Details

The CCIE R&S Program  has now been replaced by the CCIE Enterprise Infrastructure Certification and Training. This is the latest certification track to join the brigade of Cisco’s routine up gradation.

Cisco confirmed the revision of the current version (v5) to Enterprise and announced the new blueprint in the first week of December. In alignment with the current industry trends and job roles, the old version has been revamped with the addition of new study materials and changes have been incorporated in both training and the exams (written & Lab).

This is the highest level of Certification from Cisco. It authenticates one’s in depth understanding and expertise on Cisco products and solutions. Besides being one of the most prestigious and highly paid certification in IT Industry, it validates the skills required of expert-level network engineers to plan, operate and troubleshoot complex, converged network infrastructure. CCIE candidates are deployed for the most technically challenging network assignments.

CCIE Enterprise Infrastructure(v1.0)

Exam Topics –Practical Exam

Exam Description:The Cisco CCIE Enterprise Infrastructure (v1.0)  Practica lExam is an 8-hour long, hands-on exam that requires an examinee to plan, design, deploy, operate, and optimize dual stack solutions (IPv4 and IPv6) for complex enterprise networks. Examinees are expected to program and automate the network within their exam, as per exam topics below. The  topics given below  are  general  guidelines  for  the  content  likely to be included on the exam. Your knowledge, skills and abilities on these topics will be tested throughout the entire network life-cycle, unless explicitly specified otherwise within this document.

 

Content:

  • Network Infrastructure (30%).
  • 1 Switched campus.
  •           1.a Switch administration.
  •               1.ai Managing MAC address table.
  •               1.aii Errdisable recovery.
  •               1.aiii L2 MTU.
  •           1.b Layer 2 protocols.
  •               1.bi CDP, LLDP.
  •               1.bii UDLD.
  •           1.c VLAN technologies.
  •               1.ci Access ports.
  •               1.cii Trunk ports (802.1Q).
  •               1.ciii Native VLAN.
  •               1.civ Manual VLAN pruning.
  •               1.cv VLAN database.
  •               1.cvi Normal range and extended range VLANs.
  •               1.cvii Voice VLAN.
  •               1.cviii VTP.
  •           1.d EtherChannel.
  •               1.diL ACP, static.
  •               1.dii Layer 2, Layer
  •               1.diii Load balancing
  •               1.div EtherChannel Misconfiguration Guard.
  •     1.e SpanningTreeProtocol.
  •         1.ei PVST+, Rapid PVST+, MST.
  •         1.eii Switch priority, port priority, path cost, STP timers.
  •         1.eiii PortFast, BPDU Guard, BPDU Filter.
  •         1.eiv Loop Guard, Root Guard.
  •     2 Routing Concepts
  •           2.a Administrative distance.
  •           2.b VRF-lite.
  •           2.c Static routing
  •           2.d PolicyBased Routing.
  •           2.e VRF-aware routing with any routing protocol.
  •           2.f Route filteringwith any routing protocol.
  •           2.g Manual summarization with any routing protocol.
  •           2.h Redistribution between any pair of routing protocols.
  •           2.i Routing protocol authentication.
  •           2.j Bidirectional Forwarding Detection.
  •     3 EIGRP 
  •           3.a Adjacencies.
  •           3.b Best path selection.
  •               3.bi RD, FD, FC, successor, feasible successor.
  •               3.bii Classic Metricsand Wide Metrics.
  •           3.c Operations.
  •               3.ci General operations.
  •               3.cii Topology table.
  •               3.ciii Packet types.
  •               3.civ Stuck In Active.
  •               3.cv Graceful shutdown.
  •           3.d EIGRP loadbalancing.
  •               3.di Equal-cost.
  •               3.dii Unequal-cost1.
  •               3.diii Add-path.
  •           3.e EIGRP Named Mode.
  •           3.f Optimization, convergence and scalability.
  •               3.fi Fast convergence requirements.
  •               3.fii Query propagation boundaries.
  •               3.fiii IP FRR (single hop).
  •               3.fiv Leak-map with summary routes.
  •               3.fv EIGRP stub with leak map
  •     4 OSPF (v2 and v3)
  •           4.a Adjacencies.
  •           4.b Network types, area types.
  •           4.c Path preference.
  •           4.d Operations.
  •               4.di General operations.
  •               4.dii Graceful shutdown.
  •               4.diii GTSM (Generic TTL Security Mechanism).
  •           4.e Optimization, convergence and scalability.
  •               4.ei Metrics.
  •               4.eii LSA throttling, SPF tuning, fast hello.
  •               4.eiii LSA propagation control (area types).
  •               4.eiv Stub router.
  •               4.ev Loop-free alternate.
  •               4.evi Prefix suppression.
  •         5 BGP.
  •           5.a IBGP and EBGP peer relationships.
  •               5.ai Peer-group/update-group, template.
  •               5.aii Active, passive.
  •               5.aiii Timers.
  •               5.aiv Dynamic neighbors.
  •               5.av 4-byteAS numbers.
  •               5.avi Private AS.
  •           5.b Path selection.
  •               5.bi Attributes.
  •               5.bii Best path selection algorithm.
  •               5.biii Loadbalancing.
  •           5.c Routing policies.
  •               5.ci Attribute manipulation.
  •               5.cii Conditional advertisement.
  •               5.ciii Outbound Route Filtering.
  •               5.civ Standard and extended communities.
  •               5.cv Multi-homing.
  •           5.d AS path manipulations.
  •               5.di local-AS, allowas-in, remove-private-as.
  •               5.dii Prepend1.
  •               5.diii Regexp.
  •           5.e Convergence and scalability.
  •               5.ei Route reflector.
  •               5.eii Aggregation, as-set.
  •           5.f Other BGP features.
  •               5.fi Multipath, add-path.
  •               5.fii Soft reconfiguration, Route Refresh
  •     6 Multicast
  •           6.a Layer 2 multicast1.
  •               6.ai IGMPv2, IGMPv3.
  •               6.aii IGMP Snooping, PIM Snooping.
  •               6.aiii IGMP Querier
  •               6.aiv IGMP Filter. 
  •               6.av MLD1.
  •       6.b  Reverse path forwarding check.
  •           6.c  PIM.
  •                6.ci Sparse Mode.
  •                6.cii Static RP, BSR, AutoRP.
  •                6.ciii Group to RP Mapping.
  •                6.civ Bidirectional PIM.
  •                6.cv Source-Specific Multicast.
  •                6.cvi Multicast boundary, RP announcement filter.
  •                6.cvii PIMv6 Anycast RP.
  •                6.cviii IPv4 Anycast RP using MSDP.
  •                6.cix Multicast multipath.
  • Software Defined Infrastructure (25%)
  •     1 Cisco SD Access.
  •           1.a  Design a Cisco SD Access solution.
  •                1.ai Underlay network (IS-IS, manual/PnP).
  •                1.aii Overlay fabric design (LISP, VXLAN, Cisco TrustSec)
  •                1.aiii Fabric domains (single-site and multi-siteusing SD-WAN transit).
  •           1.b  Cisco SD Access deployment.
  •                1.bi Cisco DNA Center device discovery and device management
  •                1.bii Add fabricnode devices to an existing fabric.
  •                1.biii Host onboarding (wired endpoints only)
  •                1.biv Fabric border handoff
  •       1.c  Segmentation.
  •                1.c i Macro-level segmentation using VNs.
  •                1.cii Micro-level segmentation using SGTs (using Cisco ISE)
  •           1.d  Assurance
  •                1.d i Network and client health (360).
  •                1.dii Monitoring and troubleshooting
  •     2 Cisco SD-WAN
  •           2.a  Design a Cisco SD-WAN solution
  •          2.aii Management plane (vManage)
  •              2.aiii Control plane (vSmart, OMP)
  •              2.aiv Data plane (vEdge/cEdge)
  •     2.b  WAN edge deployment
  •              2.bi Onboarding new edge routers
  •              2.bii Orchestration with zero-touch provisioning/Plug-And-Play
  •              2.biii OMP2.2.b  ivTLOC
  •     2.c  Configuration templates
  •     2.d  Localized policies (only QoS)
  •     2.e  Centralized policies
  •              2.ei Application Aware Routing
  •              2.eii Topologies
  •  
  • Transport Technologies and Solutions (15%)
  •     1 MPLS
  •           1.a Operations
  •               1.ai Label stack, LSR, LSP
  •               1.aii LDP.
  •               1.aiii MPLS ping, MPLS traceroute
  •           1.b L3VPN3.
  •               1.bi PE-CE routing
  •               1.bii MP-BGP VPNv4/VPNv6.
  •               1.biii Extranet (route leaking)3.2DMVPN.
  •           2.a Troubleshoot DMVPN Phase3 with dual-hub
  •               2.ai NHRP
  •               2.aii IPsec/IKEv2 using pre-sharedkey
  •               2.aiii Per-Tunnel QoS
  •           2.b Identify usecases for FlexVPN
  •               2.bi Site-to-site, Server, Client, Spoke-to-Spoke
  •               2.bii IPsec/IKEv2 using pre-sharedkey
  •               2.biii MPLS over FlexVPN
  • Infrastructure Security and Services (15%)
  •  
  •     1. Device Security on Cisco IOS XE
  •            1.a  Control plane policing and protection
  •            1.b  AAA4.
  •     2  Network Security.
  •            2.a  Switch security features         2.ai VACL, PACL 
  •            2.aii Storm control 2.aiii DHCP Snooping, DHCP option 82
  •              2.aiv IP Source Guard.
  •              2.av Dynamic ARP Inspection.
  •              2.avi PortSecurity 
  •              2.avii Private VLAN 
  •     2.b  Router security features.
  •              2.bi IPv6 Traffic Filters. 
  •              2.bii IPv4 Access Control Lists.
  •              2.biii Unicast Reverse Path Forwarding.
  •     2.c  IPv6 infrastructure securityfeatures.
  •              2.ci RA Guard4.
  •              2.cii DHCP Guard.
  •              2.ciii Binding table.
  •              2.civ Device tracking.
  •              2.cv ND Inspection/Snooping.
  •              2.cvi Source Guard.
  •        2.d   IEEE 802.1X Port-Based Authentication.
  •              2.di Device roles, port states.
  •              2.dii Authentication process.
  •              2.diii Host modes.
  • 3. System Management.
  •     3.a  Device management.
  •              3.ai Console and VTY.
  •              3.aii SSH, SCP4.
  •              3.aiii RESTCONF, NETCONF.
  •     3.b  SNMP4.
  •              3.bi v2c.
  •              3.bii v3.
  •     3.c  Logging.
  •              3.ci Local logging, syslog, debugs, conditional debugs.
  •              3.cii Timestamps.
  • 4. Quality of Service.
  •     4.a  End to end L3 QoS using MQC.
  •              4.ai DiffServ.
  •              4.aii CoS and DSCP Mapping.
  •              4.aiii Classification.
  •              4.aiv Network Based Application Recognition (NBAR).
  •              4.av Marking using IP Precedence, DSCP, CoS4.
  •              4.avi Policing, shaping         4.avii Congestion management and avoidance.
  •               4.aviiiHQoS, Sub-rate Ethernet Link.
  • 5. Network Services.
  •     5.a  FirstHop Redundancy Protocols.
  • And more.
  • Kottayam Branch

    2nd Floor, Matteethra Building, Above Sylcon Footwear, Baker Junction, Kottayam

Check out more CCIE courses in India

Adroit Information Technology Academy Logo

CCIE Security

Achieving CCIE Security certification proves your skills with complex security solutions. To earn CCIE Security certification, you pass two exams: a qualifying exam that covers core security technologies, and a hands-on lab exam.

by Adroit Information Technology Academy [Claim Listing ]
Cyber World Academy Logo

CCIE Routing And Switching Training

CCIE R&S certifies and validates the skills required by experts for configuring and troubleshooting complex and converged network infrastructure. CCIE Routing and switching training bundle at CWA offers cost effective and renowned training resources to meet the industry standards.

by Cyber World Academy [Claim Listing ]
TESRO (Technical Education & Scientific Research) Logo

CCIE (R & S)

The CCIE Certifications are the highest level of certifications offered by Cisco.  These certifications are introduced in order to help the IT industry to distinguish the experts in networking technologies and assess their level of skills.

by TESRO (Technical Education & Scientific Research) [Claim Listing ]
Network Academy Logo

CCIE Enterprise Infrastructure

CCIE Enterprise Infrastructure course is offered by Network Academy for all skill level. We believe that quality training is the breathing essential for a student to become a qualified professional.

by Network Academy [Claim Listing ]
Computec Professional Group Logo

Diploma In Cisco CCIE

Diploma in Cisco CCIE course is offered by Computec Professional Group. At COMPUTEC Professionals Group, we innovate design study by giving an apt environment i.e. full of daily regular sessions, project works, assignments, environmental study, group discussions etc.

by Computec Professional Group [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy