CCIE

by Inter Networkz Claim Listing

The CCIE R&S Program  has now been replaced by the CCIE Enterprise Infrastructure Certification and Training. This is the latest certification track to join the brigade of Cisco’s routine up gradation.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Inter Networkz Logo

img Duration

Please Enquire

Course Details

The CCIE R&S Program  has now been replaced by the CCIE Enterprise Infrastructure Certification and Training. This is the latest certification track to join the brigade of Cisco’s routine up gradation.

Cisco confirmed the revision of the current version (v5) to Enterprise and announced the new blueprint in the first week of December. In alignment with the current industry trends and job roles, the old version has been revamped with the addition of new study materials and changes have been incorporated in both training and the exams (written & Lab).

This is the highest level of Certification from Cisco. It authenticates one’s in depth understanding and expertise on Cisco products and solutions. Besides being one of the most prestigious and highly paid certification in IT Industry, it validates the skills required of expert-level network engineers to plan, operate and troubleshoot complex, converged network infrastructure. CCIE candidates are deployed for the most technically challenging network assignments.

CCIE Enterprise Infrastructure(v1.0)

Exam Topics –Practical Exam

Exam Description:The Cisco CCIE Enterprise Infrastructure (v1.0)  Practica lExam is an 8-hour long, hands-on exam that requires an examinee to plan, design, deploy, operate, and optimize dual stack solutions (IPv4 and IPv6) for complex enterprise networks. Examinees are expected to program and automate the network within their exam, as per exam topics below. The  topics given below  are  general  guidelines  for  the  content  likely to be included on the exam. Your knowledge, skills and abilities on these topics will be tested throughout the entire network life-cycle, unless explicitly specified otherwise within this document.

 

Content:

  • Network Infrastructure (30%).
  • 1 Switched campus.
  •           1.a Switch administration.
  •               1.ai Managing MAC address table.
  •               1.aii Errdisable recovery.
  •               1.aiii L2 MTU.
  •           1.b Layer 2 protocols.
  •               1.bi CDP, LLDP.
  •               1.bii UDLD.
  •           1.c VLAN technologies.
  •               1.ci Access ports.
  •               1.cii Trunk ports (802.1Q).
  •               1.ciii Native VLAN.
  •               1.civ Manual VLAN pruning.
  •               1.cv VLAN database.
  •               1.cvi Normal range and extended range VLANs.
  •               1.cvii Voice VLAN.
  •               1.cviii VTP.
  •           1.d EtherChannel.
  •               1.diL ACP, static.
  •               1.dii Layer 2, Layer
  •               1.diii Load balancing
  •               1.div EtherChannel Misconfiguration Guard.
  •     1.e SpanningTreeProtocol.
  •         1.ei PVST+, Rapid PVST+, MST.
  •         1.eii Switch priority, port priority, path cost, STP timers.
  •         1.eiii PortFast, BPDU Guard, BPDU Filter.
  •         1.eiv Loop Guard, Root Guard.
  •     2 Routing Concepts
  •           2.a Administrative distance.
  •           2.b VRF-lite.
  •           2.c Static routing
  •           2.d PolicyBased Routing.
  •           2.e VRF-aware routing with any routing protocol.
  •           2.f Route filteringwith any routing protocol.
  •           2.g Manual summarization with any routing protocol.
  •           2.h Redistribution between any pair of routing protocols.
  •           2.i Routing protocol authentication.
  •           2.j Bidirectional Forwarding Detection.
  •     3 EIGRP 
  •           3.a Adjacencies.
  •           3.b Best path selection.
  •               3.bi RD, FD, FC, successor, feasible successor.
  •               3.bii Classic Metricsand Wide Metrics.
  •           3.c Operations.
  •               3.ci General operations.
  •               3.cii Topology table.
  •               3.ciii Packet types.
  •               3.civ Stuck In Active.
  •               3.cv Graceful shutdown.
  •           3.d EIGRP loadbalancing.
  •               3.di Equal-cost.
  •               3.dii Unequal-cost1.
  •               3.diii Add-path.
  •           3.e EIGRP Named Mode.
  •           3.f Optimization, convergence and scalability.
  •               3.fi Fast convergence requirements.
  •               3.fii Query propagation boundaries.
  •               3.fiii IP FRR (single hop).
  •               3.fiv Leak-map with summary routes.
  •               3.fv EIGRP stub with leak map
  •     4 OSPF (v2 and v3)
  •           4.a Adjacencies.
  •           4.b Network types, area types.
  •           4.c Path preference.
  •           4.d Operations.
  •               4.di General operations.
  •               4.dii Graceful shutdown.
  •               4.diii GTSM (Generic TTL Security Mechanism).
  •           4.e Optimization, convergence and scalability.
  •               4.ei Metrics.
  •               4.eii LSA throttling, SPF tuning, fast hello.
  •               4.eiii LSA propagation control (area types).
  •               4.eiv Stub router.
  •               4.ev Loop-free alternate.
  •               4.evi Prefix suppression.
  •         5 BGP.
  •           5.a IBGP and EBGP peer relationships.
  •               5.ai Peer-group/update-group, template.
  •               5.aii Active, passive.
  •               5.aiii Timers.
  •               5.aiv Dynamic neighbors.
  •               5.av 4-byteAS numbers.
  •               5.avi Private AS.
  •           5.b Path selection.
  •               5.bi Attributes.
  •               5.bii Best path selection algorithm.
  •               5.biii Loadbalancing.
  •           5.c Routing policies.
  •               5.ci Attribute manipulation.
  •               5.cii Conditional advertisement.
  •               5.ciii Outbound Route Filtering.
  •               5.civ Standard and extended communities.
  •               5.cv Multi-homing.
  •           5.d AS path manipulations.
  •               5.di local-AS, allowas-in, remove-private-as.
  •               5.dii Prepend1.
  •               5.diii Regexp.
  •           5.e Convergence and scalability.
  •               5.ei Route reflector.
  •               5.eii Aggregation, as-set.
  •           5.f Other BGP features.
  •               5.fi Multipath, add-path.
  •               5.fii Soft reconfiguration, Route Refresh
  •     6 Multicast
  •           6.a Layer 2 multicast1.
  •               6.ai IGMPv2, IGMPv3.
  •               6.aii IGMP Snooping, PIM Snooping.
  •               6.aiii IGMP Querier
  •               6.aiv IGMP Filter. 
  •               6.av MLD1.
  •       6.b  Reverse path forwarding check.
  •           6.c  PIM.
  •                6.ci Sparse Mode.
  •                6.cii Static RP, BSR, AutoRP.
  •                6.ciii Group to RP Mapping.
  •                6.civ Bidirectional PIM.
  •                6.cv Source-Specific Multicast.
  •                6.cvi Multicast boundary, RP announcement filter.
  •                6.cvii PIMv6 Anycast RP.
  •                6.cviii IPv4 Anycast RP using MSDP.
  •                6.cix Multicast multipath.
  • Software Defined Infrastructure (25%)
  •     1 Cisco SD Access.
  •           1.a  Design a Cisco SD Access solution.
  •                1.ai Underlay network (IS-IS, manual/PnP).
  •                1.aii Overlay fabric design (LISP, VXLAN, Cisco TrustSec)
  •                1.aiii Fabric domains (single-site and multi-siteusing SD-WAN transit).
  •           1.b  Cisco SD Access deployment.
  •                1.bi Cisco DNA Center device discovery and device management
  •                1.bii Add fabricnode devices to an existing fabric.
  •                1.biii Host onboarding (wired endpoints only)
  •                1.biv Fabric border handoff
  •       1.c  Segmentation.
  •                1.c i Macro-level segmentation using VNs.
  •                1.cii Micro-level segmentation using SGTs (using Cisco ISE)
  •           1.d  Assurance
  •                1.d i Network and client health (360).
  •                1.dii Monitoring and troubleshooting
  •     2 Cisco SD-WAN
  •           2.a  Design a Cisco SD-WAN solution
  •          2.aii Management plane (vManage)
  •              2.aiii Control plane (vSmart, OMP)
  •              2.aiv Data plane (vEdge/cEdge)
  •     2.b  WAN edge deployment
  •              2.bi Onboarding new edge routers
  •              2.bii Orchestration with zero-touch provisioning/Plug-And-Play
  •              2.biii OMP2.2.b  ivTLOC
  •     2.c  Configuration templates
  •     2.d  Localized policies (only QoS)
  •     2.e  Centralized policies
  •              2.ei Application Aware Routing
  •              2.eii Topologies
  •  
  • Transport Technologies and Solutions (15%)
  •     1 MPLS
  •           1.a Operations
  •               1.ai Label stack, LSR, LSP
  •               1.aii LDP.
  •               1.aiii MPLS ping, MPLS traceroute
  •           1.b L3VPN3.
  •               1.bi PE-CE routing
  •               1.bii MP-BGP VPNv4/VPNv6.
  •               1.biii Extranet (route leaking)3.2DMVPN.
  •           2.a Troubleshoot DMVPN Phase3 with dual-hub
  •               2.ai NHRP
  •               2.aii IPsec/IKEv2 using pre-sharedkey
  •               2.aiii Per-Tunnel QoS
  •           2.b Identify usecases for FlexVPN
  •               2.bi Site-to-site, Server, Client, Spoke-to-Spoke
  •               2.bii IPsec/IKEv2 using pre-sharedkey
  •               2.biii MPLS over FlexVPN
  • Infrastructure Security and Services (15%)
  •  
  •     1. Device Security on Cisco IOS XE
  •            1.a  Control plane policing and protection
  •            1.b  AAA4.
  •     2  Network Security.
  •            2.a  Switch security features         2.ai VACL, PACL 
  •            2.aii Storm control 2.aiii DHCP Snooping, DHCP option 82
  •              2.aiv IP Source Guard.
  •              2.av Dynamic ARP Inspection.
  •              2.avi PortSecurity 
  •              2.avii Private VLAN 
  •     2.b  Router security features.
  •              2.bi IPv6 Traffic Filters. 
  •              2.bii IPv4 Access Control Lists.
  •              2.biii Unicast Reverse Path Forwarding.
  •     2.c  IPv6 infrastructure securityfeatures.
  •              2.ci RA Guard4.
  •              2.cii DHCP Guard.
  •              2.ciii Binding table.
  •              2.civ Device tracking.
  •              2.cv ND Inspection/Snooping.
  •              2.cvi Source Guard.
  •        2.d   IEEE 802.1X Port-Based Authentication.
  •              2.di Device roles, port states.
  •              2.dii Authentication process.
  •              2.diii Host modes.
  • 3. System Management.
  •     3.a  Device management.
  •              3.ai Console and VTY.
  •              3.aii SSH, SCP4.
  •              3.aiii RESTCONF, NETCONF.
  •     3.b  SNMP4.
  •              3.bi v2c.
  •              3.bii v3.
  •     3.c  Logging.
  •              3.ci Local logging, syslog, debugs, conditional debugs.
  •              3.cii Timestamps.
  • 4. Quality of Service.
  •     4.a  End to end L3 QoS using MQC.
  •              4.ai DiffServ.
  •              4.aii CoS and DSCP Mapping.
  •              4.aiii Classification.
  •              4.aiv Network Based Application Recognition (NBAR).
  •              4.av Marking using IP Precedence, DSCP, CoS4.
  •              4.avi Policing, shaping         4.avii Congestion management and avoidance.
  •               4.aviiiHQoS, Sub-rate Ethernet Link.
  • 5. Network Services.
  •     5.a  FirstHop Redundancy Protocols.
  • And more.
  • Kottayam Branch

    2nd Floor, Matteethra Building, Above Sylcon Footwear, Baker Junction, Kottayam

Check out more CCIE courses in India

Routing Switching Tigers Logo

CCIE Security

The Cisco Certified Internetwork Expert Security (CCIE Security) program recognizes individuals who have the knowledge and skills to implement, maintain and support extensive Cisco Network Security Solutions using the latest industry best practices and technologies.

by Routing Switching Tigers [Claim Listing ]
  • Price
  • Start Date
  • Duration
MaxMunus Logo

CCIE Wireless Training

CCIE Wireless training covers concepts from the Basic level to the advanced level.  Whether you are an individual or corporate client we can customize training course content as per your requirement.  And can arrange this CCIE Wireless training as per your pace.

by MaxMunus [Claim Listing ]
Cloudnet Logo

CCIE Enterprise Infrastructure

The new CCIE Enterprise Infrastructure  is highest level certification in Cisco networking domain that prepares you for today’s expert-level job roles in enterprise network technologies.

by Cloudnet [Claim Listing ]
  • Price
  • Start Date
  • Duration
NC Educations Logo

CCIE R&S/ Enterprise Infrastructure Training

NC Educations is the best CCIE training institute in Delhi, Noida, Gurgaon comprises of the best CCIE-certified professionals in India. We believe in delivering world-class training infrastructure for CCIE enterprise infrastructure certification.

by NC Educations [Claim Listing ]
Bsoft Network Solutions Logo

CCIE (Enterprise, Collaboration, Security)

CCIE (Enterprise, Collaboration, Security) course is offered by Bsoft Network Solutions. Bsoft has training tailored to your needs if you are new to IT, working toward your next certification, or renewing your current certification. Bsoft is here to exceed your training expectations.

by Bsoft Network Solutions [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy