CCIE Course Training

by iTrainU Technologies Claim Listing

The Cisco Certified Internetwork Expert (CCIE) Enterprise Infrastructure certification is a prestigious and highly advanced certification program offered by Cisco. It is designed for experienced networking professionals who wish to validate their expertise in designing, implementing, and managing.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

iTrainU Technologies Logo

img Duration

Please Enquire

Course Details

The Cisco Certified Internetwork Expert (CCIE) Enterprise Infrastructure certification is a prestigious and highly advanced certification program offered by Cisco. It is designed for experienced networking professionals who wish to validate their expertise in designing, implementing, and managing complex enterprise network infrastructures.

This certification focuses on the latest networking technologies and solutions related to enterprise networking and infrastructure. CCIE is one of the most respected certifications for network professionals. It’s offered by Cisco, a leading networking technology company.

 

CCIE Course Syllabus:

  • Network Infrastructure
  • 1.1 Switched campus
  • 1.1.a Switch administration
  • 1.1.a i Managing MAC address table
  • 1.1.a ii Errdisable recovery
  • 1.1.a iii L2 MTU
  • 1.1.b Layer 2 protocols
  • 1.1.b i CDP, LLDP
  • 1.1.b ii UDLD
  • 1.1.c VLAN technologies
  • 1.1.c i Access ports
  • 1.1.c ii Trunk ports (802.1Q)
  • 1.1.c iii Native VLAN
  • 1.1.c iv Manual VLAN pruning
  • 1.1.c v VLAN database
  • 1.1.c vi Normal range and extended range VLANs
  • 1.1.c vii Voice VLAN
  • 1.1.c viii VTP
  • 1.1.d Ether Channel
  • 1.1.d i LACP, static
  • 1.1.d ii Layer 2, Layer 3
  • 1.1.d iii Load balancing
  • 1.1.d iv Ether Channel Misconfiguration Guard
  • 1.1.e Spanning Tree Protocol
  • 1.1.e i PVST+, Rapid PVST+, MST
  • 1.1.e ii Switch priority, port priority, path cost, STP timers
  • 1.1.e iii PortFast, BPDU Guard, BPDU Filter
  • 1.1.e iv Loop Guard, Root Guard
  • 1.2 Routing Concepts
  • 1.2.a Administrative distance
  • 1.2.b VRF-lite
  • 1.2.c Static routing
  • 1.2.d Policy Based Routing
  • 1.2.e VRF-aware routing with any routing protocol
  • 1.2.f Route filtering with any routing protocol
  • 1.2.g Manual summarization with any routing protocol
  • 1.2.h Redistribution between any pair of routing protocols
  • 1.2.i Routing protocol authentication
  • 1.2.j Bidirectional Forwarding Detection
  • 1.3 EIGRP
  • 1.3.a Adjacencies
  • 1.3.b Best path selection
  • 1.3.b i RD, FD, FC, successor, feasible successor
  • 1.3.b ii Classic Metrics and Wide Metrics
  • 1.3.c Operations
  • 1.3.c i General operations
  • 1.3.c ii Topology table
  • 1.3.c iii Packet types
  • 1.3.c iv Stuck In Active
  • 1.3.c v Graceful shutdown
  • 1.3.d EIGRP load balancing
  • 1.3.d i Equal-cost
  • 1.3.d ii Unequal-cost
  • 1.3.d iii Add-path
  • 1.3.e EIGRP Named Mode
  • 1.3.f Optimization, convergence and scalability
  • 1.3.f i Fast convergence requirements
  • 1.3.f ii Query propagation boundaries
  • 1.3.f iii IP FRR (single hop)
  • 1.3.f iv Leak-map with summary routes
  • 1.3.f v EIGRP stub with leak map1.4 OSPF (v2 and v3)
  • 1.4.a Adjacencies
  • 1.4.b Network types, area types
  • 1.4.c Path preference
  • 1.4.d Operations
  • 1.4.d i General operations
  • 1.4.d ii Graceful shutdown
  • 1.4.d iii GTSM (Generic TTL Security Mechanism)
  • 1.4.e Optimization, convergence and scalability
  • 1.4.e i Metrics
  • 1.4.e ii LSA throttling, SPF tuning, fast hello
  • 1.4.e iii LSA propagation control (area types)
  • 1.4.e iv Stub router
  • 1.4.e v Loop-free alternate
  • 1.4.e vi Prefix suppression
  • 1.5 BGP
  • 1.5.a IBGP and EBGP peer relationships
  • 1.5.a i Peer-group/update-group, template
  • 1.5.a ii Active, passive
  • 1.5.a iii Timers
  • 1.5.a iv Dynamic neighbors
  • 1.5.a v 4-byte AS numbers
  • 1.5.a vi Private AS
  • 1.5.b Path selection
  • 1.5.b i Attributes
  • 1.5.b ii Best path selection algorithm
  • 1.5.b iii Load balancing
  • 1.5.c Routing policies
  • 1.5.c i Attribute manipulation
  • 1.5.c ii Conditional advertisement
  • 1.5.c iii Outbound Route Filtering
  • 1.5.c iv Standard and extended communities
  • 1.5.c v Multi-homing
  • 1.5.d AS path manipulations
  • 1.5.d i local-AS, allowas-in, remove-private-as
  • 1.5.d ii Prepend
  • 1.5.d iii Regexp
  • 1.5.e Convergence and scalability
  • 1.5.e i Route reflector
  • 1.5.e ii Aggregation, as-set
  • 1.5.f Other BGP features
  • 1.5.f i Multipath, add-path
  • 1.5.f ii Soft reconfiguration, Route Refresh1.6 Multicast
  • 1.6.a Layer 2 multicast
  • 1.6.a i IGMPv2, IGMPv3
  • 1.6.a ii IGMP Snooping, PIM Snooping
  • 1.6.a iii IGMP Querier
  • 1.6.a iv IGMP Filter
  • 1.6.a v MLD
  • 1.6.b Reverse path forwarding check
  • 1.6.c PIM
  • 1.6.c i Sparse Mode
  • 1.6.c ii Static RP, BSR, AutoRP
  • 1.6.c iii Group to RP Mapping
  • 1.6.c iv Bidirectional PIM
  • 1.6.c v Source-Specific Multicast
  • 1.6.c vi Multicast boundary, RP announcement filter
  • 1.6.c vii PIMv6 Anycast RP
  • 1.6.c viii IPv4 Anycast RP using MSDP
  • 1.6.c ix Multicast multipath
  • Infrastructure Automation and Programmability
  • 5.1 Data encoding formats
  • 5.1.a JSON
  • 5.1.b XML
  • 5.2 Automation and scripting
  • 5.2.a EEM applets
  • 5.2.b Guest shell
  • 5.2.b i Linux environment
  • 5.2.b ii CLI Python module
  • 5.2.b iii EEM Python module
  • 5.3 Programmability
  • 5.3.a Interaction with vManage API
  • 5.3.a i Python requests library and Postman
  • 5.3.a ii Monitoring endpoints
  • 5.3.a iii Configuration endpoints
  • 5.3.b Interaction with Cisco DNA Center API
  • 5.3.b i HTTP request (GET, PUT, POST) via Python requests library
  • and Postman
  • 5.3.c Interaction with Cisco IOS XE API
  • 5.3.c i Via NETCONF/YANG using Python ncclient library
  • 5.3.c ii Via RESTCONF/YANG using Python requests library and
  • Postman
  • 5.3.d Deploy and verify model-driven telemetry
  • 5.3.d i Configure on-change subscription using gRPC
  • Software Defined Infrastructure
  • 2.1 Cisco SD Access
  • 2.1.a Design a Cisco SD Access solution
  • 2.1.a i Underlay network (IS-IS, manual/PnP)
  • 2.1.a ii Overlay fabric design (LISP, VXLAN, Cisco TrustSec)
  • 2.1.a iii Fabric domains (single-site and multi-site using SD-WAN
  • transit)
  • 2.1.b Cisco SD Access deployment
  • 2.1.b i Cisco DNA Center device discovery and device management
  • 2.1.b ii Add fabric node devices to an existing fabric
  • 2.1.b iii Host onboarding (wired endpoints only)
  • 2.1.b iv Fabric border handoff
  • 2.1.c Segmentation
  • 2.1.c i Macro-level segmentation using VNs
  • 2.1.c ii Micro-level segmentation using SGTs (using Cisco ISE)
  • 2.1.d Assurance
  • 2.1.d i Network and client health (360)
  • 2.1.d ii Monitoring and troubleshooting
  • 2.2 Cisco SD-WAN
  • 2.2.a Design a Cisco SD-WAN solution
  • 2.2.a i Orchestration plane (vBond, NAT)2.2.a ii Management plane (vManage)
  • 2.2.a iii Control plane (vSmart, OMP)
  • 2.2.a iv Data plane (vEdge/cEdge)
  • 2.2.b WAN edge deployment
  • 2.2.b i Onboarding new edge routers
  • 2.2.b ii Orchestration with zero-touch provisioning/Plug-And-Play
  • 2.2.b iii OMP
  • 2.2.b iv TLOC
  • 2.2.c Configuration templates
  • 2.2.d Localized policies
  • 2.2.e Centralized policies
  • Transport Technologies and Solutions
  • 3.1 MPLS
  • 3.1.a Operations
  • 3.1.a i Label stack, LSR, LSP
  • 3.1.a ii LDP
  • 3.1.a iii MPLS ping, MPLS traceroute
  • 3.1.b L3VPN
  • 3.1.b i PE-CE routing
  • 3.1.b ii MP-BGP VPNv4/VPNv6
  • 3.1.b iii Extranet (route leaking)
  • 3.2 DMVPN
  • 3.2.a Troubleshoot DMVPN Phase 3 with dual-hub
  • 3.2.a i NHRP
  • 3.2.a ii IPsec/IKEv2 using pre-shared key
  • 3.2.a iii Per-Tunnel QoS
  • 3.2.b Identify use cases for FlexVPN
  • 3.2.b i Site-to-site, Server, Client, Spoke-to-Spoke
  • 3.2.b ii IPsec/IKEv2 using pre-shared key
  • 3.2.b iii MPLS over FlexVPN
  • And more.
  • Indore Branch

    2nd Floor, Orange Business Park, Near Apple Hospital, Indore

Check out more CCIE courses in India

Emigo Networks Logo

CCIE Security Certification And Training

To earn CCIE Security certification, you pass two exams: a qualifying exam that covers core security technologies, and a hands-on lab exam that covers security technologies and solutions through the entire network lifecycle, from designing and deploying to operating and optimizing.

by Emigo Networks [Claim Listing ]
NetworkersCCIE Logo

CCIE Security V6 Training

The new CCIE security V6 is migrated from the old version to leverage the skills and knowledge obtained at the professional level certification. CCIE Security V6 helps you to establish yourself as a technical leader in the rapidly changing world of security technologies and solutions.

by NetworkersCCIE
Networkers Guru Logo

CCIE Enterprise Certification

CCIE Enterprise Certification is an expert level certification in Routing and Switching technologies. The certification deals in advance and complex solutions of networks and require a skillset that validates an individual’s abilities to plan, implement, verify and troubleshoot complex IP network...

by Networkers Guru [Claim Listing ]
Atlanta Computer Institute Logo

CCIE

Atlanta Computer Institute Nagpur conducts Cisco certification Training for CCIE Cisco Certified Internetwork Expert for all students of any field who wants to make a career in Networking universities in India. For Batches CCIE contact Atlanta Computer Institute Nagpur Centers.

by Atlanta Computer Institute
Mohan's Networking Institute Logo

CCIE Security (v6.0)

Cisco Certified Internetwork Expert-Enterprise Infrastructure (CCIE Security v6.0) is more about testing the knowledge practically of what is learned in SCOR. CCIE Security validates Expert Level Professionals with skills related to implementing and operating core security technologies.

by Mohan's Networking Institute [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy