Do you enjoy working in the field of Networking? Are you keen on advancing your networking career? Investing in a CCNP Training Course is the best way to secure your future. This course is specifically designed for professionals who have experience of 1 or 2 years in the networking industry.
Further, the CCNP Training Course is a stepping stone for the prominent Cisco CCIE Enterprise Infrastructure Certification. The New CCNP Enterprise-ENARSI now includes implementation and troubleshooting of advanced routing technologies and services including Layer 3, VPN services, infrastructure security, infrastructure services, and infrastructure automation, etc. Becoming a Cisco Certified CCNP professional carries significant value in the industry.
Syllabus:
- CCNP ENCOR 350-401
- UNIT-1 ARCHITECTURE
- 1.Explain the different design principles used in an enterprise network
- 2.Enterprise network design such as Tier 2, Tier 3, and Fabric Capacity planning
- 3.High availability techniques such as redundancy, FHRP, and SSO
- 4.Analyze design principles of a WLAN deployment
- 5.Wireless deployment models (centralized, distributed, controller-less, controller based, cloud, remote branch)
- 6.Location services in a WLAN design
- 7.Differentiate between on-premises and cloud infrastructure deployments
- 8.Explain the working principles of the Cisco SD-WAN solution
- 9.SD-WAN control and data planes elements
- 10.Traditional WAN and SD-WAN solutions
- 11.Explain the working principles of the Cisco SD-Access solution
- 12.SD-Access control and data planes elements
- 13.Traditional campus interoperating with SD-Access
- 14.Describe concepts of wired and wireless QoS
- 15.QoS components
- 16.QoS policy
- 17.Differentiate hardware and software switching mechanisms
- 18.Process and CEF
- 19.MAC address table and TCAM
- 20.FIB vs. RIB
- UNIT-2 VIRTUALIZATION
- 1.Describe device virtualization technologies
- 2.Hypervisor type 1 and 2
- 3.Virtual machine
- 4.Virtual switching
- 5.Configure and verify data path virtualization technologies
- 6.VRF
- 7.GRE and IPsec tunneling
- 8.Describe network virtualization concepts
- 9.LISP
- 10.VXLAN
- UNIT-3 INFRASTRUCTURE
- 1.Troubleshoot static and dynamic 802.1q trunking protocols
- 2.Troubleshoot static and dynamic EtherChannels
- 3.Configure and verify common Spanning Tree Protocols (RSTP and MST) Layer 3 1.Compare routing concepts of EIGRP and OSPF (advanced distance vector vs. linked state, load balancing, path selection, path operations, metrics)
- 4.Configure and verify simple OSPF environments, including multiple normal areas, summarization, and filtering (neighbor adjacency, point-to-point and broadcast network types, and passive interface)
- 5.Configure and verify eBGP between directly connected neighbors (best path selection algorithm and neighbor relationships) Wireless ,Describe Layer 1 concepts, such as RF power, RSSI, SNR, interference noise, band and channels, and wireless client devices capabilities
- 6.Describe AP modes and antenna types
- 7.Describe access point discovery and join process (discovery algorithms, WLC selection process)
- 8.Describe the main principles and use cases for Layer 2 and Layer 3 roaming
- 9.Troubleshoot WLAN configuration and wireless client connectivity issues IP Services 10.Describe Network Time Protocol (NTP)
- 11.Configure and verify NAT/PAT
- 12.Configure first hop redundancy protocols, such as HSRP and VRRP
- 13.Describe multicast protocols, such as PIM and IGMP v2/v3
- 14 Configure and verify NAT/PAT
- UNIT-4 NETWORK ASSURANCE
- 1.Diagnose network problems using tools such as debugs, conditional debugs, trace route, ping, SNMP, and syslog
- 2.Configure and verify device monitoring using syslog for remote logging
- 3.Configure and verify NetFlow and Flexible NetFlow
- 4.Configure and verify SPAN/RSPAN/ERSPAN
- 5.Configure and verify IPSLA
- 6.Describe Cisco DNA Center workflows to apply network configuration, monitoring, and management
- 7.Configure and verify NETCONF and RESTCONF
- UNIT-5 SECURITY
- 1.Configure and verify device access control
- 2.Lines and password protection
- 3.Authentication and authorization using AAA
- 4.Configure and verify infrastructure security features
- 5.ACLs
- 6.CoPP
- 7.Describe REST API security