0% found this document useful (0 votes)
275 views6 pages

CCNP Enterprise Brochure

The document provides an overview of the CCNP certification modules which focus on implementing and troubleshooting LAN and WAN networks. The modules cover topics such as enterprise network architecture, virtualization technologies, SD-WAN solutions, wireless networking, infrastructure security, automation, Layer 3 routing protocols, VPN technologies, and infrastructure services. The goal is to develop skills in configuring, verifying and troubleshooting enterprise network infrastructure.

Uploaded by

AnataTumonglo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
275 views6 pages

CCNP Enterprise Brochure

The document provides an overview of the CCNP certification modules which focus on implementing and troubleshooting LAN and WAN networks. The modules cover topics such as enterprise network architecture, virtualization technologies, SD-WAN solutions, wireless networking, infrastructure security, automation, Layer 3 routing protocols, VPN technologies, and infrastructure services. The goal is to develop skills in configuring, verifying and troubleshooting enterprise network infrastructure.

Uploaded by

AnataTumonglo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

CCNP

Become a Network Professional-


Implement and troubleshoot both LAN
www.nwkings.com | www.learn.nwkings.com and WAN networks.

CCNP 350-401 ENCOR:

Module 1 Architecture Module 2 Virtualization

Enterprise Network Virtualization technologies


Describe device virtualization technologies.
Understand design principles used in an enterprise

1. network
1.  Hypervisor type 1 and 2
 Virtual machine
 Tier 2, Tier 3 planning  High availability
 Virtual switching
 Fabric Capacity planning techniques (FHRP, SSO,
Redundancy)

WLAN deployment Path Virtualization technologies


You will understand the characteristics of network Con gure and verify data path

2. 2.
topology architectures. virtualization technologies
 Wireless deployment models
 Location services in a WLAN design  VRF  IPsec Tunneling

 Difference between on-premises & cloud  GRE Tunneling

infrastructure deployments

Cisco SD-WAN solutions Virtualization concepts


Explain the working principles of the Cisco SD-WAN Describe network virtualization concepts

3. solution
3.  LISP
 SD-WAN control plane elements  Traditional WAN  VXLAN
 SD-WAN data plane elements  SD-WAN solutions

Cisco SD-Access solution


Explain the working principles of the Cisco SD-Access

4. solution

 SD-Access control plane element  Interoperating


 SD-Access data plane elements SD-Access

Wireless QoS

5.
Describe concepts of wired and wireless QoS

 QoS components  QoS policy

Switching mechanisms
Differentiate hardware and software switching

6. mechanisms
 Process and CEF  FIB vs. RIB
 MAC address table and TCAM
Module 3 Infrastructure Module 4 Network Assurance

Layer 2 Network Assurance


Learn to troubleshoot and con gure the following. Diagnose network problems using various tools.

1.  Static and dynamic trunking protocols  Debugs, conditional debugs

1.
 Static and dynamic EtherChannels  Trace route
 Spanning Tree Protocols (RSTP and MST)  Ping, SNMP, Syslog
 Con gure and verify:
o SPAN/RSPAN/ERSPA
o IPSLA
o NETCONF & RESTCONF
Layer 3
Learn routing concepts, con gure and verify OSPF
environments and eBGP.

2.  Compare EIGRP and OSPF


 Con gure and verify multiple
 Filtering
 Best path selection
normal areas algorithm
 Summarization  Neighbor relationship

Wireless
Describe Layer 1 concepts, access point discovery
and join process.

3.  RF power, RSSI, SNR


 AP modes
 Band channels
 Wireless client devices
 Antenna types capabilities
 Interference noise  Troubleshoot WLAN con guration

IP Services
Describe, con gure and verify
related protocols.

4.  Network Time  First hop redundancy


Protocol (NTP) protocols (HDRP & VRRP)
 NAT/PAT  Multicast protocols (PIM &
IGMP v2/v3)

www.nwkings.com | www.learn.nwkings.com
Module 5 Security Module 6 Automation

Con gure and verify device access control Automation

1.  Lines and password protection


 Authentication and authorization using AAA


Basic Python components &. scripts
Construct JSON encoded le
 Data modeling language bene ts (YANG)

1. 

APIs
Interpret REST API response code
 Construct EEM applet
 Compare agent vs. Agentless orchestration tools
(Chef, Ansible, Puppet)

Con gure and verify infrastructure security


features

2.  ACLs
 CoPP

Describe REST API security

3.

Con gure and verify wireless security features

4.  EAP
 WebAuth
 PSK

Describe components of network security


design

 Threat defence

5.  Endpoint security
 Next-generation rewall
 TrustSec
 MACsec
 Network access control

www.nwkings.com | www.learn.nwkings.com
CCNP 300-401 ENARSI:

Module 1 Layer 3 technologies Module 2 VPN Technologies

Troubleshoot and verify the following. Describe MPLS operations


 Administrative distance

1.  Route map for routing protocol


 Loop prevention mechanisms
1.
 LSR
 LDP
 Redistribution between routing protocols &  Label switching
routing sources  LSP
 Manual and auto-summarization

Con gure and verify the following.


Describe MPLS Layer 3 VPN

2. 2.
 Policy-based routine
 VRF-Lite
 Bidirectional forwarding Detection

Con gure and verify DMVPN (single hub)


Troubleshoot EIGRP
 GRE/mGRE
 EIGRP (classic & named mode)
3.  NHRP

3.  Address families (IPv4, IPv6)  IPsec


 Neighbor relationship & authentication  Dynamic neighbor
 Loop-free path selections  Spoke-to-spoke
 Stubs
 Load balancing
 Metrics

Troubleshoot OSPF (v2/v3)

 Address families

4.  Neighbor relationship & authentication


 Path reference
 Route re ector
 Policies

www.nwkings.com | www.learn.nwkings.com
Module 3 Infrastructure Security Module 4 Infrastructure Services

Troubleshoot device security using: Troubleshoot device management

1.  IOS AAA
 TACACS+ 1.  Console and VTY
 Telent, HTTP, HTTPS, SSH, SCP
 RADIUS  (T)FTP
 Local database

Troubleshoot route security features Troubleshoot SNMP (v2c, v3)

2.
2.  IPv4 access control lists
 IPv6 traf c lter
 Unicast reverse path forwarding (uRPF)

Troubleshoot the following.

Troubleshoot control plane policing (CoPP)  Network problems using logging & Cisco DNA

3. Center assurance

3.
 Telnet  EIGRP  IPv4 and IPv6 DHCP
 SSH  OSPF  Network performance issues using IP SLA
 HTTP(S)  BGP  NetFlow
 SNMP

Describe IPv6 First Hop security


features

4.  RA guard
 DHCP guard
 ND inspection/snooping
 Source guard
 Binding table

www.nwkings.com | www.learn.nwkings.com
https://www.youtube.com/c/NetworkkingsOrgtraining/featured

https://in.linkedin.com/company/networkkings

https://www.nwkings.com/

[email protected]

+918130537300

Network kings IT services Private Limited,


Chandigarh Citi Center , VIP Road, SCO 41-43, B
Block 4th oor, Zirakpur, Chandigarh

Network kings 60 Parrotta Drive Toronto ON


M9M Oe5

www.nwkings.com | www.learn.nwkings.com

https://www.facebook.com/Networkkingss/

https://www.instagram.com/network.kings/

You might also like