IIHT
Follow us:

Courses

CCNP

CCNP 350-401 ENCOR

  • Explain the different design principles used in an enterprise network
  • Analyze design principles of a WLAN deployment
  • Differentiate between on-premises and cloud infrastructure deployments
  • Explain the working principles of the Cisco SD-WAN solution
  • Explain the working principles of the Cisco SD-Access solution
  • Differentiate hardware and software switching mechanisms
  • Virtualization
  • Describe device virtualization technologies
  • Configure and verify data path virtualization technologies
  • Describe network virtualization concepts
  • Infrastructure, Layer 2, Layer 3, Wireless, IP Services, Network Assurance
  • Diagnose network problems using tools such as debugs, conditional debugs, trace route, ping, SNMP, and syslog
  • Configure and verify device monitoring using syslog for logging
  • Configure and verify NetFlow and Flexible NetFlow
  • Configure and verify SPAN/RSPAN/ERSPAN


Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI)- environments (CCNP)

  • Troubleshoot administrative distance (all routing protocols)
  • Troubleshoot route map for any routing protocol (attributes, tagging, filtering)
  • Troubleshoot loop prevention mechanisms (filtering, tagging, split horizon, route poisoning)
  • Troubleshoot redistribution between any routing protocols or routing sources
  • Troubleshoot manual and auto-summarization with any routing protocol
  • Configure and verify policy-based routing
  • Implement and configure an EIGRP based solution.
  • Troubleshoot OSPF (v2/v3), 1.10.c Network types, area types, and router types
  • Troubleshoot BGP (Internal and External), bgp attributes, Policy
  • VPN technology
  • Infrastructure security, Troubleshoot device security using IOS AAA (TACACS+, RADIUS, local database)
  • Infrastructure SERVICES (Telnet, HTTP, HTTPS, SSH, SCP, DHCP client, IOS DHCP server, DHCP relay, DHCP options, local, syslog, debugs, conditional debugs)
  • IPV6 technology


CCNP Security

  • Site-to-site VPNs on routers and firewalis
  • Describe GETVPN ,
  • Implement IPsec (with IKEvI and IKEv2 for both IPV4 & IPV6)
  • Implement DMVPN (hub-Spoke and spoke-spoke on both IPV4 & IPV6)
  • Implement FlexVPN (hub-Spoke on both IPV4 & IPV6) using local AAA
  • Implement remote access VPNs
  • Implement AnyConnect IKEv2 VPNs on ASA and routers
  • Implement AnyConnect SSLVPN on ASA and routers
  • Implement clientless SSLVPN on ASA and routers
  • Implement FLEX VPN on routers
  • Troubleshooting, Monitoring and Reporting Tools
  • Troubleshoot VPN using ASDIVI & CLI
  • Troubleshoot Ipsec
  • Troubleshoot DMVPN
  • Troubleshoot FlexVPN
  • Troubleshoot AnyConnect IKEv2 and SSL VPNs on ASA and routers
  • Troubleshoot clientless SSLVPN on ASA and routers
  • Secure Communications Architectures
  • Design site-to-site VPN solutions
  • Identify functional components of GETVPN, FlexVPN, DMVPN, and Ipsec
  • VPN technology considerations based on functional requirements
  • High availability considerations
  • Identify VPN technology based on configuration output
  • Design remote access VPN solutions
  • Identify functional components of FlexVPN, IPsec, and Clientless SSL
  • VPN technology considerations based on functional requirements
  • High availability considerations
  • Identify VPN technology based on configuration output
  • Identify AnyConnect client requirements " .
  • Clientless SSL browser and client considerations / requirements
  • Identify split tunneling requirements
  • Describe encryption, hashing, and Next Generation Encryption (NGE)
  • Compare and contrast Symmetric and asymmetric key algorithms
  • Identify and describe the cryptographic process in VPNs-Dlffie-Hellman,
  • IPsec - ESP AH, IKEv1, IKEv2, hashing algorithms MD5 and SHA, and
  • authentication methods
  • Describe PKl components and protection methods
  • Describe Elliptic Curve Cryptography (ECC)
  • Compare and contrast SSL, DTLS and TLS