Network Journey

Online Instructor-led + 1 Yr Unlimited Lab Rack Access
New Batch Starting: 10-Aug-2024
Days
Hours
Minutes
Seconds

CCIE Enterprise Lab Training

5-in-1 Combo Training

Collections of 5-Modules for CCIE Enterprise Training Under Single Bundle Combo Kit

Learn, Lab & Get Placed

Register 2-Free Trial Class

You Learn 5 Modules of CCIE Enterprise Training Under Single Package with In-Depth Lab Experience!

Early bird Offer 25% Off

1. CCIE Enterprise v1.1

Trainer Sagar Dhawan
Duration: 3 Months
Starting from: 10-August-2024 (Sat & Sun)

2. Cisco Encor v1.1

Trainer Sagar Dhawan
Duration: 3 Months
Starting from: 10-August-2024 (Sat & Sun)

COURSE SCHEDULE

3. Cisco Enarsi v1.1

Trainer Sagar Dhawan
Duration: 3 Months
Starting from: 10-August-2024 (Sat & Sun)

4. Cisco SDWan v1.1

Trainer Sagar Dhawan
Duration: 3 Months
Starting from: 10-August-2024 (Sat & Sun)

5. Cisco SDAccess v1.1

Trainer Sagar Dhawan
Duration: 3 Months
Starting from: 10-August-2024 (Sat & Sun)

BENEFITS JOINING OUR JOB ASSURED TRAINING WITH INTERNSHIP OPPORTUNITY

Key Features

Self-paced Video Course

Designed For Working Professionals

Five Cisco Module

Covered Under Single Bundle Pack

Server Access

1-Year Lab Rack Server Access Provided

Multiple Re-take

Multiple Re-take Of Complete Live Batch

24 X 7 Support

24 X 7 After Class, Lab Support Available

Lifetime Access

To Recordings, Study Material & Pdfs

Lab Topology

BE READY TO PRACTISE ON MOST IN-DEPTH LAB TRAINING COURSE

 
ccie enterprise v1.1 online training

CCIE Enterprise Infrastructure (v1.1)

  • 1.1 Switched campus
  • 1.1.a Switch administration
  • 1.1.a i Managing MAC address table
  • 1.1.a ii Errdisable recovery
  • 1.1.a iii L2 MTU
  • 1.1.b Layer 2 protocols
  • 1.1.b i CDP, LLDP
  • 1.1.b ii UDLD
  • 1.1.c VLAN technologies
  • 1.1.c i Access ports
  • 1.1.c ii Trunk ports (802.1Q)
  • 1.1.c iii Native VLAN
  • 1.1.c iv Manual VLAN pruning
  • 1.1.c v VLAN database
  • 1.1.c vi Normal range and extended range VLANs
  • 1.1.c vii Voice VLAN
  • 1.1.c viii VTP
  • 1.1.d EtherChannel
  • 1.1.d i LACP, static
  • 1.1.d ii Layer 2, Layer 3
  • 1.1.d iii Load balancing
  • 1.1.d iv EtherChannel Misconfiguration Guard
  • 1.1.e Spanning Tree Protocol
  • 1.1.e i PVST+, Rapid PVST+, MST
  • 1.1.e ii Switch priority, port priority, path cost, STP timers
  • 1.1.e iii PortFast, BPDU Guard, BPDU Filter
  • 1.1.e iv Loop Guard, Root Guard
  • 1.2 Routing Concepts
  •  
  • 1.2.a Administrative distance
  • 1.2.b VRF-lite
  • 1.2.c Static routing1.2.d Policy Based Routing
  • 1.2.e VRF-aware routing with any routing protocol
  • 1.2.f Route filtering with any routing protocol
  • 1.2.g Manual summarization with any routing protocol
  • 1.2.h Redistribution between any pair of routing protocols
  • 1.2.i Routing protocol authentication
  • 1.2.j Bidirectional Forwarding Detection
  • 1.3 EIGRP
  • 1.3.a Adjacencies
  • 1.3.b Best path selection
  • 1.3.b i RD, FD, FC, successor, feasible successor
  • 1.3.b ii Classic Metrics and Wide Metrics
  • 1.3.c Operations
  • 1.3.c i General operations
  • 1.3.c ii Topology table
  • 1.3.c iii Packet types
  • 1.3.c iv Stuck In Active
  • 1.3.c v Graceful shutdown
  • 1.3.d EIGRP load balancing
  • 1.3.d i Equal-cost
  • 1.3.d ii Unequal-cost
  • 1.3.d iii Add-path
  • 1.3.e EIGRP Named Mode
  • 1.3.f Optimization, convergence and scalability
  • 1.3.f i Fast convergence requirements
  • 1.3.f ii Query propagation boundaries
  • 1.3.f iii IP FRR (single hop)
  • 1.3.f iv Leak-map with summary routes
  • 1.3.f v EIGRP stub with leak map
  • 1.4 OSPF (v2 and v3)
  • 1.4.a Adjacencies
  • 1.4.b Network types, area types
  • 1.4.c Path preference
  • 1.4.d Operations
  • 1.4.d i General operations
  • 1.4.d ii Graceful shutdown
  • 1.4.d iii GTSM (Generic TTL Security Mechanism)
  • 1.4.e Optimization, convergence and scalability
  • 1.4.e i Metrics
  • 1.4.e ii LSA throttling, SPF tuning, fast hello
  • 1.4.e iii LSA propagation control (area types)
  • 1.4.e iv Stub router
  • 1.4.e v Loop-free alternate
  • 1.4.e vi Prefix suppression
  • 1.5 BGP
  • 1.5.a IBGP and EBGP peer relationships
  • 1.5.a i Peer-group/update-group, template
  • 1.5.a ii Active, passive
  • 1.5.a iii Timers
  • 1.5.a iv Dynamic neighbors
  • 1.5.a v 4-byte AS numbers
  • 1.5.a vi Private AS
  • 1.5.b Path selection
  • 1.5.b i Attributes
  • 1.5.b ii Best path selection algorithm
  • 1.5.b iii Load balancing
  • 1.5.c Routing policies
  • 1.5.c i Attribute manipulation
  • 1.5.c ii Conditional advertisement
  • 1.5.c iii Outbound Route Filtering
  • 1.5.c iv Standard and extended communities
  • 1.5.c v Multi-homing
  • 1.5.d AS path manipulations
  • 1.5.d i local-AS, allowas-in, remove-private-as
  • 1.5.d ii Prepend
  • 1.5.d iii Regexp
  • 1.5.e Convergence and scalability
  • 1.5.e i Route reflector
  • 1.5.e ii Aggregation, as-set
  • 1.5.f Other BGP features
  • 1.5.f i Multipath, add-path
  • 1.5.f ii Soft reconfiguration, Route Refresh
  • 1.6 Multicast
  • 1.6.a Layer 2 multicast
  • 1.6.a i IGMPv2, IGMPv3
  • 1.6.a ii IGMP Snooping, PIM Snooping
  • 1.6.a iii IGMP Querier
  • 1.6.a iv IGMP Filter
  • 1.6.a v MLD
  • 1.6.b Reverse path forwarding check
  • 1.6.c PIM
  • 1.6.c i Sparse Mode
  • 1.6.c ii Static RP, BSR, AutoRP
  • 1.6.c iii Group to RP Mapping
  • 1.6.c iv Bidirectional PIM
  • 1.6.c v Source-Specific Multicast
  • 1.6.c vi Multicast boundary, RP announcement filter
  • 1.6.c vii PIMv6 Anycast RP
  • 1.6.c viii IPv4 Anycast RP using MSDP
  • 1.6.c ix Multicast multipath
  • 2.1 Cisco SD-Access
  • 2.1.a Underlay
  • 2.1.a (i) Manual
  • 2.1.a (ii) LAN automation / PnP
  • 2.1.a (iii) Device discovery and device management
  • 2.1.a (iv) Extended nodes / policy extended nodes
  • 2.1.b Overlay
  • 2.1.b (i) LISP, BGP control planes
  • 2.1.b (ii) VXLAN data plane
  • 2.1.b (iii) Cisco TrustSec policy plane
  • 2.1.b (iv) L2 flooding
  • 2.1.b (v) Native multicast
  • 2.1.c Fabric design
  • 2.1.c (i) Single-site campus
  • 2.1.c (ii) Multisite
  • 2.1.c (iii) Fabric in a box
  • 2.1.d Fabric deployment
  • 2.1.d (i) Host onboarding
  • 2.1.d (ii) Authentication templates
  • 2.1.d (iii) Port configuration
  • 2.1.d (iv) Multisite remote border
  • 2.1.d (v) Border priority
  • 2.1.d (vi) Adding devices to fabric
  • 2.1.e Fabric border handoff
  • 2.1.e (i) SDA, SDWAN, IP transits
  • 2.1.e (ii) Peer device (Fusion router)
  • 2.1.e (iii) Layer 2 border handoff
  • 2.1.f Segmentation
  • 2.1.f (i) Macro segmentation using virtual networks
  • 2.1.f (ii) Micro-level segmentation using SGTs and SGACLs
  • 2.2 Cisco SD-WAN
  • 2.2.a Controller architecture
  • 2.2.a (i) Management plane (vManage)
  • 2.2.a (ii) Orchestration plane (vBond)
  • 2.2.a (iii) Control plane (vSmart)
  • 2.2.b SD-WAN underlay
  • 2.2.b (i) WAN Cloud Edge deployment (AWS, Azure, Google Cloud)
  • 2.2.b (ii) WAN Edge deployment (hardware)
  • 2.2.b (iii) Greenfield, brownfield, and hybrid deployments
  • 2.2.b (iv) System configuration (system IP, site ID, org name, vBond address)
  • 2.2.b (v) Transport configuration (underlay and tunnel interfaces, allowed
    services, TLOC extension)
  • 2.2.c Overlay Management Protocol (OMP)
  • 2.2.c (i) OMP attributes
  • 2.2.c (ii) IPsec key management
  • 2.2.c (iii) Route aggregation
  • 2.2.c (iv) Redistribution
  • 2.2.c (v) Additional features (BGP AS path propagation, SDA integration)
  • 2.2.d Configuration templates
  • 2.2.d (i) CLI templates
  • 2.2.d (ii) Feature templates
  • 2.2.d (iii) Device templates
  • 2.2.e Centralized policies
  • 2.2.e (i) Data policies
  • 2.2.e (ii) Application-aware routing policies
  • 2.2.e (iii) Control policies
  • 2.2.f Localized policies
  • 2.2.f (i) Access lists
  • 2.2.f (ii) Route policies
  • 3.1 Static point-to-point GRE tunnels
  • 3.2 MPLS
  • 3.2.a Operations
  • 3.2.a (i) Label stack, LSR, LSP
  • 3.2.a (ii) LDP
  • 3.2.a (iii) MPLS ping, MPLS traceroute
  • 3.2.b L3VPN
  • 3.2.b (i) PE-CE routing using BGP
  • 3.2.b (ii) Basic MP-BGP VPNv4/VPNv6
  • 3.3 DMVPN
  • 3.3.a Troubleshoot DMVPN Phase 3 with dual hub
  • 3.3.a (i) NHRP
  • 3.3.a (ii) IPsec/IKEv2 using preshared key
  • 4.1 Device security on Cisco IOS XE
  • 4.1.a Control plane policing and protection
  • 4.1.b AAA
  • 4.2 Network security
  • 4.2.a Switch security features
  • 4.2.a (i) VACL, PACL
  • 4.2.a (ii) Storm control
  • 4.2.a (iii) DHCP snooping, DHCP option 82
  • 4.2.a (iv) IP Source Guard
  • 4.2.a (v) Dynamic ARP Inspection
  • 4.2.a (vi) Port security
  • 4.2.b Router security features
  • 4.2.b (i) IPv6 traffic filters
  • 4.2.b (ii) IPv4 access control lists
  • 4.2.b (iii) Unicast Reverse Path Forwarding
  • 4.2.c IPv6 infrastructure security features
  • 4.2.c (i) RA Guard
  • 4.2.c (ii) DHCP Guard
  • 4.2.c (iii) Binding table
  • 4.2.c (iv) Device tracking
  • 4.2.c (v) ND Inspection/Snooping
  • 4.2.c (vi) Source Guard
  • 4.3 System management
  • 4.3.a Device management
  • 4.3.a (i) Console and VTY
  • 4.3.a (ii) SSH, SCP
  • 4.3.a (iii) RESTCONF, NETCONF
  • 4.3.b SNMP (v2c, v3)
  • 4.3.c Logging
  • 4.3.c (i) Local logging, syslog, debugs, conditional debugs
  • 4.3.c (ii) Configuration change notification and logging
  • 4.3.c (iii) Timestamps
  • 4.4 Quality of Service
  • 4.4.a Differentiated Services architecture
  • 4.4.b Classification, trust boundary
  • 4.4.c Network Based Application Recognition (NBAR)
  • 4.4.d Marking DSCP values in IPv4 and IPv6 headers
  • 4.4.e Policing, shaping
  • 4.4.f Congestion management and avoidance
  • 4.4.g HQoS
  • 4.4.h End-to-end Layer 3 QoS using MQC
  • 4.5 Network services
  • 4.5.a First-Hop Redundancy Protocols
  • 4.5.a (i) HSRP, VRRP
  • 4.5.a (ii) Redundancy using IPv6 RS/RA
  • 4.5.b Time synchronization protocols
  • 4.5.b (i) NTP as a client
  • 4.5.b (ii) PTP design considerations
  • 4.5.c DHCP on Cisco devices
  • 4.5.c (i) Client, server, relay
  • 4.5.c (ii) Options
  • 4.5.c (iii) SLAAC/DHCPv6 integration
  • 4.5.c (iv) Stateful, stateless DHCPv6
  • 4.5.c (v) DHCPv6 Prefix Delegation
  • 4.5.d IPv4 Network Address Translation
  • 4.5.d (i) Static NAT, PAT
  • 4.5.d (ii) Dynamic NAT, PAT
  • 4.5.d (iii) Policy-based NAT, PAT
  • 4.5.d (iv) VRF-aware NAT, PAT
  • 4.5.d (v) VRF-aware Software Infrastructure (VASI) NAT
  • 4.6 Network optimization
  • 4.6.a IP SLA (ICMP, UDP, TCP probes)
  • 4.6.b Tracking objects and lists
  • 4.6.c Flexible NetFlow
  • 4.7 Network operations
  • 4.7.a Traffic capture
  • 4.7.a (i) SPAN, RSPAN, ERSPAN
  • 4.7.a (ii) Embedded packet capture
  • 4.7.b Troubleshooting tools
  • 4.7.b (i) Data path packet trace
  • 4.7.b (ii) Conditional debugger (debug platform condition)
  • 5.1 Data encoding formats
  • 5.1.a JSON
  • 5.1.b XML
  • 5.1.c YAML
  • 5.1.d Jinja
  • 5.2 Automation and scripting
  • 5.2.a EEM applets
  • 5.2.b Guest shell
  • 5.2.b (i) Linux environment
  • 5.2.b (ii) CLI Python module
  • 5.2.b (iii) EEM Python module
  • 5.3 Programmability
  • 5.3.a Interaction with vManage API
  • 5.3.a (i) Python requests library and Postman
  • 5.3.a (ii) Monitoring endpoints
  • 5.3.a (iii) Configuration endpoints
  • 5.3.b Interaction with Cisco DNA Center API using HTTP requests (GET, PUT, POST)
    via Python requests library and Postman
  • 5.3.c Deploy and verify model-driven telemetry
  • 5.3.c (i) Configure on-change subscription using gRPC

CCNP Encore v1.1 (350-401)

  • 1.1 Explain the different design principles used in an enterprise network
  • 1.1.a High-level enterprise network design such as 2-tier, 3-tier, fabric, and cloud
  • 1.1.b High availability techniques such as redundancy, FHRP, and SSO
  • 1.2 Describe wireless network design principles
  • 1.2.a Wireless deployment models (centralized, distributed, controller-less,
    controller-based, cloud, remote branch)
  • 1.2.b Location services in a WLAN design
  • 1.2.c Client density
  • 1.3 Explain the working principles of the Cisco SD-WAN solution
  • 1.3.a SD-WAN control and data planes elements
  • 1.3.b Benefits and limitations of SD-WAN solutions
  • 1.4 Explain the working principles of the Cisco SD-Access solution
  • 1.4.a SD-Access control and data planes elements
  • 1.4.b Traditional campus interoperating with SD-Access
  • 1.5 Interpret wired and wireless QoS configurations
  • 1.5.a QoS components
  • 1.5.b QoS policy
  • 1.6 Describe hardware and software switching mechanisms such as CEF, CAM, TCAM, FIB,
    RIB, and adjacency tables
  • 2.1 Describe device virtualization technologies
  • 2.1.a Hypervisor type 1 and 2
  • 2.1.b Virtual machine
  • 2.1.c Virtual switching
  • 2.2 Configure and verify data path virtualization technologies
  • 2.2.a VRF
  • 2.2.b GRE and IPsec tunneling
  • 2.3 Describe network virtualization concepts
  • 2.3.a LISP
  • 2.3.b VXLAN
  • 3.1 Layer 2
  • 3.1.a Troubleshoot static and dynamic 802.1q trunking protocols
  • 3.1.b Troubleshoot static and dynamic EtherChannels
  • 3.1.c Configure and verify common Spanning Tree Protocols (RSTP and MST)
  • 3.2 Layer 3
  • 3.2.a Compare routing concepts of EIGRP and OSPF (advanced distance vector vs.
    linked state, load balancing, path selection, path operations, metrics)
  • 3.2.b Configure and verify simple OSPF environments, including multiple normal
    areas, summarization, and filtering (neighbor adjacency, point-to-point and
    broadcast network types, and passive interface)
  • 3.2.c Configure and verify eBGP between directly connected neighbors (best path
    selection algorithm and neighbor relationships)
  • 3.3 Wireless
  • 3.3.a Describe Layer 1 concepts, such as RF power, RSSI, SNR, interference noise,
    band and channels, and wireless client devices capabilities
  • 3.3.b Describe AP modes and antenna types
  • 3.3.c Describe access point discovery and join process (discovery algorithms, WLC
    selection process)
  • 3.3.d Describe the main principles and use cases for Layer 2 and Layer 3 roaming
  • 3.3.e Troubleshoot WLAN configuration and wireless client connectivity issues
  • 3.4 IP Services
  • 3.4.a Describe Network Time Protocol (NTP)
  • 3.4.b Configure and verify NAT/PAT
  • 3.4.c Configure first hop redundancy protocols, such as HSRP and VRRP
  • 3.4.d Describe multicast protocols, such as PIM and IGMP v2/v3
  • 4.1 Diagnose network problems using tools such as debugs, conditional debugs, traceroute,
    ping, SNMP, and syslog
  • 4.2 Configure and verify Flexible NetFlow
  • 4.3 Configure SPAN/RSPAN/ERSPAN
  • 4.4 Configure and verify IPSLA
  • 4.5 Describe Cisco DNA Center workflows to apply network configuration, monitoring, and
    management
  • 4.6 Configure and verify NETCONF and RESTCONF
  • 5.1 Configure and verify device access control
  • 5.1.a Lines and password protection
  • 5.1.b Authentication and authorization using AAA
  • 5.2 Configure and verify infrastructure security features
  • 5.2.a ACLs
  • 5.2.b CoPP
  • 5.3 Describe REST API security
  • 5.4 Configure and verify wireless security features
  • 5.4.a EAP
  • 5.4.b WebAuth
  • 5.4.c PSK
  • 5.5 Describe the components of network security design
  • 5.5.a Threat defense
  • 5.5.b Endpoint security
  • 5.5.c Next-generation firewall
  • 5.5.d TrustSec, MACsec
  • 5.5.e Network access control with 802.1X, MAB, and WebAuth
  • 6.1 Interpret basic Python components and scripts
  • 6.2 Construct valid JSON encoded file
  • 6.3 Describe the high-level principles and benefits of a data modeling language, such as
    YANG
  • 6.4 Describe APIs for Cisco DNA Center and vManage
  • 6.5 Interpret REST API response codes and results in payload using Cisco DNA Center and
    RESTCONF
  • 6.6 Construct EEM applet to automate configuration, troubleshooting, or data collection
  • 6.7 Compare agent vs. agentless orchestration tools, such as Chef, Puppet, Ansible, and
    SaltStack

CCNP Enarsi v1.1 (300-410)

  • 1.1 Troubleshoot administrative distance (all routing protocols)
  • 1.2 Troubleshoot route map for any routing protocol (attributes, tagging, filtering)
  • 1.3 Troubleshoot loop prevention mechanisms (filtering, tagging, split horizon, route
    poisoning)
  • 1.4 Troubleshoot redistribution between any routing protocols or routing sources
  • 1.5 Troubleshoot manual and auto-summarization with any routing protocol
  • 1.6 Configure and verify policy-based routing
  • 1.7 Configure and verify VRF-Lite
  • 1.8 Describe Bidirectional Forwarding Detection
  • 1.9 Troubleshoot EIGRP (classic and named mode)
  • 1.9.a Address families (IPv4, IPv6)
  • 1.9.b Neighbor relationship and authentication
  • 1.9.c Loop-free path selections (RD, FD, FC, successor, feasible successor, stuck in
    active)
  • 1.9.d Stubs
  • 1.9.e Load balancing (equal and unequal cost)
  • 1.9.f Metrics
  • 1.10 Troubleshoot OSPF (v2/v3)
  • 1.10.a Address families (IPv4, IPv6)
  • 1.10.b Neighbor relationship and authentication
  • 1.10.c Network types, area types, and router types
  • 1.10.c (i) Point-to-point, multipoint, broadcast, nonbroadcast
  • 1.10.c (ii) Area type: backbone, normal, transit, stub, NSSA, totally stub
  • 1.10.c (iii) Internal router, backbone router, ABR, ASBR
  • 1.10.c (iv)Virtual link
  • 1.10.d Path preference
  • 1.11 Troubleshoot BGP (Internal and External)
  • 1.11.a Address families (IPv4, IPv6)
  • 1.11.b Neighbor relationship and authentication (next-hop, mulithop, 4-byte AS, private
    AS, route refresh, synchronization, operation, peer group, states and timers)
  • 1.11.c Path preference (attributes and best-path)
  • 1.11.d Route reflector (excluding multiple route reflectors, confederations, dynamic
    peer)
  • 1.11.e Policies (inbound/outbound filtering, path manipulation)
  • 2.1 Describe MPLS operations (LSR, LDP, label switching, LSP)
  • 2.2 Describe MPLS Layer 3 VPN
  • 2.3 Configure and verify DMVPN (single hub)
  • 2.3.a GRE/mGRE
  • 2.3.b NHRP
  • 2.3.c IPsec
  • 2.3.d Dynamic neighbor
  • 2.3.e Spoke-to-spoke
  • 3.1 Troubleshoot device security using IOS AAA (TACACS+, RADIUS, local database)
  • 3.2 Troubleshoot router security features
  • 3.2.a IPv4 access control lists (standard, extended, time-based)
  • 3.2.b IPv6 traffic filter
  • 3.2.c Unicast reverse path forwarding (uRPF)
  • 3.3 Troubleshoot control plane policing (CoPP) (Telnet, SSH, HTTP(S), SNMP, EIGRP, OSPF,
    BGP)
  • 3.4 Describe IPv6 First Hop security features (RA guard, DHCP guard, binding table, ND
    inspection/snooping, source guard)
  • 4.1 Troubleshoot device management
  • 4.1.a Console and VTY
  • 4.1.b Telnet, HTTP, HTTPS, SSH, SCP
  • 4.1.c (T)FTP
  • 4.2 Troubleshoot SNMP (v2c, v3)
  • 4.3 Troubleshoot network problems using logging (local, syslog, debugs, conditional debugs,
    timestamps)
  • 4.4 Troubleshoot IPv4 and IPv6 DHCP (DHCP client, IOS DHCP server, DHCP relay, DHCP
    options)
  • 4.5 Troubleshoot network performance issues using IP SLA (jitter, tracking objects, delay,
    connectivity)
  • 4.6 Troubleshoot NetFlow (v5, v9, flexible NetFlow)
  • 4.7 Troubleshoot network problems using Cisco DNA Center assurance (connectivity,
    monitoring, device health, network health)

Cisco SD-WAN v1.1 (300-415)

  • 1.1 Describe Cisco SD-WAN architecture and components
  • 1.1.a Orchestration plane (vBond, NAT)
  • 1.1.b Management plane (vManage)
  • 1.1.c Control plane (vSmart, OMP)
  • 1.1.d Data plane (WAN Edge)
  • 1.1.d (i) TLOC
  • 1.1.d (ii) IPsec and GRE
  • 1.1.d (iii) vRoute
  • 1.1.d (iv) BFD
  • 1.2 Describe Cisco SD-WAN Edge platforms and capabilities
  • 1.3 Describe Cisco SD-WAN Cloud OnRamp
  • 1.3.a SaaS
  • 1.3.b IaaS
  • 1.3.c Colocation
  • 2.1 Describe controller cloud deployment
    2.2 Describe controller on-premises deployment
    2.2.a Hosting platform (KVM and Hypervisor)
  • 2.2.b Installing controllers
  • 2.2.c Scalability and redundancy
  • 2.3 Configure certificates and device lists
  • 2.4 Troubleshoot control plane connectivity between controllers
  • 3.1 Describe WAN Edge deployment
  • 3.1.a On-boarding3.1.b Orchestration with zero-touch provisioning and plug-and-play
  • 3.1.c Data center and regional hub deployments
  • 3.2 Configure Cisco SD-WAN data plane
  • 3.2.a Circuit termination and TLOC-extension
  • 3.2.b Dynamic tunnels
  • 3.2.c Underlay-overlay connectivity
  • 3.3 Configure OMP
  • 3.4 Configure TLOCs
  • 3.5 Configure CLI and vManage feature configuration templates
  • 3.5.a VRRP
  • 3.5.b OSPF
  • 3.5.c BGP
  • 3.5.d EIGRP
  • 3.6 Describe multicast support in Cisco SD-WAN
  • 4.1 Configure control policies
  • 4.2 Configure data policies
  • 4.3 Configure end-to-end segmentation
  • 4.3.a VPN segmentation
  • 4.3.b Topologies
  • 4.4 Configure Cisco SD-WAN application-aware routing
  • 4.5 Configure direct Internet access
  • 5.1 Configure service insertion
  • 5.2 Describe Cisco SD-WAN security features
  • 5.2.a. Application-aware enterprise firewall
  • 5.2.b IPS
  • 5.2.c URL filtering
  • 5.2.d AMP
  • 5.2.e SSL and TLS proxy
  • 5.3 Describe Cloud security integration
  • 5.3.a. DNS security
  • 5.3.b. Secure Internet Gateway (SIG)
  • 5.4 Configure QoS treatment on WAN Edge routers
    2020 Cisco Systems, Inc. This document is Cisco Public. Page 3
  • 5.4.a Scheduling
  • 5.4.b Queuing
  • 5.4.c Shaping
  • 5.4.d Policing
  • 5.4.e Marking
  • 5.4.f Per-tunnel and adaptive QoS
  • 6.1 Describe authentication, monitoring, and reporting from vManage
  • 6.2 Configure authentication, monitoring, and reporting
  • 6.3 Describe REST API monitoring
  • 6.4 Describe software image management from vManage

Cisco Enauto v1.1 (300-435)

  • 1.1 Utilize common version control operations with git (add, clone, push, commit, diff,
    branching, merging conflict)
  • 1.2 Describe characteristics of API styles (REST and RPC)
  • 1.3 Describe the challenges encountered and patterns used when consuming APIs
    synchronously and asynchronously
  • 1.4 Interpret Python scripts containing data types, functions, classes, conditions, and
    looping
  • 1.5 Describe the benefits of Python virtual environments
  • 1.6 Explain the benefits of using network configuration tools such as Ansible and Puppet for
    automating IOS XE platforms
  • 2.1 Identify the JSON instance based on a YANG model
  • 2.2 Identify the XML instance based on a YANG model
  • 2.3 Interpret a YANG module tree generated per RFC8340
  • 2.4 Compare functionality, benefits, and uses of OpenConfig, IETF, and native YANG models
  • 2.5 Compare functionality, benefits, and uses of NETCONF and RESTCONF
  • 3.1 Implement device management and monitoring using NetMiko
  • 3.2 Construct a Python script using ncclient that uses NETCONF to manage and monitor an
    IOS XE device
  • 3.3 Configure device using RESTCONF API utilizing Python requests library
  • 3.4 Utilize Ansible to configure an IOS XE device
  • 3.5 Configure a subscription for model driven telemetry on an IOS XE device (CLI, NETCONF,
    and RESTCONF)
  • 3.6 Compare publication and subscription telemetry models
  • 3.6.a Periodic / cadence
  • 3.6.b On-change
  • 3.7 Describe the benefits and usage of telemetry data in troubleshooting the network
  • 3.8 Describe Day 0 provisioning methods
  • 3.8.a iPXE
  • 3.8.b PnP
  • 3.8.c ZTP
  • 4.1 Compare traditional versus software-defined networks
  • 4.2 Describe the features and capabilities of Cisco DNA Center
  • 4.2.a Network assurance APIs
  • 4.2.b Intent APIs
  • 4.2.c Multivendor support (3rd party SDKs)
  • 4.2.d Events and notifications
  • 4.3 Implement Cisco DNA Center event outbound webhooks
  • 4.4 Implement API requests for Cisco DNA Center to accomplish network management tasks
  • 4.4.a Intent APIs
  • 4.4.b Command Runner APIs
  • 4.4.c Site APIs
  • 4.5 Implement API requests for Cisco DNA Center to accomplish network management tasks
    using these APIs
  • 4.5.a Network discovery and device APIs
  • 4.5.b Template APIs (Apply a template)
  • 4.6 Troubleshoot Cisco DNA Center automation process using Intent APIs
  • 5.1 Describe features and capabilities of Cisco SD-WAN vManage Certificate Management
    APIs
  • 5.2 Implement a Python script to perform API requests for Cisco SD-WAN vManage Device
    Inventory APIs to retrieve and display data
  • 5.3 Construct API requests for Cisco SD-WAN vManage Administration APIs
  • 5.4 Implement a Python script to perform API requests for Cisco SD-WAN vManage
    Configuration APIs to modify Cisco SD-WAN fabric configuration
  • 5.5 Construct API requests for Cisco SD-WAN vManage Monitoring APIs (Including real-time)
  • 5.6 Troubleshoot a Cisco SD-WAN deployment using vManage APIs
  • 6.1 Describe features and capabilities of Cisco Meraki
    6.1.a Location Scanning APIs
    6.1.b MV Sense APIs
  • 6.1.c External Captive Portal APIs
  • 6.1.d WebHook Alert APIs
    2019 Cisco Systems, Inc. This document is Cisco Public. Page 3
  • 6.2 Create a network using Cisco Meraki APIs
  • 6.3 Configure a network using Cisco Meraki APIs
  • 6.4 Implement a Python script for Cisco Meraki Alert WebHooks

Book 2-Free Demo Class Today

You Learn 5 Modules of CCIE Enterprise Training Under Single Package with In-Depth Lab Experience!

Early bird Offer 25% Off

Bonus Topology

BE READY TO PRACTISE ON MOST IN-DEPTH LAB TRAINING COURSE

 

FAQ

Most frequent questions and answers
CCIE is a prestigious and advanced certification offered by Cisco Systems, validating expert-level networking skills in designing, implementing, and troubleshooting complex networks.
CCIE certification is recognized globally and signifies a high level of expertise. It can lead to better job opportunities, higher earning potential, and enhanced credibility in the field of networking.
There are no formal prerequisites, but it’s recommended to have a strong foundation in networking concepts and some experience with Cisco devices. Cisco typically recommends candidates have CCNP-level knowledge before attempting the CCIE certification.
CCIE training involves self-study, hands-on practice with Cisco devices, and potentially attending formal training courses from Cisco Learning Partners. You’ll need to pass a written exam and a hands-on lab exam to earn the certification.
The CCIE lab exam is known for its complexity and rigor. It requires candidates to configure, troubleshoot, and optimize intricate network scenarios within a limited time frame. Extensive hands-on practice is essential.
Cisco offers official study guides, practice exams, and online resources. Additionally, there are third-party training providers, books, videos, and community forums that can aid in your preparation.
The time required varies depending on your existing knowledge and the time you can dedicate to studying. It’s common for candidates to spend several months to a year or more preparing for both the written and lab exams.
The cost includes study materials, lab equipment (if needed), and potentially training courses. The written exam and lab exam have separate fees. As of my last update, these fees were significant, so be sure to check the current pricing on Cisco’s official website.
You need to pass the written exam first. Once you’ve passed the written exam, you can schedule the lab exam through the Pearson VUE website. CCIE lab exams are offered at specific Cisco lab locations.

Get Certified

Happy Student Feedbacks

NETWORKJOURNEY
4.9
Based on 136 reviews
powered by Google
Jitendra Kumar SinghJitendra Kumar Singh
11:34 04 Jul 24
The one of the best Platform to learn and enhance skills for better features.I have enrolled the Firewall mastery course at Network Journey and had good experience. All the Instructors were knowledgeable.Mr. Sagar teaching is excellent, explains concepts clearly and he have knowledge on the subject. I an special recommend to join Network Journey who want to learn network about the firewall.Thank you entire team!!
yesh guptayesh gupta
19:06 27 Jun 24
Krishnappa GKrishnappa G
07:25 26 Jun 24
deepika ranganathdeepika ranganath
15:24 25 Jun 24
I was enrolled for Network automation and python course. It was an amazing learning experience.
Amit SinghAmit Singh
06:04 25 Jun 24
I have done few certification course like Python Automation and ASA firewall from here. All the teachers specialy Sagar is brilliant in teaching. You will get all access for lab and into all devices for unlimited time.!! The backend team is very supportive in lab setup and any other difficulty you will face while doing remote lab or Home lab! I will suggest if anyone is looking for course with job assistance join here.!!
Labanya Roy LalaLabanya Roy Lala
23:09 12 Jun 24
It's an awesome experience to be part of the learning program in Network Journey. Course metarial is designed based on practical requirements.Mr. Sagar Dewan is an excellent trainer who explains all the topics in details and also make sure that students are in same page.Moreover prompt response and support from backend team to setup home lab and remote lab is much appreciated.i strongly recommend Network Journey to anyone who want to explore their career in network automation.
SASIKUMAR RAJANSASIKUMAR RAJAN
11:24 12 Jun 24
One of the best institute to take the classes based on industry required usecases And the trainer Mr.Sagar dawan is well equipped trainer and expert in real time networking concept.Even the backend team is excellent to guide to setup labs remotely.I strongly recommend this institute for all the technology background students.
Mohamed FaizalMohamed Faizal
04:59 09 May 24
1.Naeem2.Sagar3.Sajid4.DivyaYour kindness, your presence, your effort—everything about you is truly appreciated. Thank you for exectuting the wonderful network service
Nazakat ali AliNazakat ali Ali
07:21 23 Apr 24
Regardless of expertise, Sagar is an excellent instructor who ensures all students fully grasp the material. He makes the material simple to learn for all students. For everyone eager to learn and comprehend the principles in depth, I heartily recommend Network Journey.
pavan Pediredlapavan Pediredla
09:19 09 Apr 24
I am taking the Firewall mastery course at Network Journey and had good experience. All the Instructors were knowledgeable.Sagar teaching is excellent, explains concepts clearly and he have knowledge on the subject. I will recommend Network Journey to anyone who want to learn network security.Thank you entire team!!
Mory BambaMory Bamba
17:05 06 Apr 24
I have enrolled in a bunch of courses including firewall mastery 5-1, CCIE Enterprise, CCIE Security, AWS, GCP, Azure, Devops. All tutors were very professional and classes were excellent very easy to learn . Backend team for lab support and assistance always there incase if we need help . Overall 5/5
Pradip RansingPradip Ransing
10:58 23 Mar 24
Nice experience and helpful support
rakrak
02:28 05 Mar 24
I have completed network autmation/python training from network journey.I am so happy because the instructor is very patience, the way of teaching is awesome and very easy to understand the concepts.Sagar- Thank you for the excellent training session.
Archana PanjakadiArchana Panjakadi
06:08 08 Jan 24
Excellent Training Center!This training center is top-notch for anyone interested in Networking and Automation Courses.Sagar Dhawan's expertise and prompt responses were instrumental in my journey. The Network Automation course was incredibly beneficial. Highly recommend this course and the excellent support from Sagar. I have registered for other recorded courses offered by trainer Shank, they have also been very helpful.
js_loader

Know Your Instructor

more than 16+ Years of Industrial experience

 

Mr. Sagar Dhawan
Trainer CCIE (EI & SEC)

Trainer Sagar Dhawan has delivered more than 1300+ hours of training in last 14 years.

Trainer Dhawan delivers both CCIE (EI & SEC) training to the Enterprise engineers and corporate training.

Below are some of the certifications Mr. Sagar pursued:

  1. CCIE
  2. CCNA
  3. Cisco Certified Specialist – Enterprise Core
  4. Cisco Certified Specialist – Security Core
  5. Cisco Certified Network Professional Security (CCNP Security)
  6. Cisco Certified Specialist – Network Security Firepower
  7. Cisco Certified Internetwork Expert Enterprise Infrastructure (CCIE Enterprise Infrastructure)
  8. Cisco Certified Internetwork Expert Security (CCIE Security)

Register 2-Free Demo Class Today

You Learn 5 Modules of CCIE Enterprise Training Under Single Package with In-Depth Lab Experience!

Early bird Offer 25% Off

Contact Us

For any inquiries please email

Copyright © 2019-2024 Network Journey. All Rights Reserved.