Network Journey




Enterprise v1.1

Learn from 13+ Years Industry-Experienced Trainer!

Learn, Lab & Get Placed

Join 2-Free Demo Class Today

Enroll Yourself for a 100% Job Guarantee Program and Open the Doors to Opportunity

Early bird Offer 25% Off


Key Features

Online Instructor-led Weekend Course

13+ years of industry experience

Qualified Trainers in Industry

30,000+ students already enrolled

Job Ready Course

97% placement rate

24/7 Unlimited Lab Access

24/7 x 9-month of Labbing access

CCNP Course Curriculum


Role and function of network components


Configure and verify VLANs multiple switches


Interpret the components of routing table

Network Assurance

Configure and verify inside source NAT using static and pools

Security Fundamentals

Configure and verify inside source NAT using static and pools

Automation and Programmability

Explain how automation impacts network management

Experience World Class Real Device to Practice




Avail 6-month unlmited remote lab access for handson labbing


All Classes are Online Instructor-led, however, also you get lifetime access to recording for your future reference


We got 100+ Step-by-step Workbook for Real-time practicing and Case-studies lecture.


After Class Support


We got 100+ step-by-step Workbook for Real-time practical and case-studies.


We got our Backend Technical Support to help on Home Lab Support



Book 2-Free Demo Class


Enroll to the 4-Month Course & Practice on Real Devices


100% Clear Exam at First Attempt and 100% Job Guaranteed

CCNP Workbook - 77 Page Sample v1.1



Lab Topology v1.1


This is our CISCO CCNP ENCOR + ENARSI Practice Lab Topology

CCNA 200-301

  • 1.1 Explain the role and function of network components
  • 1.1.a Routers
  • 1.1.b Layer 2 and Layer 3 switches
  • 1.1.c Next-generation firewalls and IPS
  • 1.1.d Access points
  • 1.1.e Controllers (Cisco DNA Center and WLC)
  • 1.1.f Endpoints
  • 1.1.g Servers
  • 1.1.h PoE
  • 1.2 Describe characteristics of network topology architectures
  • 1.2.a Two-tier
  • 1.2.b Three-tier
  • 1.2.c Spine-leaf
  • 1.2.d WAN
  • 1.2.e Small office/home office (SOHO)
  • 1.2.f On-premise and cloud
  • 1.3 Compare physical interface and cabling types
  • 1.3.a Single-mode fiber, multimode fiber, copper
  • 1.3.b Connections (Ethernet shared media and point-to-point)
  • 1.4 Identify interface and cable issues (collisions, errors, mismatch duplex, and/or
  • 1.5 Compare TCP to UDP
  • 1.6 Configure and verify IPv4 addressing and subnetting
  • 1.7 Describe the need for private IPv4 addressing
  • 1.8 Configure and verify IPv6 addressing and prefix
  • 1.9 Describe IPv6 address types
  • 1.9.a Unicast (global, unique local, and link local)
  • 1.9.b Anycast
  • 1.9.c Multicast
  • 1.9.d Modified EUI 64
  • 1.10 Verify IP parameters for Client OS (Windows, Mac OS, Linux)
  • 1.11 Describe wireless principles
  • 1.11.a Nonoverlapping Wi-Fi channels
  • 1.11.b SSID
  • 1.11.c RF
  • 1.11.d Encryption
  • 1.12 Explain virtualization fundamentals (server virtualization, containers, and VRFs)
  • 1.13 Describe switching concepts
  • 1.13.a MAC learning and aging
  • 1.13.b Frame switching
  • 1.13.c Frame flooding
  • 1.13.d MAC address table
  • 2.1 Configure and verify VLANs (normal range) spanning multiple switches
  • 2.1.a Access ports (data and voice)
  • 2.1.b Default VLAN
  • 2.1.c Connectivity
  • 2.2 Configure and verify interswitch connectivity
  • 2.2.a Trunk ports
  • 2.2.b 802.1Q
  • 2.2.c Native VLAN
  • 2.3 Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol
    and LLDP)
  • 2.4 Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)
  • 2.5 Interpret basic operations of Rapid PVST+ Spanning Tree Protocol
  • 2.5.a Root port, root bridge (primary/secondary), and other port names
  • 2.5.b Port states (forwarding/blocking)
  • 2.5.c PortFast
  • 2.6 Describe Cisco Wireless Architectures and AP modes
  • 2.7 Describe physical infrastructure connections of WLAN components (AP, WLC,
    access/trunk ports, and LAG)
  • 2.8 Describe AP and WLC management access connections (Telnet, SSH, HTTP,
    HTTPS, console, and TACACS+/RADIUS)
  • 2.9 Interpret the wireless LAN GUI configuration for client connectivity, such as
    WLAN creation, security settings, QoS profiles, and advanced settings
  • 3.1 Interpret the components of routing table
  • 3.1.a Routing protocol code
  • 3.1.b Prefix
  • 3.1.c Network mask
  • 3.1.d Next hop
  • 3.1.e Administrative distance
  • 3.1.f Metric
  • 3.1.g Gateway of last resort
  • 3.2 Determine how a router makes a forwarding decision by default
  • 3.2.a Longest prefix match
  • 3.2.b Administrative distance
  • 3.2.c Routing protocol metric
  • 3.3 Configure and verify IPv4 and IPv6 static routing
  • 3.3.a Default route
  • 3.3.b Network route
  • 3.3.c Host route
  • 3.3.d Floating static
  • 3.4 Configure and verify single area OSPFv2
  • 3.4.a Neighbor adjacencies
  • 3.4.b Point-to-point
  • 3.4.c Broadcast (DR/BDR selection)
  • 3.4.d Router ID
  • 3.5 Describe the purpose, functions, and concepts of first hop redundancy
  • 4.1 Configure and verify inside source NAT using static and pools
  • 4.2 Configure and verify NTP operating in a client and server mode
  • 4.3 Explain the role of DHCP and DNS within the network
  • 4.4 Explain the function of SNMP in network operations
  • 4.5 Describe the use of syslog features including facilities and levels
  • 4.6 Configure and verify DHCP client and relay
  • 4.7 Explain the forwarding per-hop behavior (PHB) for QoS, such as classification,
    marking, queuing, congestion, policing, and shaping
  • 4.8 Configure network devices for remote access using SSH
  • 4.9 Describe the capabilities and function of TFTP/FTP in the network
  • 5.1 Define key security concepts (threats, vulnerabilities, exploits, and mitigation
  • 5.2 Describe security program elements (user awareness, training, and physical
    access control)
  • 5.3 Configure and verify device access control using local passwords
  • 5.4 Describe security password policies elements, such as management,
    complexity, and password alternatives (multifactor authentication, certificates,
    and biometrics)
  • 5.5 Describe IPsec remote access and site-to-site VPNs
  • 5.6 Configure and verify access control lists
  • 5.7 Configure and verify Layer 2 security features (DHCP snooping, dynamic ARP
    inspection, and port security)
  • 5.8 Compare authentication, authorization, and accounting concepts
  • 5.9 Describe wireless security protocols (WPA, WPA2, and WPA3)
    5.10 Configure and verify WLAN within the GUI using WPA2 PSK
  • 6.1 Explain how automation impacts network management
  • 6.2 Compare traditional networks with controller-based networking
  • 6.3 Describe controller-based, software defined architecture (overlay, underlay,
    and fabric)
  • 6.3.a Separation of control plane and data plane
  • 6.3.b Northbound and Southbound APIs
  • 6.4 Compare traditional campus device management with Cisco DNA Center
    enabled device management
  • 6.5 Describe characteristics of REST-based APIs (CRUD, HTTP verbs, and data
  • 6.6 Recognize the capabilities of configuration management mechanisms Puppet,
    Chef, and Ansible
  • 6.7 Recognize components of JSON-encoded data

CCNP ENCOR 350-401 v1.1

  • 1.1 Explain the different design principles used in an enterprise network
  • 1.1.a Enterprise network design such as Tier 2, Tier 3, and Fabric Capacity planning
  • 1.1.b High availability techniques such as redundancy, FHRP, and SSO
  • 1.2 Analyze design principles of a WLAN deployment
  • 1.2.a Wireless deployment models (centralized, distributed, controller-less, controller
    based, cloud, remote branch)
  • 1.2.b Location services in a WLAN design
  • 1.3 Differentiate between on-premises and cloud infrastructure deployments
  • 1.4 Explain the working principles of the Cisco SD-WAN solution
  • 1.4.a SD-WAN control and data planes elements
  • 1.4.b Traditional WAN and SD-WAN solutions
  • 1.5 Explain the working principles of the Cisco SD-Access solution
  • 1.5.a SD-Access control and data planes elements
  • 1.5.b Traditional campus interoperating with SD-Access
  • 1.6 Describe concepts of wired and wireless QoS
  • 1.6.a QoS components
  • 1.6.b QoS policy
  • 1.7 Differentiate hardware and software switching mechanisms
  • 1.7.a Process and CEF
  • 1.7.b MAC address table and TCAM
  • 1.7.c FIB vs. RI
  • 2.1 Describe device virtualization technologies
    2.1.a Hypervisor type 1 and 2
  • 2.1.b Virtual machine
  • 2.1.c Virtual switching
  • 2.2 Configure and verify data path virtualization technologies
  • 2.2.a VRF
  • 2.2.b GRE and IPsec tunneling
  • 2.3 Describe network virtualization concepts
  • 2.3.a LISP
  • 2.3.b VXLAN
  • 3.1 Layer 2
  • 3.1.a Troubleshoot static and dynamic 802.1q trunking protocols
  • 3.1.b Troubleshoot static and dynamic EtherChannels
  • 3.1.c Configure and verify common Spanning Tree Protocols (RSTP and MST)
  • 3.2 Layer 3
  • 3.2.a Compare routing concepts of EIGRP and OSPF (advanced distance vector vs.
    linked state, load balancing, path selection, path operations, metrics)
  • 3.2.b Configure and verify simple OSPF environments, including multiple normal
    areas, summarization, and filtering (neighbor adjacency, point-to-point and
    broadcast network types, and passive interface)
  • 3.2.c Configure and verify eBGP between directly connected neighbors (best path
    selection algorithm and neighbor relationships)
  • 3.3 Wireless
  • 3.3.a Describe Layer 1 concepts, such as RF power, RSSI, SNR, interference noise,
    band and channels, and wireless client devices capabilities
  • 3.3.b Describe AP modes and antenna types
  • 3.3.c Describe access point discovery and join process (discovery algorithms, WLC
    selection process)
  • 3.3.d Describe the main principles and use cases for Layer 2 and Layer 3 roaming
  • 3.3.e Troubleshoot WLAN configuration and wireless client connectivity issues
  • 3.4 IP Services
  • 3.4.a Describe Network Time Protocol (NTP)
  • 3.4.b Configure and verify NAT/PAT
  • 3.4.c Configure first hop redundancy protocols, such as HSRP and VRRP
  • 3.4.d Describe multicast protocols, such as PIM and IGMP v2/v3
  • 4.1 Diagnose network problems using tools such as debugs, conditional debugs, trace route,
    ping, SNMP, and syslog
  • 4.2 Configure and verify device monitoring using syslog for remote logging
  • 4.3 Configure and verify NetFlow and Flexible NetFlow
  • 4.4 Configure and verify SPAN/RSPAN/ERSPAN
  • 4.5 Configure and verify IPSLA
  • 4.6 Describe Cisco DNA Center workflows to apply network configuration, monitoring, and
  • 4.7 Configure and verify NETCONF and RESTCONF
  • 5.1 Configure and verify device access control
  • 5.1.a Lines and password protection
  • 5.1.b Authentication and authorization using AAA
  • 5.2 Configure and verify infrastructure security features
  • 5.2.a ACLs
  • 5.2.b CoPP
  • 5.3 Describe REST API security
  • 5.4 Configure and verify wireless security features
  • 5.4.a EAP
  • 5.4.b WebAuth
  • 5.4.c PSK
  • 5.5 Describe the components of network security design
  • 5.5.a Threat defense
  • 5.5.b Endpoint security
  • 5.5.c Next-generation firewall
  • 5.5.d TrustSec, MACsec
  • 5.5.e Network access control with 802.1X, MAB, and WebAuth
  • 6.1 Interpret basic Python components and scripts
  • 6.2 Construct valid JSON encoded file
  • 6.3 Describe the high-level principles and benefits of a data modeling language, such as
  • 6.4 Describe APIs for Cisco DNA Center and vManage
  • 6.5 Interpret REST API response codes and results in payload using Cisco DNA Center and
  • 6.6 Construct EEM applet to automate configuration, troubleshooting, or data collection
  • 6.7 Compare agent vs. agentless orchestration tools, such as Chef, Puppet, Ansible, and

CCNP ENARSI 300-410 v1.1

  • 1.1 Troubleshoot administrative distance (all routing protocols)
  • 1.2 Troubleshoot route map for any routing protocol (attributes, tagging, filtering)
  • 1.3 Troubleshoot loop prevention mechanisms (filtering, tagging, split horizon, route
  • 1.4 Troubleshoot redistribution between any routing protocols or routing sources
  • 1.5 Troubleshoot manual and auto-summarization with any routing protocol
  • 1.6 Configure and verify policy-based routing
  • 1.7 Configure and verify VRF-Lite
  • 1.8 Describe Bidirectional Forwarding Detection
  • 1.9 Troubleshoot EIGRP (classic and named mode)
  • 1.9.a Address families (IPv4, IPv6)
  • 1.9.b Neighbor relationship and authentication
  • 1.9.c Loop-free path selections (RD, FD, FC, successor, feasible successor, stuck in
  • 1.9.d Stubs
  • 1.9.e Load balancing (equal and unequal cost)
  • 1.9.f Metrics
  • 1.10 Troubleshoot OSPF (v2/v3)
  • 1.10.a Address families (IPv4, IPv6)
  • 1.10.b Neighbor relationship and authentication
  • 1.10.c Network types, area types, and router types
  • 1.10.c (i) Point-to-point, multipoint, broadcast, nonbroadcast
  • 1.10.c (ii) Area type: backbone, normal, transit, stub, NSSA, totally stub
  • 1.10.c (iii) Internal router, backbone router, ABR, ASBR
  • 1.10.c (iv)Virtual link
  • 1.10.d Path preference
  • 1.11 Troubleshoot BGP (Internal and External)
  • 1.11.a Address families (IPv4, IPv6)
  • 1.11.b Neighbor relationship and authentication (next-hop, mulithop, 4-byte AS, private
    AS, route refresh, synchronization, operation, peer group, states and timers)
  • 1.11.c Path preference (attributes and best-path)
  • 1.11.d Route reflector (excluding multiple route reflectors, confederations, dynamic
  • 1.11.e Policies (inbound/outbound filtering, path manipulation)
  • 2.1 Describe MPLS operations (LSR, LDP, label switching, LSP)
  • 2.2 Describe MPLS Layer 3 VPN
  • 2.3 Configure and verify DMVPN (single hub)
  • 2.3.a GRE/mGRE
  • 2.3.b NHRP
  • 2.3.c IPsec
  • 2.3.d Dynamic neighbor
  • 2.3.e Spoke-to-spoke
  • 3.1 Troubleshoot device security using IOS AAA (TACACS+, RADIUS, local database)
  • 3.2 Troubleshoot router security features
  • 3.2.a IPv4 access control lists (standard, extended, time-based)
  • 3.2.b IPv6 traffic filter
  • 3.2.c Unicast reverse path forwarding (uRPF)
  • 3.3 Troubleshoot control plane policing (CoPP) (Telnet, SSH, HTTP(S), SNMP, EIGRP, OSPF,
  • 3.4 Describe IPv6 First Hop security features (RA guard, DHCP guard, binding table, ND
    inspection/snooping, source guard)
  • 4.1 Troubleshoot device management
    4.1.a Console and VTY
  • 4.1.b Telnet, HTTP, HTTPS, SSH, SCP
    4.1.c (T)FTP
  • 4.2 Troubleshoot SNMP (v2c, v3)
  • 4.3 Troubleshoot network problems using logging (local, syslog, debugs, conditional debugs,
  • 4.4 Troubleshoot IPv4 and IPv6 DHCP (DHCP client, IOS DHCP server, DHCP relay, DHCP
  • 4.5 Troubleshoot network performance issues using IP SLA (jitter, tracking objects, delay,
  • 4.6 Troubleshoot NetFlow (v5, v9, flexible NetFlow)
  • 4.7 Troubleshoot network problems using Cisco DNA Center assurance (connectivity,
    monitoring, device health, network health)

Join 2-Free Demo Class Today

Enroll Yourself for a 100% Job Guarantee Program and Open the Doors to Opportunity

Early bird Offer 25% Off


Most frequent questions and answers

If in case you miss the lecture due to any technical or personal reason, no need to worry about it. NETWORK JOURNEY has planned the course in such a manner that you won’t be able to miss any detail. After each live session, you can ask for the recorded video of the online class. If you have any doubt, you can have a one-to-one discussion with your instructor about the topic, just like the live class.

Surely Yes! Soon after completion of the course, NETWORKJOURNEY offers its placement assistance services to the student that includes personality grooming, interview preparation, and professional resume building. According to the performance of the student, we even refer our students to different tech organizations.

Yes, you can ask your doubt during and after the course. You simply need to discuss your doubt directly with our team or the instructor.

This course is presented with live classes from industry experts, study material, training notes, PPT, recorded classroom videos, real-time training sessions, placement assistance services, technical support, required IT tools as per the course, and a certificate of completion.

Before enrolling in the course, you have the option to test the knowledge and teaching style of the instructor with free demo classes. If you are satisfied with it, then only you need to enroll in the course.

We understand that every person may have a different time schedule. Thus, you have the freedom to decide the suitable batch timing.

Our Hiring Partners

Amazing career opportunities in Top IT Networking Companies

Success Student Placement

We would like to congratulate our students who were able to secure a good job after doing our CCNP Training.

Customer Reviews

What students say

Meet Your Trainers

Industry-expert Trainers to Mentor your Career

Sagar Dhawan

SENIOR Network Engg & Trainer with 13+ Yrs Experience

Ms. Divya

Senior Lab Trainer


Student Relationship Manager

Learn, lab & get placed in dream MNC

Join Online Demo Session

Learn from 13+ Years Industry-Experienced Trainer

Learn, Lab & Get Placed

Join 2-Free Demo Class Today

Enroll Yourself for a 100% Job Guarantee Program and Open the Doors to Opportunity

Copyright © 2019-2024 Network Journey. All Rights Reserved.