|
Courses: CCNP:ENTERPRISE |
|
|
Duration- 3 Months |
Course Fees- 20,000/- |
|
|
The all new Cisco Certified Network Professional (CCNP) has 3 modules ROUTE, Switch & TSHOOT validates the ability to plan, implement, verify and troubleshoot local and wide-area enterprise networks. The CCNP certification is appropriate for those who are ready to advance their skills and work independently on complex network solutions. The course covers topics like EIGRP, OSPF,BGP, IPv6, VPNs, L2 / L3 Switching, VLAN,VTP, HSRP, VRRP, GLBP, VOIP, Wireless, Troubleshooting methods. |
ENCOR-(350-401) |
Enhanced Interior Gateway Routing Protocols - EIGRP |
- Establishing Neighbors
- Topology Table
- IP Routing Table
- Optimizing EIGRP Convergence
- Route Filtering
- Route Summarization
- Authentication
|
Open Shortest Path First- OSPF |
- Planning
- Verification
- Configuration
- Neighbors
- Adjacencies Formation (on LAN & WAN)
- Link State Advt- LSAs
- Link State Database
- Route Filtering & Summarization
- Areas & Special Areas
- Authentication
- Virtual Links
|
Path Control |
- Redistribution into EIGRP
- Redistribution into OSPF
- Redistribution with Distribute Lists
- Redistribution with Route Map
- Policy Based Routing-PBR
|
Border Gateway Protocol – BGP |
- Internal BGP
- External BGP
- Neighbors
- Verifying BGP Tables
- Route Filtering
|
IPv6 |
- IPv6 Addressing
- IPv6 Routing
- Configuring IPv6 Address
- Tunnels
|
|
|
Broadband Technologies
Virtual Private Network (VPN)
|
CONCENTRATION–(300-410)
|
Building Campus Network |
- Layer 2 Switch
- Layer 3 Switch
- Tables used in Switching
- Switch part Configuration
- VLANs & VLAN Trunks
- VTP
- STP & PVST +
- Adv. STP ( RSTP & MST)
- Inter VLAN Routing
- Multi-Layer Switching (MLS)
|
Designing Campus Networks |
- Hierarchical Network Design
- Modular Network Design
- Router Redundancy in Multilayer Switching
- HSRP
- VRRP
- GLBP
|
Campus Network Services |
- IP Telephony
- Wireless LANs
|
Securing Switched Networks |
- Port Security
- Port –based Authentication
- Mitigating Spoofing Attacks
- Best practices for Securing Switches
|
Enquiry Now |
|
|