CCNP is the next level of certification after CCNA. CCNP certification validates a network professional's capability to install, troubleshoot and configure converged local and wide area networks with 100 to 500 or more nodes. Networking Professionals who are achieved the CCNP demonstrated knowledge and skills required to control the routers and switches that form the network core, as well as edge applications that integrate voice, security and wireless into the network.

Audience:

Those who want to make a career in the field of WAN administration and want to manage and implement a large network consisting of Cisco routers and switches.

Prerequisites:

Must be a CCNA.

Duration of the course: Part Time : 45 Session (2 hrs/day)
Full Time : 15 Session (8 hrs/day)

Key Benefits:

On Completion of this course, the candidate will have knowledge and skills necessary to : Manage Advanced router and switch configuration, configure security in VLAN and WAN, Manage CISCO in a big enterprise.

Course Contents:

ROUTE Implementing Cisco IP Routing (300-101):

Network Principles :

  • Identify Cisco Express Forwarding concepts
  • Explain general network challenges
  • Describe IP operations
  • Explain TCP operations
  • Describe UDP operations
  • Recognize proposed changes to the network

Layer 2 Technologies :

  • Configure and verify PPP using Authentication (PAP, CHAP)
  • Configure and verify PPPoE (client side only)
  • Explain Frame Relay Operations, Point-to-point & Multipoint

Layer 3 Technologies :

  • Identify, configure, and verify IPv4 addressing and subnetting
  • Identify IPv6 addressing and subnetting
  • Configure and verify DHCP relay and server
  • Configure and verify static routing
  • Configure and verify default routing
  • Evaluate routing protocol types
  • Describe administrative distance
  • Troubleshoot passive interfaces
  • Configure and verify VRF lite
  • Configure and verify filtering with any protocol
  • Configure and verify redistribution between any routing protocols or routing sources
  • Configure and verify manual and autosummarization with any routing protocol
  • Configure and verify policy-based routing
  • Identify suboptimal routing
  • Explain ROUTE maps
  • Configure and verify loop prevention mechanisms
  • Configure and verify RIPv2
  • Describe RIPng
  • Describe EIGRP packet types
  • Configure and verify EIGRP neighbor relationship and authentication
  • Configure and verify EIGRP stubs
  • Configure and verify EIGRP load balancing
  • Describe and optimize EIGRP metrics
  • Configure and verify EIGRP for IPv6
  • Describe OSPF packet types
  • Configure and verify OSPF neighbor relationship and authentication
  • Configure and verify network types, area types, and router types
  • Configure and verify OSPF LSA types, area type: backbone, normal, transit, stub, NSSA, totally stub
  • Configure and verify OSPF Virtual link
  • Configure and verify OSPF path preference
  • Configure and verify OSPF operations
  • Configure and verify OSPF for IPv6
  • Describe, configure, and verify BGP peer relationships and authentication
  • Configure and verify eBGP (IPv4 and IPv6 address families)
  • Explain BGP attributes and best-path selection

VPN Technologies:

  • Configure and verify GRE
  • Describe DMVPN (single hub)
  • Describe Easy Virtual Networking (EVN)

Infrastructure Security

  • Describe IOS AAA using local database
  • Describe device security using IOS AAA with TACACS+ and RADIUS
  • Configure and verify device access control
  • Configure and verify router security features using IPv4 ACL�s
  • Configure and verify router security features using IPv6 traffic filter

Infrastructure Services

  • Configure and verify device management
  • Configure and verify SNMP
  • Configure and verify logging
  • Configure and verify Network Time Protocol (NTP)
  • Configure and verify IPv4 and IPv6 DHCP
  • Configure and verify IPv4 Network Address Translation (NAT) Static NAT, dynamic NAT, PAT
  • Describe IPv6 NAT
  • Describe SLA architecture
  • Configure and verify IP SLA
  • Configure and verify tracking objects
  • Configure and verify Cisco NetFlow

SWITCH Implementing Cisco Switched Networks (300-115)

Layer 2 Technologies

  • Configure and verify switch administration using DM templatest
  • Configure and verify Layer 2 protocols using CDP, LLDP & UDLD
  • Configure and verify Data & Voice VLAN's
  • Configure and verify Vlan trunking Protocols like VTPv1, VTPv2, VTPv3, VTP pruning
  • Configure and verify trunking Protocols like dot1Q & ISL
  • Configure and verify EtherChannels using LACP, PAgP, manually.
  • Configure and verify EtherChannelsLayer 2, Layer 3
  • Configure and verify EtherChannelsLoad balancing
  • Configure and verify EtherChannel misconfiguration guard
  • Configure and verify spanning tree
  • Configure and verify PVST+, RPVST+, MST
  • Configure and verify Switch priority, port priority, path cost, STP timers
  • Configure and verify PortFast, BPDUguard, BPDUfilter
  • Configure and verify Loopguard and Rootguard
  • Configure and verify other LAN switching technologies like SPAN, RSPAN
  • Describe chassis virtualization and aggregation technologies like Stackwise

Infrastructure Security

  • Configure and verify switch security features
  • Configure and verify DHCP snooping
  • Configure and verify IP Source Guard
  • Configure and verify Dynamic ARP inspectiong
  • Configure and verify Port security
  • Configure and verify Private VLAN
  • Configure and verify Storm control
  • Describe device security using Cisco IOS AAA with TACACS+ and RADIUS
  • Configure and verify AAA with TACACS+ and RADIUS
  • Configure and verify Local privilege authorization fallback

Infrastructure Services

  • Configure and verify first-hop redundancy protocols like HSRP, VRRP & GLBP

TSHOOT Troubleshooting and Maintaining Cisco IP Networks (300-135)

Network Principles

  • Use Cisco IOS troubleshooting tools
  • Debug, conditional debug
  • Ping and trace route with extended options
  • Apply troubleshooting methodologies
  • Diagnose the root cause of networking issues (analyze symptoms, identify and describe root cause)
  • Design and implement valid solutions
  • Verify and monitor resolution

Layer 2 Technologies

  • Troubleshoot switch administration using SDM templates
  • Troubleshoot Layer 2 protocols like CDP, LLDP & UDLD Troubleshoot VLANs
  • Troubleshoot VLAN trunking protocols like VTPv1, VTPv2, VTPv3, VTP pruning
  • Troubleshoot EtherChannels using LACP, PAgP, manual
  • Troubleshooting Layer 2, Layer 3 Etherchannel
  • Load balancing
  • EtherChannel misconfiguration guard
  • Troubleshoot spanning tree PVST+, RPVST +, MST
  • Troubleshoot other LAN switching technologies like SPAN & RSPAN.
  • Troubleshoot chassis virtualization and aggregation technologies using stackwise

Layer 3 Technologies

  • Troubleshoot IPv4 addressing and subnetting
  • Address types (Unicast, broadcast, multicast, and VLSM)
  • Troubleshoot IPv6 addressing and subnetting
  • Troubleshoot DHCP relay and server
  • Troubleshoot DHCP protocol operations
  • Troubleshoot static routing
  • Troubleshoot default routing
  • Troubleshoot administrative distance
  • Troubleshoot passive interfaces
  • Troubleshoot VRF lite
  • Troubleshoot filtering with any protocol
  • Troubleshoot between any routing protocols or routing sources
  • Troubleshoot manual and auto summarization with any routing protocol
  • Troubleshoot policy-based routing
  • Troubleshoot suboptimal routing
  • Troubleshoot loop prevention mechanisms
  • Troubleshoot RIPv2 & RIPng
  • Troubleshoot EIGRP neighbor relationship and authentication
  • Troubleshoot loop free path selection RD, FD, FC, successor, feasible successor.
  • Troubleshoot EIGPR operations Stuck in active
  • Troubleshoot switch administration using SDM templates
  • Troubleshoot EIGRP stubs
  • Troubleshoot EIGRP load balancing using equal & unequal cost.
  • Troubleshoot EIGRP metrics
  • Troubleshoot EIGRP for IPv6
  • Troubleshoot OSPF neighbor relationship and authentication
  • Troubleshoot network types, area types, and router types
  • Troubleshoot OSPF path preference
  • Troubleshoot OSPF operations.
  • Troubleshoot OSPF for IPv6
  • Troubleshoot BGP peer relationships and authentication
  • Troubleshoot eBGP

VPN Technologies

  • Troubleshoot GRE point to point Tunnels
  • Infrastructure Security
  • Troubleshoot IOS AAA using local database
  • Troubleshoot device access control
  • Troubleshoot router security features using ACL�s

Infrastructure Services

  • Troubleshoot device management
  • Troubleshoot SNMP
  • Troubleshoot logging
  • Troubleshoot Network Time Protocol(NTP)
  • Troubleshoot IPv4 and IPv6 DHCP
  • Troubleshoot IPv4 Network Address Translation (NAT)
  • Troubleshoot SLA architecture
  • Troubleshoot tracking objects/li>

Designing for Cisco Internetwork Solutions

Describe the Methodology Used to Design a Network

  • Describe developing business trends
  • Identify network requirements to support the organization
  • Describe the tools and process to characterize an existing network
  • Describe the top-down approach to network design
  • Describe network management protocols and features

Describe Network Structure and Modularity

  • Describe the network hierarchy
  • Describe the modular approach in network design
  • Describe network architecture for the enterprise

Design Basic Enterprise Campus Networks

  • Describe campus design considerations
  • Design the enterprise campus network
  • Design the enterprise data center
  • Describe enterprise network virtualization tools
  • Describe the enterprise edge, branch, and teleworker design characteristics
  • Describe physical and logical WAN connectivity
  • Design branch office WAN solutions
  • Describe access network solutions for a remote worker
  • Design the WAN to support selected redundancy methodologies
  • Identify design considerations for a remote data center

Design IP Addressing and Routing Protocols

  • Describe IPv4 addressing
  • Describe IPv6 addressing Identify routing protocol considerations in an enterprise network

Design Network Services

  • Describe the security lifecycle
  • Identify Cisco technologies to mitigate security vulnerabilities
  • Select appropriate Cisco security solutions and deployment placement
  • Describe high-level voice and video architectures
  • Identify the design considerations for voice and video services
  • Describe Cisco Unified Wireless Network architectures and features
  • Design a wireless network using controllers