CCNA R&S


Cisco certification make sure high standards of technical expertise. You can develop a complete understanding of Wide Area Networking and how various network topologies work together to form a network. This is helpful to every networking job and is the reason Cisco certification is in such high demand, even at companies with less Cisco devices. Achieving Cisco certification-at any level-means joining the ranks of skilled network specialist who have earned recognition and respect in the industry. The CCNA certification is the first in the new line of Cisco certifications and is a precursor to all current Cisco certifications.

Those who are taking their first steps into WAN Admin and want to learn how to administer Cisco Switches and Routers.

Prerequisites:

  • Basic knowledge of understanding of IPv4 and IPv6 based networks.
  • Basic of network subnetting and IP routing.

Duration of the course : Part Time : 30 Sessions (2 hrs/day), Full Time : 7 Sessions (8 hrs/day).

Key Benifits:

By the end of the CCNA course/CCNA Training, students will be able to Plan IP Addressing, Install and configure Cisco Router in an Internetwork, secure Network by access-list and Manage Virtual LAN & WAN etc.

Course Outline:

Network Fundamentals

  • Compare and contrast OSI and TCP/IP models.
  • Compare and contrast TCP and UDP protocols.
  • Describe the impact of infrastructure components in an enterprise network.
  • Describe the effects of cloud resources on enterprise network architecture.
  • Compare and contrast collapsed core and three-tier architectures.
  • Compare and contrast network topologies.
  • Select the appropriate cabling type based on implementation requirements.
  • Apply troubleshooting methodologies to resolve problems.
  • Configure, verify, and troubleshoot IPv4 addressing and subnetting.
  • Compare and contrast IPv4 address types.
  • Describe the need for private IPv4 addressing.
  • Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment.
  • Configure, verify, and troubleshoot IPv6 addressing.
  • Configure and verify IPv6 Stateless Address Auto Configuration
  • Compare and contrast IPv6 address types

LAN Switching Technologies::

  • Describe and verify switching concepts.
  • Interpret Ethernet frame format.
  • Troubleshoot interface and cable issues (collisions, errors, duplex, speed).
  • Configure, verify, and troubleshoot VLANs (normal/extended range) spanning multiple switches.
  • Configure, verify, and troubleshoot inters witch connectivity.
  • Configure, verify, and troubleshoot STP protocols.
  • Configure, verify and troubleshoot STP related optional features.
  • Configure and verify Layer 2 protocols.
  • Configure, verify, and troubleshoot (Layer 2/Layer 3) EtherChannel.
  • Describe the benefits of switch stacking and chassis aggregation

Routing Technologies:

  • Describe the routing concepts.
  • Interpret the components of a routing table.
  • Describe how a routing table is populated by different routing information sources.
  • Configure, verify, and troubleshoot inter-VLAN routing.
  • Compare and contrast static routing and dynamic routing.
  • Compare and contrast distance vector and link state routing protocols
  • Compare and contrast interior and exterior routing protocols
  • Configure, verify, and troubleshoot IPv4 and IPv6 static routing
  • Configure, verify, and troubleshoot single area and multi-area OSPFv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)
  • Configure, verify, and troubleshoot single area and multi-area OSPFv3 for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)
  • Configure, verify, and troubleshoot EIGRP for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub)
  • Configure, verify, and troubleshoot EIGRP for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub)
  • Configure, verify, and troubleshoot RIPv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution)
  • Troubleshoot basic Layer 3 end-to-end connectivity issues

WAN Technologies:

  • Configure and verify PPP and MLPPP on WAN interfaces using local authentication.
  • Configure, verify, and troubleshoot PPPoE client-side interfaces using local authentication.
  • Configure, verify, and troubleshoot GRE tunnel connectivity.
  • Describe WAN topology options.
  • Describe WAN access connectivity options.
  • Configure and verify single-homed branch connectivity using eBGP IPv4 (limited to peering and route advertisement using Network command only).
  • Describe basic QoS concepts.

Infrastructure Services:

  • Describe DNS lookup operation.
  • Troubleshoot client connectivity issues involving DNS.
  • Configure and verify DHCP on a router (excluding static reservations).
  • Troubleshoot client- and router-based DHCP connectivity issues.
  • Configure, verify, and troubleshoot basic HSRP.
  • Configure, verify, and troubleshoot inside source NAT.
  • Configure and verify NTP operating in a client/server mode.

Infrastructure Security:

  • Configure, verify, and troubleshoot port security.
  • Describe common access layer threat mitigation techniques.
  • Configure, verify, and troubleshoot IPv4 and IPv6 access list for traffic filtering.
  • Verify ACLs using the APIC-EM Path Trace ACL analysis tool.
  • Configure, verify, and troubleshoot basic device hardening
  • Describe device security using AAA with TACACS+ and RADIUS

Infrastructure Management:

  • Configure and verify device-monitoring protocols.
  • Troubleshoot network connectivity issues using ICMP echo-based IP SLA.
  • Configure and verify device management.
  • Configure and verify initial device configuration.
  • Perform device maintenance.
  • Use Cisco IOS tools to troubleshoot and resolve problems.
  • Describe network programmability in enterprise network architecture.

CCNA SECURITY


The CCNA Security certification put the foundation for job roles such as Network Security Specialist, Network Security Support Engineer and Security Administrator in Bangalore or in all over India. It is the first step for individuals wishing to acquire their CCSP certification. CCNA Security certifications are genuine for 3 years. The 210-260 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.

Prerequisites:

Valid CCNA or any CCIE Certification can act as a pre-requisite.
Duration of the course : Part Time : 29 Session ( 2Hrs/Day), Full Time : 14 Session (4Hrs/Day)

Course Outline:

Security Concepts

  • Common security principles.
  • Common security threats.
  • Cryptography concepts.
  • Describe network topologies
  • e Network security for a virtual environment

Secure Access:

  • Secure management.
  • AAA concepts.
  • 802.1X authentication.
  • BYOD.

VPN:

  • VPN concepts.
  • Remote access VPN.
  • Site-to-site VPN.
  • Verify an IPsec site-to-site VPN.

Secure Routing and Switching:

  • Security on Cisco routers.
  • Securing routing protocols.
  • Securing the control plane.
  • Common Layer 2 attacks.
  • Mitigation procedures.
  • VLAN security
  • Describe the security implications of a PVLAN

Cisco Firewall Technologies:

  • Describe operational strengths and weaknesses of the different firewall Technologies.
  • Compare stateful vs. stateless firewalls.
  • Implement NAT on Cisco ASA 9.x.
  • Implement zone-based firewall.
  • Firewall features on the Cisco Adaptive Security Appliance (ASA) 9.x.

IPS:

  • Describe IPS deployment considerations.
  • Describe IPS Technologies.

Content and Endpoint Security:

  • Describe mitigation technology for email-based threats.
  • Describe mitigation technology for web-based threats.
  • Describe mitigation technology for endpoint threats

CCNP R&S


CCNP is the next level of certification after CCNA. CCNP certification validates a network professional's capability to install, troubleshoot and configure converged local and wide area networks with 100 to 500 or more nodes. Networking Professionals who are achieved the CCNP demonstrated knowledge and skills required to control the routers and switches that form the network core, as well as edge applications that integrate voice, security and wireless into the network.

Those who want to make a career in the field of WAN administration and want to manage and implement a large network consisting of Cisco routers and switches.

Prerequisites:

Must be a CCNA.
Duration of the course :Part Time : 45 Session (2 hrs/day), Full Time : 15 Session (8 hrs/day)

Key Benifits:

On Completion of this course, the candidate will have knowledge and skills necessary to : Manage Advanced router and switch configuration, configure security in VLAN and WAN, Manage CISCO in a big enterprise.

Course Outline:

ROUTE Implementing Cisco IP Routing (300-101):
Network Principles :

  • Identify Cisco Express Forwarding concepts
  • Explain general network challenges
  • Describe IP operations
  • Explain TCP operations
  • Describe UDP operations
  • Recognize proposed changes to the network

Layer 2 Technologies :

  • Configure and verify PPP using Authentication (PAP, CHAP)
  • Configure and verify PPPoE (client side only)
  • Explain Frame Relay Operations, Point-to-point & Multipoint

Layer 3 Technologies :

  • Identify, configure, and verify IPv4 addressing and subnetting
  • Identify IPv6 addressing and subnetting
  • Configure and verify DHCP relay and server
  • Configure and verify static routing
  • Configure and verify default routing
  • Evaluate routing protocol types
  • Describe administrative distance
  • Troubleshoot passive interfaces
  • Configure and verify VRF lite
  • Configure and verify filtering with any protocol
  • Configure and verify redistribution between any routing protocols or routing sources
  • Configure and verify manual and autosummarization with any routing protocol
  • Configure and verify policy-based routing
  • Identify suboptimal routing
  • Explain ROUTE maps
  • Configure and verify loop prevention mechanisms
  • Configure and verify RIPv2
  • Describe RIPng
  • Describe EIGRP packet types
  • Configure and verify EIGRP neighbor relationship and authentication
  • Configure and verify EIGRP stubs
  • Configure and verify EIGRP load balancing
  • Describe and optimize EIGRP metrics
  • Configure and verify EIGRP for IPv6
  • Describe OSPF packet types
  • Configure and verify OSPF neighbor relationship and authentication
  • Configure and verify network types, area types, and router types
  • Configure and verify OSPF LSA types, area type: backbone, normal, transit, stub, NSSA, totally stub
  • Configure and verify OSPF Virtual link
  • Configure and verify OSPF path preference
  • Configure and verify OSPF operations
  • Configure and verify OSPF for IPv6
  • Describe, configure, and verify BGP peer relationships and authentication
  • Configure and verify eBGP (IPv4 and IPv6 address families)
  • Explain BGP attributes and best-path selection

VPN Technologies:

  • Configure and verify GRE
  • Describe DMVPN (single hub)
  • Describe Easy Virtual Networking (EVN)

Infrastructure Security

  • Describe IOS AAA using local database
  • Describe device security using IOS AAA with TACACS+ and RADIUS
  • Configure and verify device access control
  • Configure and verify router security features using IPv4 ACL’s
  • Configure and verify router security features using IPv6 traffic filter

Infrastructure Services

  • Configure and verify device management
  • Configure and verify SNMP
  • Configure and verify logging
  • Configure and verify Network Time Protocol (NTP)
  • Configure and verify IPv4 and IPv6 DHCP
  • Configure and verify IPv4 Network Address Translation (NAT) Static NAT, dynamic NAT, PAT
  • Describe IPv6 NAT
  • Describe SLA architecture
  • Configure and verify IP SLA
  • Configure and verify tracking objects
  • Configure and verify Cisco NetFlow

SWITCH Implementing Cisco Switched Networks (300-115)
Layer 2 Technologies

  • Configure and verify switch administration using DM templatest
  • Configure and verify Layer 2 protocols using CDP, LLDP & UDLD
  • Configure and verify Data & Voice VLAN's
  • Configure and verify Vlan trunking Protocols like VTPv1, VTPv2, VTPv3, VTP pruning
  • Configure and verify trunking Protocols like dot1Q & ISL
  • Configure and verify EtherChannels using LACP, PAgP, manually.
  • Configure and verify EtherChannelsLayer 2, Layer 3
  • Configure and verify EtherChannelsLoad balancing
  • Configure and verify EtherChannel misconfiguration guard
  • Configure and verify spanning tree
  • Configure and verify PVST+, RPVST+, MST
  • Configure and verify Switch priority, port priority, path cost, STP timers
  • Configure and verify PortFast, BPDUguard, BPDUfilter
  • Configure and verify Loopguard and Rootguard
  • Configure and verify other LAN switching Technologies like SPAN, RSPAN
  • Describe chassis virtualization and aggregation Technologies like Stackwise

Infrastructure Security

  • Configure and verify switch security features
  • Configure and verify DHCP snooping
  • Configure and verify IP Source Guard
  • Configure and verify Dynamic ARP inspectiong
  • Configure and verify Port security
  • Configure and verify Private VLAN
  • Configure and verify Storm control
  • Describe device security using Cisco IOS AAA with TACACS+ and RADIUS
  • Configure and verify AAA with TACACS+ and RADIUS
  • Configure and verify Local privilege authorization fallback

Infrastructure Services

  • Configure and verify first-hop redundancy protocols like HSRP, VRRP & GLBP

TSHOOT Troubleshooting and Maintaining Cisco IP Networks (300-135)
Network Principles

  • Use Cisco IOS troubleshooting tools
  • Debug, conditional debug
  • Ping and trace route with extended options
  • Apply troubleshooting methodologies
  • Diagnose the root cause of networking issues (analyze symptoms, identify and describe root cause)
  • Design and implement valid solutions
  • Verify and monitor resolution

Layer 2 Technologies

  • Troubleshoot switch administration using SDM templates
  • Troubleshoot Layer 2 protocols like CDP, LLDP & UDLD Troubleshoot VLANs
  • Troubleshoot VLAN trunking protocols like VTPv1, VTPv2, VTPv3, VTP pruning
  • Troubleshoot EtherChannels using LACP, PAgP, manual
  • Troubleshooting Layer 2, Layer 3 Etherchannel
  • Load balancing
  • EtherChannel misconfiguration guard
  • Troubleshoot spanning tree PVST+, RPVST +, MST
  • Troubleshoot other LAN switching Technologies like SPAN & RSPAN.
  • Troubleshoot chassis virtualization and aggregation Technologies using stackwise

Layer 3 Technologies

  • Troubleshoot IPv4 addressing and subnetting
  • Address types (Unicast, broadcast, multicast, and VLSM)
  • Troubleshoot IPv6 addressing and subnetting
  • Troubleshoot DHCP relay and server
  • Troubleshoot DHCP protocol operations
  • Troubleshoot static routing
  • Troubleshoot default routing
  • Troubleshoot administrative distance
  • Troubleshoot passive interfaces
  • Troubleshoot VRF lite
  • Troubleshoot filtering with any protocol
  • Troubleshoot between any routing protocols or routing sources
  • Troubleshoot manual and auto summarization with any routing protocol
  • Troubleshoot policy-based routing
  • Troubleshoot suboptimal routing
  • Troubleshoot loop prevention mechanisms
  • Troubleshoot RIPv2 & RIPng
  • Troubleshoot EIGRP neighbor relationship and authentication
  • Troubleshoot loop free path selection RD, FD, FC, successor, feasible successor.
  • Troubleshoot EIGPR operations Stuck in active
  • Troubleshoot switch administration using SDM templates
  • Troubleshoot EIGRP stubs
  • Troubleshoot EIGRP load balancing using equal & unequal cost.
  • Troubleshoot EIGRP metrics
  • Troubleshoot EIGRP for IPv6
  • Troubleshoot OSPF neighbor relationship and authentication
  • Troubleshoot network types, area types, and router types
  • Troubleshoot OSPF path preference
  • Troubleshoot OSPF operations.
  • Troubleshoot OSPF for IPv6
  • Troubleshoot BGP peer relationships and authentication
  • Troubleshoot eBGP

VPN Technologies

  • Troubleshoot GRE point to point Tunnels
  • Infrastructure Security
  • Troubleshoot IOS AAA using local database
  • Troubleshoot device access control
  • Troubleshoot router security features using ACL’s

Infrastructure Services

  • Troubleshoot device management
  • Troubleshoot SNMP
  • Troubleshoot logging
  • Troubleshoot Network Time Protocol(NTP)
  • Troubleshoot IPv4 and IPv6 DHCP
  • Troubleshoot IPv4 Network Address Translation (NAT)
  • Troubleshoot SLA architecture
  • Troubleshoot tracking objects/li>

Designing for Cisco Internetwork Solutions

Describe the Methodology Used to Design a Network

  • Describe developing business trends
  • Identify network requirements to support the organization
  • Describe the tools and process to characterize an existing network
  • Describe the top-down approach to network design
  • Describe network management protocols and features

Describe Network Structure and Modularity

  • Describe the network hierarchy
  • Describe the modular approach in network design
  • Describe network architecture for the enterprise

Design Basic Enterprise Campus Networks

  • Describe campus design considerations
  • Design the enterprise campus network
  • Design the enterprise data center
  • Describe enterprise network virtualization tools
  • Describe the enterprise edge, branch, and teleworker design characteristics
  • Describe physical and logical WAN connectivity
  • Design branch office WAN solutions
  • Describe access network solutions for a remote worker
  • Design the WAN to support selected redundancy methodologies
  • Identify design considerations for a remote data center

Design IP Addressing and Routing Protocols

  • Describe IPv4 addressing
  • Describe IPv6 addressing Identify routing protocol considerations in an enterprise network

Design Network Services

  • Describe the security lifecycle
  • Identify Cisco Technologies to mitigate security vulnerabilities
  • Select appropriate Cisco security solutions and deployment placement
  • Describe high-level voice and video architectures
  • Identify the design considerations for voice and video services
  • Describe Cisco Unified Wireless Network architectures and features
  • Design a wireless network using controllers

CCNP SECURITY


CCNP Security certification program in Bangalore is aligned particularly to the job role of the Cisco Network Security Engineer responsible for Security in Networking devices, appliances, Routers and Switches, as well as choosing, supporting, deploying and troubleshooting Firewalls, IDS/IPS, and VPNs solutions for their networking environments.

The CCNP Security certification is the most efficient way to assure Network Security Engineers have the practical skills required to deploy service, support, and maintain Cisco network security solutions. CCNP Security delivers the practical skills needed to enforce cybersecurity performance, gain high quality security service levels, and meet compliance mandates.

Prerequisites:

Valid CCNA Security Certification.
Duration of the course :Part Time : 4 Months (2 hrs/day), Full Time : 2 Month ( 4 hrs/day)

Key Benifits:

This new certification program is for Cisco Network Security Engineers who are responsible for testing, deploying, configuring, and troubleshooting the core Technologies that make up a Cisco secure network. The new CCNP Security curriculum assesses an engineer's competency in using network-critical Technologies and products, such as Cisco IOS security features in Cisco routers and switches, firewalls, VPNs, and intrusion prevention and detection systems.

Course Outline:

Implementing Cisco Secure Access Solutions (300-208):

  • Identity Management/Secure Access.
  • Implement device administration.
  • Compare and select AAA options like TACACS+,RADIUS.
  • Describe Native AD and LDAP.
  • Describe identity management.
  • Describe features and functionality of authentication and authorization.
  • Describe identity store options (i.e., LDAP, AD, PKI, OTP, Smart Card, local).
  • Implement accounting.
  • Implement wired/wireless 802.1x.
  • Describe RADIUS flows.
  • AV pairs.
  • EAP types.
  • Describe supplicant, authenticator, server.
  • Supplicant options.
  • 802.1X phasing (monitor mode, low impact, closed mode).
  • AAA server.
  • Network access devices.
  • Implement MAB.
  • Implement network authorization enforcement.
  • dACL.
  • Dynamic VLAN assignment.
  • Describe SGA.
  • Named ACL.
  • CoA.
  • Implement central web authorization.
  • Implement profiling.
  • Implement guest services.
  • Implement posturing.
  • Implement BYOD access.
  • Describe elements of a BYOD policy.
  • Device registration.
  • My devices portal.
  • Describe supplicant provisioning.
  • Threat Defense.
  • Implement firewall.
  • Describe SGA ACLs.
  • Troubleshooting, Monitoring and Reporting Tools.
  • Troubleshoot identity management solutions.
  • Threat Defense Architectures.
  • Design highly secure wireless solution.
  • Identity Management Architectures.
  • Design AAA security solution.
  • Design profiling security solution.
  • Design posturing security solution.
  • Design BYOD security solution.
  • Design device administration security solution.
  • 5Design guest services security solution.

Implementing Cisco Edge Network Security Solutions (300-206):

  • Implement ACLs.
  • Implement static/dynamic NAT/PAT.
  • Implement object groups.
  • Describe threat detection features.
  • Implement botnet traffic filtering.
  • Configure DHCP snooping.
  • Describe dynamic ARP inspection.
  • Describe storm control.
  • Configure port security.
  • Describe common Layer 2 threats and attacks and mitigation.
  • Describe MACSec.
  • Configure device hardening per best practices.
  • Configure application filtering and protocol inspection.
  • Describe virtualized firewalls.
  • Implement SSHv2, SSL, SNMPv3 access on the network devices.
  • Implement RBAC on the ASA/IOS CLI and on ASDM.
  • Describe Cisco Prime Infrastructure.
  • Describe CSM.
  • Implement device managers.
  • Implement NetFlow exporter.
  • Implement SNMPv3.
  • Implement logging.
  • Implement NTP with authentication.
  • Describe CDP, DNS, SCP, SFTP, and DHCP.
  • Monitor firewall using analysis of packet tracer, packet capture, and syslog.
  • Design a firewall solution.
  • Design Layer 2 security solution.
  • Describe security operations management architecture.
  • Describe Data Center security components and considerations.
  • Describe Collaboration security components and considerations.
  • Describe common IPv6 security considerations.

Implementing Cisco Secure Mobility Solutions (300-209):

  • Implement site-to-site VPNs on routers and firewalls.
  • Describe GETVPN.
  • Implement IPsec (with IKEv1 and IKEv2).
  • Implement DMVPN (Hub-Spoke and spoke-spoke).
  • Implement remote access VPNs on routers and firewalls.
  • Implement AnyConnect IKEv2 VPNs.
  • Implement SSLVPN: client and clientless.
  • Implement site-to-site VPNs on routers and firewall.
  • Implement FlexVPN.
  • Implement remote access VPNs on routers and firewalls.
  • Implement SSLVPN: client and clientless.
  • Implement FLEX VPN.
  • Analyze syslog and VPN debug logs using ASDM.
  • Design site-to-site VPN solution.
  • Design remote access VPN solution.
  • Describe encryption, hashing, NGE.

Implementing Cisco Threat Control Solutions (300-207):

  • Content Security.
  • 1.2 Implement Cisco Cloud Web Security.
  • Implement Cisco WSA .
  • Implement Cisco ESA.
  • Describe features and functionality.
  • Implement email encryption.
  • Implement anti-spam policies.
  • Implement virus outbreak filter.
  • Implement DLP policies.
  • Implement anti-malware.
  • Implement inbound and outbound mail policies and authentication.
  • Describe traffic redirection and capture methods.
  • Implement network IPS.
  • Describe traffic redirection and capture methods.
  • Configure network IPS.
  • Describe signatures.
  • Implement event actions.
  • Configure event action overrides.
  • Implement risk ratings.
  • Describe router-based IPS.
  • Configure device hardening per best practices.
  • Content Security appliances.
  • Implement Network IPS.
  • Describe signatures.
  • Configure blocking.
  • Implement anomaly detection.
  • Devices GUIs and Secured CLI.
  • Implement Content Security.
  • Troubleshooting, Monitoring and Reporting Tools.
  • Configure IME and IP logging for IPS.
  • Monitor Content Security.
  • Monitor Cisco Security IntelliShield.
  • Threat Defence Architectures.
  • Design IPS solution.
  • Content Security Architectures.
  • Design Web security solution.
  • Design Email security solution.
  • Design Application security solution.