CCNP Training Course

CCNP Enterprise online training course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks.

  • 35000
  • 40000
  • Course Includes
  • Live Class Practical Oriented Training
  • 90 + Hrs Instructor LED Training
  • 50 + Hrs Practical Exercise
  • 20 + Hrs Project Work & Assignment
  • Timely Doubt Resolution
  • Dedicated Student Success Mentor
  • Certification & Job Assistance
  • Free Access to Workshop & Webinar
  • No Cost EMI Option


Have Query ?

What you will learn

  • Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers
  • Implementation of redundant switched networks using Spanning Tree Protocol
  • Describe the features, metrics, & path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP)
  • Implementation & optimization of Open Shortest Path First (OSPF)v2 & OSPFv3, including adjacencies, packet types, & area...
  • Implementing External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed netw...
  • Implementing network redundancy using protocols including Hot Standby Routing Protocol (HSRP) and Virtual Router Redunda...
  • Implementing overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN...
  • Describe the components and concepts of wireless networking including Radio Frequency (RF) and antenna characteristics,...

Requirements

  • There are no formal prerequisites for CCNP Enterprise, but you should have a good understanding of the exam topics before taking the exam. CCNP candidates often also have three to five years of experience implementing enterprise networking solutions.

Description

|| About CCNP Enterprise Training Course

CCNP Enterprise Online Training is desige to clear CCNP Enterprise Certifcaion Exam.  Achieving CCNP Enterprise certification proves your skills with enterprise networking solutions. To earn CCNP Enterprise certification, you pass two exams: one that covers core enterprise technologies and one enterprise concentration exam of your choice, so you can customize your certification to your technical area of focus. Cisco certified professionals are in high demand as many enterprises worldwide use their systems and architecture within their IT environment. Some of the most popular Cisco certifications such as CCNA, CCIE, and CCNP are in great demand by both professionals and employers.

 

To earn CCNP Enterprise, you pass two exams: a core exam and an enterprise concentration exam of your choice. And every exam in the CCNP Enterprise program earns an individual Specialist certification, so you get recognized for your accomplishments along the way. The core exam training focuses on your knowledge of enterprise infrastructure including dual-stack (IPv4 and IPv6) architecture, virtualization, infrastructure, network assurance, security, and automation.Implementing Cisco Enterprise Network Core Technologies (350-401 ENCOR) course is designed to prepare for the exam (ENCOR 350-401) which is associated with the CCNP and CCIE Enterprise Certifications. In this training class, you will gain the knowledge of implementing core enterprise network technologies including dual stack (IPv4 and IPv6) architecture, virtualization, infrastructure, network assurance, security and automation. Concentration exams focus on emerging and industry-specific topics such as network design, SD-WAN, wireless, and automation. You can prepare for concentration exams by taking corresponding Cisco training courses. 

Core exam:

350-401 ENCOR Implementing and Operating Cisco Enterprise Network

Core Technologies (ENCOR)

Concentration exams (choose one):

300-410 ENARSI    Implementing Cisco Enterprise Advanced Routing and Services (ENARSI)

300-415 ENSDWI Implementing Cisco SD-WAN Solutions (SDWAN300)

300-420 ENSLD     Designing Cisco Enterprise Networks (ENSLD)

300-425 ENWLSD   Designing Cisco Enterprise Wireless Networks (ENWLSD)

300-430 ENWLSI    Implementing Cisco Enterprise Wireless Networks (ENWLSI)

300-435 ENAUTO   Implementing Automation for Cisco Enterprise Solutions (ENAUI)

Course Content

Part-1 Architecture

·       Lecture-1 Explain the different design principles used in an enterprise network

·       Enterprise network design such as Tier 2, Tier 3, and Fabric Capacity planning

·       High availability techniques such as redundancy, FHRP, and SSO

·       Analyze design principles of a WLAN deployment

·       Lecture-2 Analyze design principles of a WLAN deployment

·       Wireless deployment models (centralized, distributed, controller-less, controller based, cloud, remote branch)

·       Location services in a WLAN design

·       Differentiate between on-premises and cloud infrastructure deployments

·       Lecture-3 Explain the working principles of the Cisco SD-WAN solution

·       SD-WAN control and data planes elements

·       Traditional WAN and SD-WAN solutions

·       Lecture-4 Explain the working principles of the Cisco SD-Access solution

·       SD-Access control and data planes elements

·       Traditional campus interoperating with SD-Access

·       Lecture-5 Describe concepts of wired and wireless QoS

·       QoS components

·       QoS policy

·       Lecture-6 Differentiate hardware and software switching mechanisms

·       Process and CEF

·       MAC address table and TCAM

·       FIB vs. RIB

Part-2 Virtualization

·       Lecture-7 Describe device virtualization technologies

·       Hypervisor type 1 and 2

·       Virtual machine

·       Virtual switching

·       Lecture-8 Configure and verify data path virtualization technologies

·       VRF

·       GRE and IPsec tunneling

·       Lecture-9 Describe network virtualization concepts

·       LISP

·       VXLAN

Part-3 Infrastructure

·       Lecture-10 Layer 2

·       Troubleshoot static and dynamic 802.1q trunking protocols

·       Troubleshoot static and dynamic EtherChannels

·       Configure and verify common Spanning Tree Protocols (RSTP and MST)

·       Lecture-11 Layer 3

·       Compare routing concepts of EIGRP and OSPF (advanced distance vector vs. linked state, load balancing, path selection, path operations, metrics)

·       Configure and verify simple OSPF environments, including multiple normal areas, summarization, and filtering (neighbor adjacency, point-to-point and broadcast network types, and passive interface)

·       Configure and verify eBGP between directly connected neighbors (best path selection algorithm and neighbor relationships)

·       Lecture-12 Wireless

·       Describe Layer 1 concepts, such as RF power, RSSI, SNR, interference noise,band and channels, and wireless client devices capabilities

·       Describe AP modes and antenna types

·       Describe access point discovery and join process (discovery algorithms, WLC selection process)

·       Describe the main principles and use cases for Layer 2 and Layer 3 roaming

·       Troubleshoot WLAN configuration and wireless client connectivity issues

·       Lecture-13 IPsa Services

·       Describe Network Time Protocol (NTP)

·       Configure and verify NAT/PAT

·       Configure first hop redundancy protocols, such as HSRP and VRRP

·       Describe multicast protocols, such as PIM and IGMP v2/v3

Part-4 Network Insurance

·       Lecture-14 Diagnose network problems using tools such as debugs, conditional debugs, trace route,ping, SNMP, and syslog

·       Lecture-15 Configure and verify device monitoring using syslog for remote logging

·       Lecture-16 Configure and verify NetFlow and Flexible NetFlow

·       Lecture-17 Configure and verify SPAN/RSPAN/ERSPAN

·       Lecture-18 Configure and verify IPSLA

·       Lecture-19 Describe Cisco DNA Center workflows to apply network configuration, monitoring, and management

·       Lecture-20 Configure and verify NETCONF and RESTCONF

Part-5 Security

·       Lecture-21 Configure and verify device access control

·       Lines and password protection

·       Authentication and authorization using AAA

·       Lecture-22 Configure and verify infrastructure security features

·       ACLs

·       CoPP

·       Describe REST API security

·       Lecture-23 Configure and verify wireless security features

·       EAP

·       WebAuth

·       PSK

·       Lecture-24 Describe the components of network security design

·       Threat defense

·       Endpoint security

·       Next-generation firewall

·       TrustSec, MACsec

·       Network access control with 802.1X, MAB, and WebAuth

Part-6 Automation

·       Lecture-25 Construct valid JSON encoded file

·       Lecture-26 Describe the high-level principles and benefits of a data modeling language, such as YANG

·       Lecture-27 Describe APIs for Cisco DNA Center and vManage

·       Lecture-28 Interpret REST API response codes and results in payload using Cisco DNA Center and RESTCONF

·       Lecture-29 Construct EEM applet to automate configuration, troubleshooting, or data collection

·       Lecture-30 Compare agent vs. agentless orchestration tools, such as Chef, Puppet, Ansible, and SaltStack

Any one Specialisation

·      Implementing Cisco Enterprise Advanced Routing and Services v1.0 (300-410)           

·      Implementing Cisco SD-WAN Solutions v1.0 (300-415)

·      Designing Cisco Enterprise Networks v1.0 (300-420)     

·      Designing Cisco Enterprise Wireless Networks v1.0 (300-425)   

·      Implementing Cisco Enterprise Wireless Networks v1.0 (300-430)         

·      Automating and Programming Cisco Enterprise Solutions v1.0 (300-435)

Part-1 Layer 3 technologies

·       Lecture-1 Troubleshoot administrative distance (all routing protocols)

·       Lecture-2 Troubleshoot route map for any routing protocol (attributes, tagging, filtering)

·       Lecture-3 Troubleshoot loop prevention mechanisms (filtering, tagging, split horizon, route poisoning)

·       Lecture-4 Troubleshoot redistribution between any routing protocols or routing sources

·       Lecture-5 Troubleshoot manual and auto-summarization with any routing protocol

·       Lecture-6 Configure and verify policy-based routing

·       Lecture-7 Configure and verify VRF-Lite

·       Lecture-8 Describe Bidirectional Forwarding Detection

·       Lecture-9 Troubleshoot EIGRP (classic and named mode)

·       Address families (IPv4, IPv6)

·       Neighbor relationship and authentication

·       Loop-free path selections (RD, FD, FC, successor, feasible successor, stuck in active)

·       Stubs

·       Load balancing (equal and unequal cost)

·       Metrics

·       Lecture-10 Troubleshoot OSPF (v2/v3)

·       Address families (IPv4, IPv6)

·       Neighbor relationship and authentication

·       Network types, area types, and router types

·       Point-to-point, multipoint, broadcast, nonbroadcast

·       Area type: backbone, normal, transit, stub, NSSA, totally stub

·       Internal router, backbone router, ABR, ASBR

·       Virtual link

·       Path preference

·       Lecture-11 Troubleshoot BGP (Internal and External)

·       Address families (IPv4, IPv6)

·       Neighbor relationship and authentication (next-hop, mulithop, 4-byte AS, private AS, route refresh, synchronization, operation, peer group, states and timers)

·       Path preference (attributes and best-path)

·       Route reflector (excluding multiple route reflectors, confederations, dynamic peer)

·       Policies (inbound/outbound filtering, path manipulation)

Part-2 VPN Technologies

·       Lecture-12 Describe MPLS operations (LSR, LDP, label switching, LSP)

·       Lecture-13 Describe MPLS Layer 3 VPN

·       Lecture-14 Configure and verify DMVPN (single hub)

·       GRE/mGRE

·       NHRP

·       IPsec

·       Dynamic neighbor

·       Spoke-to-spoke

Part-3 Infrastructure Services

·       Lecture-15 Troubleshoot device management

·       Console and VTY

·       Telnet, HTTP, HTTPS, SSH, SCP

·       (T)FTP

·       Lecture-16 Troubleshoot SNMP (v2c, v3)

·       Lecture-17 Troubleshoot network problems using logging (local, syslog, debugs, conditional debugs, timestamps)

·       Lecture-18 Troubleshoot IPv4 and IPv6 DHCP (DHCP client, IOS DHCP server, DHCP relay, DHCP options)

·       Lecture-19 Troubleshoot network performance issues using IP SLA (jitter, tracking objects, delay, connectivity)

·       Lecture-201Troubleshoot NetFlow (v5, v9, flexible NetFlow)

·       Lecture-21 Troubleshoot network problems using Cisco DNA Center assurance (connectivity,monitoring, device health, network health)

Part-1 Infrastructure Services

·       Lecture-1 Describe Cisco SD-WAN Architecture and Components

·       Orchestration plane (vBond, NAT)

·       Management plane (vManage)

·       Control plane (vSmart, OMP)

·       Data plane (vEdge)

·       TLOC

·       IPsec

·       vRoute

·       BFD

·       Lecture-2 Describe WAN Edge platform types, capabilities (vEdges, cEdges)

Part-2 Controller Deployment

·       Lecture-3 Describe controller cloud deployment

·       Lecture-4 Describe Controller on-Prem Deployment

·       Hosting platform (KVM/Hypervisor)

·       Installing controllers

·       Scalability and redundancy

·       Lecture-5 Configure and verify certificates and whitelisting

·       Lecture-6 Troubleshoot control-plane connectivity between controllers

Part-3 Router Deployment

·       Lecture- 7 Describe WAN Edge deployment

·       On-boarding

·       Orchestration with zero-touch provisioning/plug-and-play

·       Single/multi data center/regional hub deployments

·       Lecture-8 Configure and verify SD-WAN data plane

·       Circuit termination/TLOC-extension

·       Underlay-overlay connectivity

·       Lecture-9 Configure and verify OMP

·       Lecture-10 Configure and verify TLOCs

·       Lecture-11 Configure and verify CLI and vManage feature configuration templates

·       VRRP

·       OSPF

·       BGP

Part-4 Policies

·       Lecture-12 Configure and verify control policies

·       Lecture-13 Configure and verify data policies

·       Configure and verify end-to-end segmentation

·       VPN segmentation

·       Topologies

·       Lecture-14 Configure and verify SD-WAN application-aware routing

·       Lecture-15 Configure and verify direct Internet access

Part-5 Security and Quality of Service

·       Lecture-16 Configure and verify service insertion

·       Lecture-17 Describe application-aware firewall

·       Lecture-18 Configure and verify QoS treatment on WAN edge routers

·       Scheduling

·       Queuing

·       Shaping

·       Policing

Part-6 Management and Operations

·       Lecture-19 Describe monitoring and reporting from vManage

·       Lecture-20 Configure and verify monitoring and reporting

·       Lecture-21 Describe REST API monitoring

·       Lecture-22 Describe software upgrade from vManage

Part-1 Advanced Addressing and Routing Solutions

·       Lecture-1 Create structured addressing plans for IPv4 and IPv6

·       Lecture-2 Create stable, secure, and scalable routing designs for IS-IS

·       Lecture-3 Create stable, secure, and scalable routing designs for EIGRP

·       Lecture-4 Create stable, secure, and scalable routing designs for OSPF

·       Lecture-5 Create stable, secure, and scalable routing designs for BGP

·       Address families

·       Basic route filtering

·       Attributes for path preference

·       Route reflectors

·       Load sharing

·       Lecture-6 Determine IPv6 migration strategies

·       Overlay (tunneling)

·       Native (dual-stacking)

·       Boundaries (IPv4/IPv6 translations)

Part-2 Advanced Enterprise Campus Networks

·       Lecture-7 Design campus networks for high availability

·       First Hop Redundancy Protocols

·       Platform abstraction techniques

·       Graceful restart

·       BFD

·       Lecture-8 Design campus Layer 2 infrastructures

·       STP scalability

·       Fast convergence

·       Loop-free technologies

·       PoE and WoL

·       Lecture-9 Design multicampus Layer 3 infrastructures

·       Convergence

·       Load sharing

·       Route summarization

·       Route filtering

·       VRFs

·       Optimal topologies

·       Redistribution

·       Lecture-10 Describe SD-Access Architecture (underlay, overlay, control and data plane, automation, wireless, and security)

·       Lecture-11 Describe SD-Access fabric design considerations for wired and wireless access (overlay, fabric design, control plan design, border design, segmentation, virtual networks, scalability, over the top and fabric for wireless, multicast)

Part-3 WAN for Enterprise Networks

·       Lecture- 12 Compare WAN connectivity options

·       Layer 2 VPN

·       MPLS Layer 3 VPN

·       Metro Ethernet

·       DWDM

·       4G/5G

·       SD-WAN customer edge

·       Lecture-13 Design site-to-site VPN

·       Dynamic Multipoint VPN (DMVPN)

·       Layer 2 VPN

·       MPLS Layer 3 VPN

·       IPsec

·       Generic Routing Encapsulation (GRE)

·       Group Encrypted Transport VPN (GET VPN)

·       Lecture-14 Design high availability for enterprise WAN

·       Single-homed

·       Multihomed

·       Backup connectivity

·       Failover

·       Lecture-15 Describe Cisco SD-WAN Architecture (orchestration plane, management plane, control plane, data plane, on-boarding and provisioning, security)

·       Lecture-16 Describe Cisco SD-WAN design considerations (control plane design, overlay design, LAN design, high availability, redundancy, scalability, security design, QoS and multicast over SD-WAN fabric)

Part-4 Network Services

·       Lecture-17 Select appropriate QoS strategies to meet customer requirements (DiffServ, IntServ)

·       Lecture-18 Design end-to-end QoS policies

·       Classification and marking

·       Shaping

·       Policing

·       Queuing

·       Lecture-19 Design network management techniques

·       In-band vs. out-of-band

·       Segmented management networks

·       Prioritizing network management traffic

·       Describe multicast routing concepts (source trees, shared trees, RPF, rendezvous points)

·       Design multicast services (SSM, PIM bidirectional, MSDP)

Part-5 Automation

·       Lecture-20 Choose the correct YANG data model set based on requirements

·       Lecture-21 Differentiate between IETF, Openconfig, and Cisco native YANG models

·       Lecture-22 Differentiate between NETCONF and RESTCONF

·       Lecture-23 Describe the impact of model-driven telemetry on the network

·       Periodic publication

·       On-change publication

·       Lecture-24 Compare dial-in and dial-out approaches to model-driven telemetry

Part-1 Wireless Site Survey

·       Lecture-1 Collect design requirements and evaluate constraints

·       Client density

·       Real time applications

·       AP type

·       Deployment type (data, location, voice, video)

·       Security

·       Lecture-2 Describe material attenuation and its effect on wireless design

·       Lecture-3 Perform and analyze a Layer 1 site survey

·       Lecture-4 Perform a pre-deployment site survey

·       Lecture-5 Perform a post deployment site survey

·       Lecture-6 Perform a predictive site survey

·       Lecture-7 Utilize planning tools and evaluate key network metrics (Ekahau, AirMagnet, PI, Chanalyzer, Spectrum Analyzer)

Part-2 Wired and Wireless Infrastructure

·       Lecture-8 Determine physical infrastructure requirements such as AP power, cabling, switch port capacity, mounting, and grounding

·       Lecture-9 Determine logical infrastructure requirements such as WLC/AP licensing requirements based on the type of wireless architecture

·       Lecture-10 Design radio management

·       RRM

·       RF profiles

·       RxSOP

·       Lecture-11 Apply design requirements for these types of wireless networks

·       Data

·       Voice and video

·       Location

·       Hyperlocation

·       Lecture-12 Design high-density wireless networks and their associated components (campus,lecture halls, conference rooms)

·       Lecture-13 Design wireless bridging (mesh)

·       Modes of operation

·       Ethernet bridging

·       WGB and roaming

·       Lecture-14 Mobility

·       Design mobility groups based on mobility roles

·       Optimize client roaming

·       Validate mobility tunneling for data and control path

Part-3 Mobility

·       Lecture-15 Design high availability for controllers

·       Network availability through LAG

·       Stateful Switchover (SSO)

·       Anchor controller priority and redundancy

·       Lecture-16 Design high availability for APs

·       AP prioritization

·       Fall-back (assigning primary, secondary, and tertiary)

Part-1 Flex Connect

·       Lecture-1 Deploy FlexConnect components such as switching and operating modes

·       Lecture-2 Deploy FlexConnect capabilities

·       FlexConnect groups and roaming

·       Split tunneling and fault tolerance

·       VLAN-based central switching and Flex ACL

·       Smart AP image upgrade

·       Lecture-3 Implement Office Extend

Part-2 QoS on a Wireless Network

·       Lecture-4 Implement QoS schemes based on requirements including wired to wireless mapping

·       Lecture-5 Implement QoS for wireless clients

·       Lecture-6 Implement AVC including Fastlane (only on WLC)

Part-3 Multicast

·       Lecture-7 Implement multicast components

·       Lecture-8 Describe how multicast can affect wireless networks

·       Lecture-9 Implement multicast on a WLAN

·       Lecture-10 Implement mDNS

·       Lecture-11 Implement Multicast Direct

Part-4 Location Services

·       Lecture-12 Deploy MSE and CMX on a wireless network

·       Lecture-13 Implement location services

·       client tracking

·       RFID tags (tracking only)

·       Interferers

·       Rogue Aps

·       Clients

Part-5 Advanced Location Services

·       Lecture-14 Implement CMX components

·       Detect and locate

·       Analytics

·       Presence services

·       Lecture-15 Implement location-aware guest services using custom portal and Facebook Wi-Fi

·       Lecture-16 Troubleshoot location accuracy using Cisco Hyperlocation

·       Lecture-17 Troubleshoot CMX high availability

·       Lecture-15 Implement wIPS using MSE

Part-6 Security for Wireless Client Connectivity

·       Lecture-16 Configure client profiling on WLC and ISE

·       Lecture-17 Implement BYOD and guest

·       CWA using ISE (including self-registration portal)

·       LWA using ISE or WLC

·       Native supplicant provisioning using ISE

·       Certificate provisioning on the controller

·       Lecture-18 Implement 802.1X and AAA on different wireless architectures and ISE

·       Lecture-19 Implement Identity-Based Networking on different wireless architectures (VLANs, QoS,ACLs)

Part-7 Monitoring

·       Lecture-20 Utilize reports on PI and Cisco DNA center

·       Lecture-21 Manage alarms and rogues (APs and clients)

·       WLC

·       PI

·       Cisco DNA center

·       Lecture-22 Manage RF interferers

·       WLC

·       PI

·       Cisco DNA center

·       Lecture-23 Troubleshoot client connectivity

·       WLC

·       ISE

·       PI

·       Cisco DNA center

Part-8 Device Hardening

·       Lecture-24 Implement device access controls (including RADIUS and TACACS+)

·       Lecture-25 Implement access point authentication (including 802.1X)

·       Lecture-26 Implement CPU ACLs on the controller

Part-1 Network Programmability Foundation

·       Lecture-1 Utilize common version control operations with git (add, clone, push, commit, diff, branching, merging conflict)

·       Lecture-2 Describe characteristics of API styles (REST and RPC)

·       Lecture-3 Describe the challenges encountered and patterns used when consuming APIs synchronously and asynchronously

·       Lecture-4 Interpret Python scripts containing data types, functions, classes, conditions, and looping

·       Lecture-5 Describe the benefits of Python virtual environments

·       Lecture-6 Explain the benefits of using network configuration tools such as Ansible and Puppet for automating IOS XE platforms

Part-2 Automate APIs and Protocols

·       Lecture-7 Identify the JSON instance based on a YANG model

·       Lecture-8 Identify the XML instance based on a YANG model

·       Lecture-9 Interpret a YANG module tree generated per RFC8340

·       Lecture-10 Compare functionality, benefits, and uses of OpenConfig, IETF, and native YANG models

·       Lecture-11 Compare functionality, benefits, and uses of NETCONF and RESTCONF

Part-3 Network Device Programmability

·       Lecture-12 Implement device management and monitoring using NetMiko

·       Lecture-13 Construct a Python script using ncclient that uses NETCONF to manage and monitor an IOS XE device

·       Lecture-14 Configure device using RESTCONF API utilizing Python requests library

·       Lecture-15 Utilize Ansible to configure an IOS XE device

·       Lecture-16 Configure a subscription for model driven telemetry on an IOS XE device (CLI, NETCONF, and RESTCONF)

·       Lecture-17 Compare publication and subscription telemetry models

·       Periodic / cadence

·       On-change

·       Lecture-18 Describe the benefits and usage of telemetry data in troubleshooting the network

·       Lecture-19 Describe Day 0 provisioning methods

·       iPXE

·       PnP

·       ZTP

Part-4 Cisco DNA Center

·       Lecture-20 Compare traditional versus software-defined networks

·       Lecture-21 Describe the features and capabilities of Cisco DNA Center

·       Network assurance APIs

·       Intent APIs

·       Multivendor support (3rd party SDKs)

·       Events and notifications

·       Lecture-22 Implement Cisco DNA Center event outbound webhooks

·       Lecture-23 Implement API requests for Cisco DNA Center to accomplish network management tasks

·       Intent APIs

·       Command Runner APIs

·       Site APIs

·       Lecture-24 Implement API requests for Cisco DNA Center to accomplish network management tasks using these APIs

·       Network discovery and device APIs

·       Template APIs (Apply a template)

·       Lecture-25 Troubleshoot Cisco DNA Center automation process using Intent APIs

Part-5 Cisco SD-WAN

·       Lecture-26 Describe features and capabilities of Cisco SD-WAN vManage Certificate Management APIs

·       Lecture-27 Implement a Python script to perform API requests for Cisco SD-WAN vManage Device Inventory APIs to retrieve and display data

·       Lecture-28 Construct API requests for Cisco SD-WAN vManage Administration APIs

·       Lecture-29 Implement a Python script to perform API requests for Cisco SD-WAN vManage Configuration APIs to modify Cisco SD-WAN fabric configuration

·       Lecture-30 Construct API requests for Cisco SD-WAN vManage Monitoring APIs (Including real-time)

·       Lecture-31 Troubleshoot a Cisco SD-WAN deployment using vManage APIs

Part-6 Cisco Meraki

·       Lecture-32Describe features and capabilities of Cisco Meraki

·       Location Scanning APIs

·       MV Sense APIs

·       External Captive Portal APIs

·       WebHook Alert APIs

·       Lecture-33 Create a network using Cisco Meraki APIs

·       Lecture-34 Configure a network using Cisco Meraki APIs

·       Lecture-35 Implement a Python script for Cisco Meraki Alert WebHooks

Fees

Offline Training @ Vadodara

  • Classroom Based Training
  • Practical Based Training
  • No Cost EMI Option
45000 40000

Online Training preferred

  • Live Virtual Classroom Training
  • 1:1 Doubt Resolution Sessions
  • Recorded Live Lectures*
  • Flexible Schedule
40000 35000

Corporate Training

  • Customized Learning
  • Onsite Based Corporate Training
  • Online Corporate Training
  • Certified Corporate Training

Certification

  • Upon the completion of the Classroom training, you will have an Offline exam that will help you prepare for the Professional certification exam and score top marks. The BIT Certification is awarded upon successfully completing an offline exam after reviewed by experts
  • Upon the completion of the training, you will have an online exam that will help you prepare for the Professional certification exam and score top marks. BIT Certification is awarded upon successfully completing an online exam after reviewed by experts.
  • This course is designed to clear the following Cisco CCNP Enterprise Certifications: Core Exam - 350-401 ENCOR Implementing and Concentration exams (choose one): 300-410 ENARSI, 300-415 ENSDWI, 300-420 ENSLD, 300-425 ENWLSD, 300-430 ENWLSI, 300-435 ENAUTO