CCNP: ENCOR – Implementing and Operating Cisco Enterprise Network Core Technologies (Exam 350-401)
Overview: This course teaches students about working with network core technologies. Topics covered include enterprise architecture, VLANS, EtherChannels, OSPF, Spanning-Tree Protocol, multicast protocols, Python, and more.
Course Modules
(Duration: 26m )
- Workbook (Pdf)
- Instructor Introduction
- Cisco Enterprise Architecture Model
- Campus LAN Design Fundamentals
- Layers in the Hierarchial Model
- Routed vs. Switched Campus Architecture
- Traditional Multilayer Campus Layer Design
- Access Layer
- Distribution Layer
- Core Layer
- When the Core Layer is Needed
- When the Core Layer is Needed (Cont.)
- Campus Distribution Layer Design
- Campus Distribution Layer Design (Cont.)
- Campus Distribution Layer Design (Cont.)
- Campus Distribution Layer Design (Cont.)
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 25 m )
- Workbook (Pdf)
- Revisiting VLANs
- Creating a VLAN
- Assigning a Port to a VLAN
- Creating a VLAN
- Creating a VLAN (Cont.)
- Creating a VLAN (Cont.)
- Trunking with 802.1Q
- Trunking with 802.1Q (Cont.)
- VLAN Tagging
- IEEE 802.1Q
- Native VLAN
- Configuring an 802.IQ Trunk
- Configuring an 802.IQ Trunk (Cont.)
- Configuring an 802.IQ Trunk (Cont.)
- Inter-VLAN Routing
- Option 1: Router with a Separate Interface in Each VLAN
- Option 2: Layer 3 Switch
- Demo – Troubleshooting
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 20m )
- Workbook (Pdf)
- Layer 2 Switch Operation
- Layer 2 Switch Operation (Cont.)
- MAC-Address Table and TCAM
- Demo – The CAM
- Control and Data Plane
- Cisco Switching Mechanisms
- Cisco Switching Mechanisms (Cont.)
- Cisco Switching Mechanisms (Cont.)
- Process Switching and Fast Switching
- Cisco Express Forwarding
- Demo – Cisco Express Forwarding
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 19m )
- Workbook (Pdf)
- Need for EtherChannel
- Need for EtherChannel (Cont.)
- Need for EtherChannel (Cont.)
- EtherChannel Mode Interactions
- Layer 2 EtherChannel Configuration Guidelines
- Layer 2 EtherChannel Configuration Guidelines (Cont.)
- EtherChannel Load-Balancing Options
- EtherChannel Load-Balancing Operation
- Troubleshoot EtherChannel Issues
- Troubleshoot EtherChannel Issues (Cont.)
- Troubleshoot EtherChannel Issues (Cont.)
- Demo – Troubleshoot EtherChannel Issues
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 33m )
- Workbook (Pdf)
- EIGRP Features
- EIGRP Reliable Transport
- EIGRP Operation Overview
- EIGRP Packet Format
- Establishing EIGRP Neighbor Adjacency
- EIGRP Metrics
- EIGRP Classic Metric Calculation
- EIGRP-Wide Metrics
- EIGRP Path Selection
- Loop Free Path Selection
- EIGRP Load Balancing
- Equal Cost Load Balancing
- Unequal Cost Load Balancing
- Traffic Sharing
- Traffic Sharing (Cont.)
- EIGRP for IPv6
- EIGRP Components
- Compare EIGRP and OSPF Routing Protocols
- Demo – EIGRP Stub
- Demo – EIGRP Load Balancing and Authentication
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 24 m )
- Workbook (Pdf)
- Inter-domain Routing with BGP
- BGP Characteristics
- Path Vector Functionality in BGP
- BGP Routing Policies
- BGP Operations
- BGP Message Types
- Types of BGP Neighbor Relationships
- eBGP Neighbor Relationships
- BGP Path Selection
- BGP Best Path Selection Algorithm
- BGP Path Attributes
- BGP Path Attributes (Cont.)
- Weight Attribute
- Local Preference Attribute
- AS-Path Attribute
- MED Attribute
- Demo – eBGP
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 45m )
- Workbook (Pdf)
- Describe OSPF
- Describe OSPF (Cont.)
- The OSPF Process
- The OSPF Process (Cont.)
- The OSPF Process (Cont.)
- The OSPF Process (Cont.)
- The OSPF Process (Cont.)
- OSPF Neighbor Adjacencies
- OSPF Neighbor Adjacencies (Cont.)
- Building a Link-State Database
- OSPF Packet Types
- OSPF Packet Header Format
- OSPF LSA Types
- OSPF LSA Types (Cont.)
- Compare Single-Area and Multi-Area OSPF
- Compare Single-Area and Multi-Area OSPF (Cont.)
- OSPF Area Structure
- OSPF Area Structure (Cont.)
- OSPF Network Types
- Demo – Configuring OSPFv3 using the Newer Syntax
- OSPF Cost
- OSPF Cost (Cont.)
- OSPF Cost (Cont.)
- OSPF Route Summarization
- Route Summarization Benefits
- Distribute List Example
- Prefix List Example
- Explore Route Maps
- Route Map Applications
- Route Map Operation
- Route Match Statement
- Route Map Configuration
- Demo – OSPF Stub and Totally Stubby
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 15m )
- Workbook (Pdf)
- Define Network Address Translation
- NAT Address Types
- Explore NAT Implementations
- Understanding Static NAT
- Understanding Dynamic NAT
- Understanding PAT
- NAT Virtual Interface
- NAT Virtual Interface (Cont.)
- Demo – Configuring Network Address Translation
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 0h 0m )
- Workbook (Pdf)
- Need for Default Gateway Redundancy
- Define FHRP
- Define FHRP (Cont.)
- HSRP Interface Tracking
- HSRP Interface Tracking (Cont.)
- HSRP Interface Tracking (Cont.)
- HSRP Load Sharing with HSRP Multigroup
- HSRP Load Sharing with HSRP Multigroup (Cont.)
- HSRP Load Sharing with HSRP Multigroup (Cont.)
- HSRP Authentication
- HSRP Versions
- Cisco Switch High Availability Features
- Nonstop Forwarding with Stateful Switchover on Catalyst 9400
- Demo – HSRP
- Demo – VRRP
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 30m )
- Workbook (Pdf)
- Spanning-Tree Protocol Overview
- Spanning-Tree Protocol Overview (Cont.)
- BPDU
- BPDU (Cont.)
- Root Bridge Election
- Root Bridge Election (Cont.)
- Designated Port Election
- STP Port States
- Spanning-Tree Protocol Types and Features
- Comparison of STP Protocols
- Default Spanning-Tree Configuration
- Multiple Spanning Tree Protocol
- Multiple Spanning Tree Protocol Recommended Practices
- Multiple Spanning Tree Protocol Recommended Practices (Cont.)
- Demo – Multiple Spanning Tree Protocol
- PortFast and BPDU Guard
- PortFast and BPDU Guard (Cont.)
- Configuring PortFast and BPDU Guard
- Verifying PortFast and BPDU Guard
- Verifying PortFast and BPDU Guard (Cont.)
- Verifying PortFast and BPDU Guard (Cont.)
- Verifying PortFast and BPDU Guard (Cont.)
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 47m )
- Workbook (Pdf)
- Server Virtualization
- Physical Server
- Virtualized Server
- Basic Virtualized Server Environment
- Server Virtualization Benefits
- Hypervisor: Abstraction Layer
- VM Definition
- Accessing vSphere Hosts Directly
- Centralized Control of vSphere Hosts
- Need for Network Virtualization
- Need for Network Virtualization (Cont.)
- Path Isolation Overview
- Device Virtualization
- Data Path Virtualization
- Introducing VRF
- Demo – VRF
- Introducing Generic Routing Encapsulation
- Site-to-Site VPN Technologies
- Site-to-Site VPN Technologies (Cont.)
- IPsec VPN Overview
- IPSec Security Associations
- IPsec: IKE
- IPsec Modes
- IPsec VPN Types
- Dynamic Multipoint VPN
- Cisco IOS FlexVPN
- Cisco IOS VTI
- Cisco IOS VTI (Cont.)
- Cisco IOS VTI (Cont.)
- Basic IKE Peering
- Basic IKE Peering (Cont.)
- Configuring Basic IKE Peering
- Configuring Basic IKE Peering (Cont.)
- Verifying IKE Peering
- Verifying IKE Peering (Cont.)
- Demo – VTI
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 1h 47m )
- Workbook (Pdf)
- RF Principles
- Frequency
- Watts and Decibels
- Watts and Decibels (Cont.)
- Antenna Power
- Effective Isotropic-Radiated Power (EIRP)
- Antenna Types
- Omni-directional Antennas
- Omni-directional Antennas (Cont.)
- Omni-directional Antennas (Cont.)
- Omni-directional Antennas (Cont.)
- Directional Antennas
- Directional Antennas (Cont.)
- Directional Antennas (Cont.)
- 802.11n/802.11ac MIMO
- 802.11n/802.11ac MIMO – MRC
- 802.11n/802.11ac MIMO – Beamforming
- 802.11n/802.11ac MIMO – Spatial Multiplexing
- 802.11ac MU-MIMO
- Client and AP Association
- Split MAC
- CAPWAP
- MC and MA Functions
- PoP and PoA Functions
- Wireless Deployment Overview
- Autonomous AP Deployment
- Autonomous Deployment Traffic Flow
- Cisco Autonomous Deployment Overview
- Centralized Cisco WLC Deployment
- Centralized Control and Provisioning of APs
- Centralized Deployment Traffic
- FlexConnect Deployment
- FlexConnect Deployment Traffic Flow
- FlexConnect Deployment Traffic Flow (Cont.)
- FlexConnect Deployment Traffic Flow
- FlexConnect Deployment
- FlexConnect Deployment (Cont.)
- Cloud Deployment and Its Effect on Enterprise Networks
- Cloud Deployment and Its Effect on Enterprise Networks (Cont.)
- Cloud Computing Services
- Cloud-Managed Meraki Solution
- Cisco Meraki Deployment Traffic Flow
- Demo – Meraki
- Cisco Catalyst 9800 Series Controller Deployment Options
- Catalyst 9800 Embedded Wireless Controller
- Catalyst 9800 Cloud Controller
- Cisco Mobility Express
- Wireless Roaming Overview
- Scanning for a new AP
- Mobility Groups and Domains
- Wireless Roaming Types
- Layer 2 Inter-Controller Roaming
- Layer 2 Inter-Controller Roaming (Cont.)
- Network Analytics
- Cisco CMX
- Cisco CMX Analytics Tools
- Location Accuracy
- Surveying Location-Based Services
- Universal AP Priming
- CAPWAP Discovery
- AP Join Order
- AP Join Phase with Master
- AP Join Phase without Master
- AP Fail-over
- AP-Specific High Availability
- N + 1 WLC High Availability
- AP SSO High Availability
- AP SSO High Availability (Cont.)
- Local Mode
- FlexConnect Mode
- FlexConnect Mode (Cont.)
- Bridge Mode
- Bridge Mode (Cont.)
- Other Modes
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 52 m )
- Workbook (Pdf)
- Authentication Methods
- Pre-Shared Key (PSK) Authentication
- PSK Authentication Process
- 802.1X User Authentication
- 802.1X User Authentication (Cont.)
- PKI and 802.1X Certificate-Based Authentication
- Asymmetric Encryption of User Credentials
- Digital Signatures
- Certificates and Certificate Authorities (CA)
- Retrieving CA Certificates
- Authentication Using Certificates
- Introduction to Extensible Authentication Protocol (EAP)
- EAP Frame Format
- EAP Authentication Types
- EAP-Transport Layer Security (EAP-TLS)
- Protected Extensible Authentication Protocol (PEAP)
- EAP-FAST
- PAC Creation
- PAC Exchange
- EAP-FAST Authentication
- Guest Access with Web Auth
- Local Web Authentication
- Local Web Authentication with Auto-Anchor
- Local Web Portal with External Authentication
- Centralized Web Authentication
- Wireless Troubleshooting Tools
- Spectrum Analysis
- Spectrum Analysis (Cont.)
- Wi-Fi Scanning
- Packet Analysis
- Cisco AireOS GUI and CLI Tools
- Cisco AireOS GUI and CLI Tools (Cont.)
- Cisco Wireless Config Analyzer Express
- Common Wireless Client Connectivity Issues
- Client to AP Connectivity
- Client Association with AP
- Client Association with AP (Cont.)
- WLAN Configuration
- Infrastructure Configuration
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 21m )
- Workbook (Pdf)
- Batch Applications
- Interactive Applications
- Real-Time Applications
- IPv4 Header Address Fields
- Traffic Characteristics
- Need for Quality of Service (QoS)
- QoS Mechanisms
- Trust Boundary
- Classification and Markings
- Classification Tools
- NBAR Advanced Classification Tool
- Policing, Shaping, and Re-Marking
- Policing, Shaping, and Re-Marking (Cont.)
- Managing Congestion
- Class Based Weighted Fair Queuing
- Tools for Congestion Avoidance
- Define and Interpret a QoS Policy
- Method for Implementing a QoS Policy
- MQC QoS Scenario
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 22m )
- Workbook (Pdf)
- Multicast Overview
- Multicast Overview
- Unicast vs. Multicast
- How Does IP Multicast Work?
- Multicast Advantages and Disadvantages
- IP Multicast Applications
- IP Multicast Group Address
- IP Multicast Group Address
- IP Multicast Service Model
- IP Multicast Service Model (Cont.)
- Internet Group Management Protocol
- IGMPv1
- IGMPv2
- IGMPv3
- Source Trees
- Shared Trees
- IP Multicast Routing
- PIM-DM
- PIM-SM
- PIM-SM Shared Tree Join
- PIM-SM Sender Registration
- PIM-SM Sender Registration (Cont.)
- PIM-SM Sender Registration (Cont.)
- Rendezvous Point
- Static RP
- BSR
- Auto-RP
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 29m )
- Workbook (Pdf)
- Need for Digital Transformation
- Need for Digital Transformation (Cont.)
- Cisco Digital Network Architecture
- Cisco Intent-Based Network
- Building Blocks of Intent-Based Enterprise Networks
- Assurance
- Cisco DNA Center
- Cisco DNA Center (Cont.)
- Cisco DNA Assurance
- Cisco DNA Assurance (Cont.)
- Cisco DNA Assurance (Cont.)
- Network Discovery and Management
- Inventory Management
- Manage Software Image
- Network Hierarchy
- IP Address Pools
- Day 0 Network Provisioning
- Day N Network Automation
- Cisco DNA Assurance Workflow
- Demo – DNA Center
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 12m )
- Workbook (Pdf)
- Application Programming Interfaces
- Application Programming Interfaces (Cont.)
- Application Programming Interfaces (Cont.)
- REST API Response Codes and Results
- REST API Response Codes and Results (Cont.)
- REST API Success Codes
- REST API Client Error Codes
- REST API Server Error Codes
- REST API Security
- REST API Security (Cont.)
- API in DNA-Center
- REST API in vManage
- vManage REST API Resources
- vManage REST API Resources (Cont.)
- vManage REST Methods
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 23m )
- Workbook (Pdf)
- Python Concepts
- Python Concepts (Cont.)
- Executing Python Code
- Python Scripts
- Python Helper Utilities and Functions
- Write Idiomatic Python
- Common Python Data Types
- String Data Types
- Printing Strings
- Concatenating Strings
- String Built in Methods
- Variable Assignment
- Numbers Data Types
- Boolean Data Types
- Conditionals
- Conditionals (Cont.)
- Script Writing and Execution
- Executing Scripts
- Analyzing Code
- Analyzing Code (Cont.)
- Analyzing Code (Cont.)
- Analyzing Code (Cont.)
- Analyzing Code (Cont.)
- Analyzing Code (Cont.)
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 1h 18m )
- Workbook (Pdf)
- Troubleshooting Concepts
- Diagnostic Principles
- Network Troubleshooting Procedures: Overview
- Defining the Problem
- Gathering Information
- Analyzing Information
- Eliminating Potential Causes and Proposing a Hypothesis
- Testing a Hypothesis
- Solving the Problem and Documenting the Solution
- Demo – Troubleshooting
- Basic Hardware Diagnostics
- Basic Hardware Diagnostics (Cont.)
- Basic Hardware Diagnostics (Cont.)
- Basic Hardware Diagnostics (Cont.)
- Basic Hardware Diagnostics (Cont.)
- Basic Hardware Diagnostics (Cont.)
- Basic Hardware Diagnostics (Cont.)
- Filtered Show Commands
- Exclude Filter
- Include Filter
- Begin Filter
- Section Filter
- Regular Expressions in Filters
- Regular Expressions in Filters (Cont.)
- Cisco IOS IP SLAs
- IP SLA Source and Responder
- Demo – IP SLAs
- Switch Port Analyzer (SPAN)
- Local SPAN
- Local SPAN Configuration
- Validating Local SPAN Configuration
- Remote SPAN (RSPAN)
- RSPAN Configuration
- RSPAN Configuration (Cont.)
- Verifying RSPAN Configuration
- Verifying RSPAN Configuration (Cont.)
- Encapsulated Remote Switch Port Analyzer (ERSPAN)
- ERSPAN Configuration
- ERSPAN Source Configuration
- ERSPAN Destination Configuration
- ERSPAN Verification
- Cisco Packet Capture Tools
- Network Time Protocol (NTP)
- Network Time Protocol (NTP) (Cont.)
- NTP Modes
- Securing NTP
- Securing NTP (Cont.)
- Logging Services
- Understanding Syslog
- Syslog
- Syslog Messages
- Demo – Logging
- Simple Network Management Protocol (SNMP)
- SNMP Operations
- NetFlow
- Analyzing NetFlow Data
- Format of Export Data
- Where Can NetFlow Be Implemented in the Network?
- NetFlow Applications
- Traditional NetFlow Configuration and Verification
- Traditional NetFlow Configuration and Verification (Cont.)
- Flexible NetFlow
- Traditional vs. Flexible NetFlow
- Demo – Flexible NetFlow
- Cisco IOS Embedded Event Manager (EEM)
- Demo – EEM
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 1h 50m )
- Workbook (Pdf)
- ACL
- ACL (Cont.)
- ACL (Cont.)
- ACL Wildcard Masking
- ACL Wildcard Masking (Cont.)
- ACL Wildcard Masking (Cont.)
- Wildcard Bit Mask Abbreviations
- Types of ACLs
- Types of ACLs (Cont.)
- Configure Numbered Standard IPv4 ACLs
- Configure Numbered Standard IPv4 ACLs (Cont.)
- Configure Numbered Standard IPv4 ACLs (Cont.)
- Configure Numbered Standard IPv4 ACLs (Cont.)
- Configure Numbered Extended IPv4 ACLs
- Configure Numbered Extended IPv4 ACLs (Cont.)
- Configure Numbered Extended IPv4 ACLs (Cont.)
- Use ACLs to Filter Network Traffic
- Use ACLs to Filter Network Traffic (Cont.)
- Apply ACLs to Interfaces
- Apply ACLs to Interfaces (Cont.)
- Apply ACLs to Interfaces (Cont.)
- Configure Named Access Lists
- Configure Named Access Lists (Cont.)
- Configure Named Access Lists (Cont.)
- Configure Named Extended ACLs
- Demo – ACLs
- Control Plane Overview
- Control Plane Policing
- Control Plane Policing (Cont.)
- Control Plane Policing (Cont.)
- Control Plane Policing Configuration
- Control Plane Policing Configuration (Cont.)
- Control Plane Policing Configuration (Cont.)
- Control Plane Policing Verification
- Control Plane Policing Verification (Cont.)
- Control Plane Policing Verification (Cont.)
- Control Plane Policing Verification (Cont.)
- Demo – CoPP
- Threatscape
- Intrusion Prevention Systems
- Virtual Private Networks
- Content Security
- Content Security (Cont.)
- Logging
- Endpoint Security
- Personal Firewalls
- Antivirus and Antispyware
- Centralized Endpoint Policy Enforcement
- Cisco AMP for Endpoints
- Cisco AMP for Endpoints (Cont.)
- Firewall Concepts
- Firewall Concepts (Cont.)
- Firewall Concepts (Cont.)
- Firewall Concepts (Cont.)
- TrustSec
- SGT Classification
- Inline SGT Support
- Enforcement Using SGFW
- Enforcement Using SGFW with the ASA
- MACsec
- Identify Management
- Identify Management (Cont.)
- 802.1X for Wired and Wireless Endpoint Authentication
- 802.1X Message Flow
- 802.1X Authorization
- 802.1X VLAN Assignment
- 802.1X Named ACLs
- 802.1X Downloadable ACLs
- 802.1X Host Modes
- 802.1X Host Modes
- Change of Authorization
- 802.1X Implementation Guidelines
- MAC Authentication Bypass
- MAC Authentication Bypass: Benefits and Limitations
- MAC Authentication Bypass Behavior
- Web Authentication
- Web Authentication (Cont.)
- Web Authentication Process
- Web Authentication Scenarios
- Demo – Email Security
- Securing Device Access
- Securing Device Access (Cont.)
- Securing Device Access (Cont.)
- Line Password
- Username and Password
- Device Hardening Options
- AAA Framework Overview
- Benefits of AAA
- Authentication Options
- RADIUS and TACACS+
- RADIUS and TACACS+ (Cont.)
- RADIUS AAA Communications
- TACACS+ AAA Communications
- Enabling AAA and Configuring a Local User for Fallback
- Configuring RADIUS for Console and VTY Access
- Configuring RADIUS for Console and VTY Access (Cont.)
- Configuring TACACS+ for Console and VTY Access
- Configure Authorization and Accounting
- Configure Authorization and Accounting (Cont.)
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 54m )
- Workbook (Pdf)
- Customer Challenges in Campus Network
- Cisco Digital Network Architecture
- Need for Cisco SD-Access
- Need for Cisco SD-Access (Cont.)
- Need for Cisco SD-Access (Cont.)
- Need for Cisco SD-Access (Cont.)
- Cisco SD-Access Fabric Overview
- Types of Overlay
- Why Overlays
- Fabric Underlay – Manual vs. Automated
- LISP and the Cisco SD-Access Fabric Control Plane
- LISP and the Cisco SD-Access Fabric Control Plane (Cont.)
- LISP Terms and Components
- LISP Packet Flow
- LISP Packet Flow (Cont.)
- LISP Host Mobility Deployment Models
- LISP Host Mobility Deployment Models (Cont.)
- Host Mobility in LISP
- Host Mobility in LISP (Cont.)
- Cisco SD-Access Fabric Data Plane Based on VXLAN
- Understanding VXLAN
- VXLAN Encapsulation
- VXLAN Encapsulation (Cont.)
- VXLAN Gateways
- VXLAN-GPO Header
- Cisco SD-Access Fabric Policy Plane
- Traditional Access Control
- Role of Cisco TrustSec
- Cisco TrustSec and Cisco ISE
- Cisco SD-Access Fabric Policy Plane
- Cisco SD-Access Fabric Nodes
- Cisco SD-Access Control Plane Node
- Cisco SD-Access Edge Node
- Cisco SD-Access Border Node
- Wireless LAN Controller and Fabric Mode APs
- DNA Center and ISE Integration
- DNA Center SD-Access Workflow
- Cisco SD-Access Wireless Integration
- Cisco SD-Access Wireless Integration (Cont.)
- Cisco SD-Access Wireless Workflow – Adding WLC to Fabric
- Cisco SD-Access Wireless Workflow – AP Join Process
- Cisco SD-Access Wireless Workflow – Client Onboarding
- Cisco SD-Access Wireless Workflow – Client Roaming
- Traditional Campus Inter-operating with Cisco SD-Access
- Traditional Campus Inter-operating with Cisco SD-Access (Cont.)
- Need for Software Defined Networking for WAN
- Need for Software Defined Networking for WAN (Cont.)
- SD-WAN Components
- SD-WAN Orchestration Plane
- SD-WAN Management Plane
- SD-WAN Management Plane (Cont.)
- SD-WAN Management Plane (Cont.)
- SD-WAN Control Plane
- SD-WAN Data Plane
- SD-WAN Automation and Analytics
- SD-WAN vAnalytics
- SD-WAN vAnalytics (Cont.)
- Demo – SD-WAN
- Review Quiz (Number of attempts allowed: Unlimited)
(Duration: 31m )
- Workbook (Pdf)
- Configuration Management
- Configuration Management (Cont.)
- Evolution of Device Management and Programmability
- Evolution of Device Management and Programmability (Cont.)
- Evolution of Device Management and Programmability (Cont.)
- Evolution of Device Management and Programmability (Cont.)
- Evolution of Device Management and Programmability (Cont.)
- Data Encoding Formats
- JSON
- JSON (Cont.)
- JSON (Cont.)
- JSON (Cont.)
- JSON (Cont.)
- JSON (Cont.)
- JSON (Cont.)
- JSON (Cont.)
- JSON (Cont.)
- JSON (Cont.)
- JSON (Cont.)
- JSON (Cont.)
- Data Models
- Data Models (Cont.)
- YANG
- YANG Models
- Model Driven Programmability Stack
- Model Driven Programmability Stack (Cont.)
- Describe YANG
- YANG Overview
- REST
- REST (Cont.)
- REST (Cont.)
- REST (Cont.)
- REST (Cont.)
- Common HTTP Response Codes
- Common HTTP Response Codes (Cont.)
- Common HTTP Response Codes (Cont.)
- REST Tools
- NETCONF
- NETCONF Protocol Stack
- NETCONF Data Stores
- NETCONF over SSH
- NETCONF over SSH (Cont.)
- NETCONF over SSH (Cont.)
- NETCONF over SSH (Cont.)
- NETCONF over SSH (Cont.)
- XML Encoding
- XML Encoding (Cont.)
- Utilities and Tools
- NETCONF and YANG
- NETCONF and YANG Side by Side
- NETCONF Protocol Operations
- NETCONF Protocol Operations (Cont.)
- NETCONF Configuration Datastores
- Describe RESTCONF
- RESTCONF Methods
- RESTCONF Sample: GET Interface
- RESTCONF Sample: GET Interface Description
- RESTCONF Sample: GET YANG Library Version
- RESTCONF Sample: Invoke RPC
- Cisco IOS XE and IOS XR Systems Overview
- Review Quiz (Number of attempts allowed: Unlimited)
This course includes
- about 14:02 hours on-demand video
- 22 downloadable Pdf Workbooks
- Unlimited time access (During Membership)
- Access on mobile and Desktop
- Certificate of Completion
Course Features Include:
Expert Lectures
Learn on-demand from top instructors who are industry subject matter experts. Our highly certified expert instructors possess a superior understanding of the subject matter in their fields and have the ability to convey this knowledge in an effective, engaging, and professional manner to a wide audience.Certificates of Completion
Upon completion of a series of courses you can earn a certificate of completion from Career Academy. Certificates of Completion will display your full name, course completed, as well as the date of completion. Students have the ability to print this out or save it digitally to showcase your accomplishment.PowerPoint Visuals:
Many of the in-depth theories and processes discussed in our courses can be learned most efficiently through the detailed PowerPoint slides presented. These visuals are accompanied by an instructor voice-over to provide our students with a clear, efficient, and complete presentation of concepts.Professional Development Activities
Students are provided access to professional development activity files which allow for an individual to test out course theories and apply the knowledge they earned from the course.Review Quizzes
Once a course is completed, test your knowledge by taking our course review quiz! Students have the ability to retake any review quizzes as many times as they wish to ensure they understand the material or to improve upon their scores.Mobile Access
With our universal course player, you can learn from your computer, tablet as well as mobile devices. Keep up with your training on the go!
Trusted by Aspiring IT Professionals, Corporations and
Government agencies for more than a Decade
Get unlimited online access learn anywhere, anytime using your computer or mobile device!