Wednesday, 28 December 2016

SYLLABUS :CCNA CCNP CCNA-SEC CCNP-SEC CCNP-ISP CCNA CCNP CCNA-SEC CCNP-SEC CCNP-ISP SYLLABUS CCNA

Introduction about Cisco & CCNA,Network Devices
Numbering System,System Communication
OSI Layer,TCP/IP Reference Model
IP Add,Subbnetting (FLSM),VLSM & Supernatting
Router Classification,Router Ports,Router memory MGMT
Router Password Recovery,Static Routing Theory
Static Routing Lab,Default Routing Theory
Dynamic Routing Theory,Rip,Ripv2 Protocol Theory
EIGRP,OSPF,Switiching
VLAN,Standerd ACL Theory & Lab
Extended ACL Theory & Lab,Wan Technology
HDLC, PAP, CHAP Protocol conf,Frame Relay
NAT,IPV6
Implement an EIGRP based solution, given a network design and a set of requirements
Determine network resources needed for implementing EIGRP in a network
Create an EIGRP implementation plan
Create an EIGRP verification plan
Configure EIGRP routing
Verify an EIGRP solution was implemented properly using show and debug commands
Document the verification results for an EIGRP implementation
Implement a multi-area OSPF Network, given a network design and a set of requirements
Determine network resources needed for implementing OSPF on a network
Create an OSPF implementation plan
Create an OSPF verification plan
Configure OSPF routing
Verify OSPF solution was implemented properly using show and debug commands
Document the verification results for an OSPF implementation plan
Implement an eBGP based solution, given a network design and a set of requirements
Determine network resources needed for implementing eBGP on a network
Create an eBGP implementation plan
Create an eBGP verification plan
Configure eBGP routing
Verify eBGP solution was implemented properly using show and debug commands
Document verification results for an eBGP implementation plan
Implement an IPv6 based solution, given a network design and a set of requirements
Determine network resources needed for implementing IPv6 on a network
Create an IPv6 implementation plan
Create an IPv6 verification plan
Configure IPv6 routing
Configure IPv6 interoperation with IPv4
Verify IPv6 solution was implemented properly using show and debug commands
Document verification results for an IPv6 implementation plan
Implement an IPv4 or IPv6 based redistribution solution, given a network design and a set of requirements
Create a redistribution implementation plan based upon the results from a redistribution analysis
Create a redistribution verification plan
Configure a redistribution solution
Verify that a redistribution was implemented
Document results of a redistribution implementation and verification plan
Identify the differences between implementing an IPv4 and IPv6 redistribution solution
Implement Layer 3 Path Control Solution
Create a Layer 3 path control implementation plan based upon the results of the redistribution analysis
Create a Layer 3 path control verification plan
Configure Layer 3 path control
Verify that a Layer 3 path control  was implemented
Document results of a Layer 3 path control implementation and verification plan
Implement basic teleworker and branch services
Describe broadband technologies
Configure basic broadband connections
Describe basic VPN technologies
Configure GRE
Describe branch access technologies
implement VLAN based solution, given a network design and a set of requirements
Determine network resources needed for implementing a VLAN based solution on a network
Create a VLAN based implementation plan
Create a VLAN based verification plan
Configure switch-to-switch connectivity for the VLAN based solution
Configure loop prevention for the VLAN based solution
Configure Access Ports for the VLAN based solution
Verify the VLAN based solution was implemented properly using show and debug commands
Document the verification after implementing a VLAN solution
Implement a Security Extension of a Layer 2 solution, given a network design and a set of requirements
Determine network resources needed for implementing a Security solution
Create a implementation plan for the Security solution
Create a verification plan for the Security solution
Configure port security features
Configure general switch security features
Configure private VLANs
Configure VACL and PACL
Verify the Security based solution was implemented properly using show and debug commands
Document the verification results after implementing a Security solution
Implement Switch based Layer 3 services, given a network design and a set of requirements
Determine network resources needed for implementing a Switch based Layer 3 solution
Create an implementation plan for the Switch based Layer 3 solution
Create a verification plan for the Switch based Layer 3 solution
Configure routing interfaces
Configure Layer 3 Security
Verify the Switch based Layer 3 solution was implemented properly using show and debug commands
Document the verification results after implementing a Switch based Layer 3 solution
Prepare infrastructure to support advanced services
Implement a Wireless Extension of a Layer 2 solution
Implement a VoIP support solution
Implement video support solution
Implement High Availability, given a network design and a set of requirements
Determine network resources needed for implementing High Availability on a network
Create a High Availability implementation plan
Create a High Availability verification plan
Implement first hop redundancy protocols
Implement switch supervisor redundancy
Verify High Availability solution was implemented properly using show and debug commands
Document results of High Availability implementation and verification
Maintain and monitor network performance
Develop a plan to monitor and manage a network
Perform network monitoring using IOS tools
Perform routine IOS device maintenance
Isolate sub-optimal internetwork operation at the correctly defined OSI Model layer
Troubleshoot EIGRP
Troubleshoot OSPF
Troubleshoot eBGP
Troubleshoot routing redistribution solution
Troubleshoot a DHCP client and server solution
Troubleshoot NAT
Troubleshoot first hop redundancy protocols
Troubleshoot IPv6 routing
Troubleshoot IPv6 and IPv4 interoperability
Troubleshoot switch-to-switch connectivity for the VLAN based solution
Troubleshoot loop prevention for the VLAN based solution
Troubleshoot Access Ports for the VLAN based solution
Troubleshoot port security
Troubleshoot general switch security
Troubleshoot VACLs and PACLs
Troubleshoot switch virtual interfaces (SVIs)
Troubleshoot switch supervisor redundancy
Troubleshoot a VoIP support solution
Troubleshoot Layer 3 Security
Understanding Network security principles
Developing a Secure Network
Defending the Perimeter
Configuring AAA
Securing the Router
Securing Layer 2 Devices
Implementing EndPoing security
Exploring Secure Voice Solutions
Providing SAN security
Using Cisco IOS Firewall to Defend the Network
Using Cisco IOS IPS to Secure the Network
Designing a Cryptographic Solution
Implementing Digital Signatures
Exploring PKI and Asymmetric Encryption
Building a Site-to-Site Ipsec VPN solution
Introduction to SECURE
NFP Controls
Private VLANs and PVLAN Edge
Additional Advanced Switched Data Plane Controls
802.1X Configuration on ACS for Windows 4.2
Advanced Routed Data Plane Security
Routed Control Plane Security iACLs and CPPR
Routed Control Plane Security Routing Protocol Authentication
Management Plane Security
Basic Zone-Based Policy Firewall
Advanced Zone-Based Policy Firewall
Deploying Software IOS IPS
Overview of Site-to-Site VPN Technologies
VTI-Based Site-to-Site VPNs
Scalable_VPN_Authentication
Dynamic Multipoint VPNs
GET VPN
Cisco SSL VPN
Cisco Easy VPN Server
VLANS and IP Addressing
Administrative Access
RIPv2, OSPF,EIGRP, Advanced Routing
IP access List , object groups
ICMP Traffic, url filtering
NAT
DNS,BGP , PIM, NTP,SYSLOG
SNMP, DHCP,FTP, SMTP,TCP
Qos
Qos , Transparent firewall
Firewall Contexts
Failover , ASA enhanced ob.groups
CCNP SECURITY VPN
LAN-to-LAN VPN between IOS and ASA
IPsec and NAT Interaction in ASA Firewall
Authentication using Digital Signatures
ASA Tunnel Group Names
ASA Certificate Mapping Rules
Filtering traffic inside LAN-to-LAN tunnels
LAN-to-LAN tunnel between IOS Routers
IOS IPsec NAT Traversal
IOS IKE Aggressive Mode
VPN between Overlapping Subnets
IOS VPN with Digital Signatures Authentication
IOS Certificate Access Lists
Virtual Tunnel Interfaces
GRE over IPsec
DMVPN
IOS ezVPN Server
IOS ezVPN Server using VTI
IOS ezVPN Server: Group Lock
IOS ezVPN Server: RADIUS Authorization
IOS ezVPN Server: Per User AAA download with PKI
IOS ezVPN Remote: Client Mode
IOS ezVPN Remote: NEM
IOS ezVPN Remote: VT
IOS ezVPN Remote: Digital Signatures
ASA ezVPN Server
ASA ezVPN Server: DHCP Address Allocation
ASA ezVPN Server: RADIUS Authorization
ASA ezVPN Server: Per User AAA download with PKI
ASA Clientless SSL VPN
ASA Clientless SSL VPN: Port Forwarding
ASA Clientless SSL VPN: Smart Tunnel
ASA SSL VPN
IOS SSL VPN
IOS SSL VPN RADIUS Authorization
IOS WebVPN (Clientless SSL VPN)
IOS WebVPN Port Forwarding
GET VPN
GET VPN COOP KS
The Areas of Attack: Network Security Overview
How IPS Can Help Your Network
Understanding and Using the IPS Command Line Interface
Understanding and Using IPS Device Manager
IPS Sensor Basic Configuration
IPS Signatures: Understanding Signatures and Alerts, Part 1
IPS Signatures: Understanding Signatures and Alerts, Part 2
IPS Signatures: Signature Engines, Part 1
IPS Signatures: Signature Engines, Part 2
IPS Signatures: Configuring Signature Parameters
IPS Signatures: Tuning Signatures
IPS Signatures: Creating Custom Signatures
IPS Sensor Advanced Configuration: IPS Sensor Tuning
IPS Sensor Advanced Configuration: Event Actions
Integrating IPS with Other Cisco Devices
IPS Maintenance and Monitoring: System-Level Functions
IPS Maintenance and Monitoring: Keeping Tabs on Your Sensor
Cisco’s IDS Network Module for Routers
Cisco’s IDS Network Module for 6500 Switches
New Features, Products, and Concepts
IPS Update Part 2
IPS IOS 6.0 Risk Ratings Components
Anomaly Detection (AD)
Information Security Program Management (Part 2)
Service Provider Routing
Understanding Service Provider Routing Protocols
Implement OSPF in the Service Provider Network
Introducing OSPF Routing
OSPF Operation
Implementing OSPF Routing
Implementing OSPF Special Area Types
Implement Integrated IS-IS in the Service Provider Network
Implement BGP in the Service Provider Network
Introducing BGP Routing
Implementing Basic BGP routing
Routing Protocol Tools and Route Manipulation
Introducing Routing Protocol Tools
Implementing Route Redistribution
Influencing BGP Route Selection
Influencing BGP Route Selection
Service Provider Connectivity with BGP
Defining Customer-to-Provider Connectivity Requirements
Connecting a Customer to Service Provider
Scale Service Provider Network
Scaling BGP in Service Provider Networks
Introducing BGP Route Reflectors and Confederations
Secure and Optimize BGP
Implementing Advanced BGP Operations
Improving BGP Convergence
Improving BGP Configuration Scalability
Multicast Overview
Introducing IP Multicast
Defining Multicast Distribution Trees and Forwarding
Multicast on the LAN
Populating Mroute Table
Intra- and Inter-Domain Multicast Routing
Introducing PIM-SM Protocol
Implementing PIM-SM Enhancements
Implementing Interdomain IP Multicast
Identifying Rendezvous Point Distribution Solutions
Service Provider IPv6 Transition Implementations
Introducing IPv6 Services
Defining IPv6 Transition Mechanisms
Deploying IPv6 in the Service Provider Network
CCNP SERVICE PROVIDER SPCORE
Multiprotocol Label Switching
Introducing MPLS
Running Label Distribution Protocol
Implementing MPLS in the Service Provider Core
MPLS Traffic Engineering
Introducing MPLS Traffic Engineering Components
Running MPLS Traffic Engineering
Implementing MPLS TE
Protecting MPLS TE Traffic
QoS in the Service Provider Network
Understanding QoS
Implementing Cisco QoS and QoS Mechanisms
Implementing MPLS Support for QoS
QOS Classification and Marking
Understanding Classification and Marking
Using Modular QoS CLI
Implementing Advanced QoS Techniques
QoS Congestion Management and Avoidance
Managing Congestion
Implementing Congestion Avoidance
QoS Traffic Policing and Shaping
Understanding Traffic Policing and Shaping
Implementing Traffic Policing
Implementing Traffic Shaping
VPN Technologies
Introducing Virtual Private Networks
Introduction to MPLS VPN
MPLS Layer 3 VPN
Implementing MPLS Layer 3 VPN Backbone
Connecting Customers using Simple Routing Protocols
Connecting Customers using BGP or OSPF
IPV6 and MPLS
Complex MPLS Layer 3 VPNs
Implementing Complex MPLS Layer 3 VPNs
Implementing Internet Access and MPLS Layer 3 VPNs
Introduction to MPLS Inter-Domain Solutions
Layer 2 VPNs and Ethernet Services 1
Introducing Layer 2 VPNs 2
Introducing Any Transport over MPLS
Implementing VPLS

No comments:

Post a Comment