Systematic

CCNP Enterprise 國際認可證書課程 (Full Track)

Enquire Now

Course Information

Schedules
  • 14 Jun 2024 (Fri) - 12 Jul 2024 (Fri) 7:00 PM - 10:00 PM
Registration period
7 Feb 2024 (Wed) - 13 Jun 2024 (Thu)
Price
HKD 14,475
(凡於 2024年 2月 9日 (五) 或之前報讀本課程,原價 $14,475,現只需 $11,580!)
Study Mode
Duration
126 Hour(s)
Language
Cantonese, English
Location
九龍旺角亞皆老街 109 號皆旺商業大廈 18 樓 1802 - 1807 室
10 views

Course Overview

 課程名稱: CCNP Enterprise 國際認可證書課程 (Full Track)

- 簡稱:CCNP Enterprise Training Course (Full)
課程時數: 合共 126 小時
課堂 96 小時 (共 32 堂) 及實習時段 30 小時 (共 10 節)
適合人士: 擁有 CCNA 知識的人士 (可沒有考獲 CCNA 認證)
授課語言: 以廣東話為主,輔以英語
課程筆記: 本中心的 CCIE 導師 Norman Lau (CCIE #10912)、Vincent Ho (CCIE #11933) 及 Franco Tsang (CCIE #19772) 親自編寫英文為主筆記,而部份英文字附有中文對照。

CD0625C1 第 1 部份課程:  14/06 - 12/07  二、五 7:00pm - 10:00pm $2,895  
CD0625C2 第 2 部份課程:  16/07 - 13/08  二、五 7:00pm - 10:00pm $2,895 
CD0625C3 第 3 部份課程:  16/08 - 06/09 二、五 7:00pm - 10:00pm $2,895 
CD0625C4 第 4 部份課程:  10/09 - 08/10  二、五 7:00pm - 10:00pm $2,895  

What You’ll Learn

ENCOR: Implementing and Operating Cisco Enterprise Network Core Technologies

1. Layer 2 Switching
1.1. MAC Address Table and TCAM
1.1.1. Layer 2 Forwarding
1.1.2. CAM and TCAM
1.2. VLAN
1.2.1. Overview
1.2.2. VLAN Trunk
1.2.3. Allowed and Active VLANs in Trunk
1.2.4. Exercises for VLAN Trunk
1.3. Dynamic Trunking Protocol (DTP)
1.3.1. About DTP
1.3.2. Exercises for DTP
1.4. VLAN Trunking Protocol (VTP)
1.4.1. VTP Modes and Versions
1.4.2. VTP Advertisement (宣傳)
1.4.3. VTP Pruning
1.4.4. Exercises for VTP
1.4.5. Disabling VTP Synchronization
1.5. Spanning Tree Protocol
1.5.1. Overview
1.5.2. Bridge Protocol Data Unit (BPDU)
1.5.3. Root Bridge Election
1.5.4. Root Port
1.5.5. Designated Port
1.5.6. Blocked / Non-Designated Port
1.5.7. STP Versions
1.5.8. 802.1D Port States
1.5.9. 802.1D Topology Change
1.5.10. 802.1w RSTP Port States
1.5.11. RSTP Alternate Port and Backup Port
1.5.12. RSTP Edge Port
1.5.13. 802.1w Topology Change
1.5.14. PVST+ and Rapid-PVST+
1.5.15. Exercise for STP and RSTP
1.5.16. Multiple Spanning Tree (MST) Protocol
1.5.17. Exercise for MSTP
1.6. EtherChannel
1.6.1. Overview
1.6.2. EtherChannel Setup
1.6.3. Load Balancing Methods
1.6.4. Exercise for EtherChannel
1.6.5. Layer 3 EtherChannel
1.7. Layer 2 Protocols in Trunk Link (參考章節)

2. Layer 3 Routing
2.1. Open Shortest Path First (OSPF)
2.1.1. Overview
2.1.2. Areas and LSA Types
2.1.3. OSPF Route Summarization
2.1.4. OSPF Route Filtering
2.1.5. About OSPF Network Types
2.1.6. Exercise for OSPF
2.2. Enhanced Interior Gateway Routing Protocol (EIGRP)
2.2.1. Overview
2.2.2. EIGRP Neighboring
2.2.3. EIGRP Metric
2.2.4. Split Horizon
2.2.5. Poison Route and Poison Reverse
2.2.6. Feasible Successor (可行的繼承者)
2.2.7. Unequal-Cost Load Balancing
2.2.8. Exercise for EIGRP
2.3. Border Gateway Protocol (BGP)
2.3.1. Overview
2.3.2. BGP Peering
2.3.3. eBGP Routing Updates
2.3.4. BGP Path Attributes
2.3.5. BGP Best Path Selection Algorithm
2.3.6. Exercise for BGP
2.4. Layer 3 Routing Operation
2.4.1. Process Switching
2.4.2. Fast Switching
2.4.3. Cisco Express Forwarding (CEF)
2.5. Virtualization of Networks
2.5.1. Overview
2.5.2. Virtual Route Forwarding (VRF)
2.5.3. Generic Routing Encapsulation (GRE) Tunnel
2.5.4. Exercise for VRF and GRE Tunnel

3. IP Services and QoS
3.1. Network Time Protocol (NTP)
3.1.1. Overview
3.1.2. Basic NTP Configuration
3.1.3. NTP Authentication
3.1.4. NTP Access Control
3.1.5. Exercise for NTP
3.2. NAT / PAT
3.2.1. Overview
3.2.2. NAT Configuration in Cisco Router
3.2.3. Exercise for NAT
3.3. First Hop Redundancy Protocol (FHRP)
3.3.1. Overview
3.3.2. Hot Standby Router Protocol (HSRP)
3.3.3. Virtual Router Redundancy Protocol (VRRP)
3.3.4. Gateway Load Balancing Protocol (GLBP)
3.3.5. Exercise for HSRP and VRRP
3.3.6. About Stateful SwitchOver (SSO)
3.4. QoS
3.4.1. Overview
3.4.2. Congestion Management / Avoidance
3.4.3. Classification
3.4.4. Marking

4. Monitoring
4.1. System Logging (Syslog)
4.1.1. Overview
4.1.2. Syslog Destination
4.1.3. Exercise for Syslog
4.2. SNMP
4.2.1. Overview
4.2.2. SNMP Agent Configuration
4.2.3. Exercise for SNMP
4.3. NetFlow
4.3.1. Overview
4.3.2. Basic NefFlow Configuration
4.3.3. Flexible NetFlow
4.3.4. Exercise for NetFlow
4.4. Switched Port Analyzer (SPAN)
4.4.1. Overview
4.4.2. SPAN
4.4.3. RSPAN
4.4.4. ERSPAN
4.4.5. Exercise for SPAN
4.5. IP SLA
4.5.1. Overview
4.5.2. IP SLA Responder
4.5.3. IP SLA Configuration
4.5.4. Using IP SLA as Track Object
4.5.5. Exercise for IP SLA

5. Security
5.1. Basic Login Authentication
5.1.1. Login Authentication using Password
5.1.2. Login Authentication using Local Username & Password
5.2. Privilege Levels
5.2.1. Overview
5.2.2. Granting Privilege Level to CLI session
5.2.3. Using Other Privilege Levels
5.3. AAA System
5.3.1. Overview
5.3.2. Configuring Authentication
5.3.3. Configuring Authorization
5.3.4. Exercise for AAA
5.4. Access Control List
5.4.1. Overview
5.4.2. ACL Types
5.4.3. Wildcard Mask
5.4.4. Matching Port Numbers
5.4.5. ACL Rules Ordering
5.4.6. Inbound and Outbound Access Lists
5.4.7. Exercise for ACL
5.5. Control Plane Policing (CoPP)
5.5.1. Overview
5.5.2. Configuration
5.5.3. Exercise for CoPP
5.6. Other Security Features and Devices
5.6.1. 802.1X
5.6.2. Cisco Cyber Threat Defense (CTD)
5.6.3. TrustSec / MACsec

6. Multicast
6.1. Overview
6.1.1. Background
6.1.2. Multicast IPv4 Address Range
6.2. Multicast in Ethernet Network
6.2.1. Background
6.2.2. Multicast MAC Address Mapping
6.3. Multicast Routing
6.3.1. Background
6.3.2. Internet Group Management Protocol (IGMP)
6.3.3. PIM (Protocol Independent Multicast) Overview
6.3.4. PIM Dense Mode (PIM-DM)
6.3.5. PIM Sparse Mode (PIM-SM)
6.3.6. Exercise for IGMP and PIM
6.4. IGMP Snooping (窺探)

7. Wireless Networking
7.1. Overview
7.1.1. Wireless Standards, Bands and Channels
7.1.2. Signal Strength
7.1.3. Authentication and Encryption
7.2. Autonomous AP
7.3. Controlled Based Wireless Networking
7.3.1. About Wireless LAN Controller
7.3.2. CAPWAP
7.3.3. AP Discovery and Join Process
7.4. WLC Configuration
7.5. Roaming and Mobility
7.5.1. Intra-Controller Roaming
7.5.2. Inter-Controller Roaming
7.5.3. Mobility Group
7.5.4. 802.11r (Fast BSS Transition)
7.6. FlexConnect
7.7. About Wireless QoS

8. Network Virtualization and Automation
8.1. Virtualization
8.1.1. About Virtual Machines
8.1.2. Hypervisor and Types of Virtualization
8.1.3. Virtualized Hardware
8.2. Cloud
8.2.1. About Cloud Computing
8.2.2. Cisco Products for Cloud Deployment
8.3. Network Topology Architectures
8.3.1. Traditional Topologies
8.3.2. Spine (脊柱) and Leaf Topology
8.4. Network Virtualization Overlay (重疊覆蓋)
8.4.1. Overview
8.4.2. Cisco FabricPath
8.4.3. Cisco VXLAN (Virtual eXtensible LAN虛擬可擴展局域網)
8.4.4. LISP (Locator/ID Separation Protocol)
8.5. Software Defined Networking (SDN)
8.5.1. Traditional Approach
8.5.2. Controller-Based Approach
8.5.3. Cisco DNA Center
8.5.4. SD-Access
8.5.5. SD-WAN
8.6. Network Automation
8.6.1. RESTful API
8.6.2. JSON (JavaScript Object Notation)
8.6.3. NETCONF (Network Configuration Protocol)
8.6.4. RESTCONF (Network Configuration Protocol)
8.6.5. YANG Data Model
8.6.6. Network Automation Tools
8.6.7. Python
8.6.8. EEM
8.6.9. Exercise for Network Automation

ENARSI: Implementing Cisco Enterprise Advanced Routing and Services

1. Routing Basics
1.1. Routing Protocols
1.1.1. Overview
1.1.2. Exterior Gateway Protocol (EGP)
1.1.3. Interior Gateway Protocol (IGP)
1.2. Routing Table
1.2.1. Administrative Distance (AD)
1.2.2. Load Balancing Routes
1.2.3. Cisco Express Forwarding (CEF)
1.3. Loop Prevention Mechanism
1.3.1. Distance Vector Routing Protocols
1.3.2. Link State Routing Protocols
1.3.3. Path Vector Routing Protocols
1.4. Fault Detection Mechanism

2. Enhanced Interior Gateway Routing Protocol (EIGRP)
2.1. Overview
2.1.1. EIGRP Hello and Neighboring
2.1.2. EIGRP Metric
2.1.3. DUAL Algorithm
2.1.4. Unequal-Cost Load Balancing
2.1.5. Route Summarization
2.2. EIGRP Authentication
2.3. EIGRP Neighboring in Non-Broadcast Network
2.4. EIGRP Query and Stuck-In-Active
2.5. Route Filtering
2.5.1. Distribute List
2.5.2. Prefix List
2.5.3. Route Map
2.6. EIGRP Stub
2.7. Route Leaking
2.8. EIGRP Named Mode
2.9. EIGRP Configuration Example
2.9.1. Exercise for EIGRP
2.9.2. EIGRP Query Example

3. Open Shortest Path First (OSPF)
3.1. Overview
3.1.1. OSPF Neighboring
3.1.2. Areas and LSA Types
3.1.3. Route Summarization and Filtering
3.1.4. OSPF Metric / Cost
3.2. OSPF Authentication
3.3. Virtual Link
3.4. OSPF Stub Area
3.4.1. Stub Area
3.4.2. Totally StubArea
3.4.3. Not So Stubby Area (NSSA)
3.4.4. Totally Not So Stubby Area.
3.4.5. Summary
3.5. OSPF Network Types
3.5.1. Overview
3.5.2. Point-to-Point
3.5.3. Broadcast
3.5.4. Loopback
3.5.5. Non-Broadcast MultiAccess / NBMA
3.5.6. Point-to-Multipoint
3.5.7. Point-to-Multipoint Non-broadcast
3.5.8. Summary
3.6. OSPF for IPv6
3.7. Configuration Examples
3.7.1. Exercise for OSPF
3.7.2. More about Route Filtering in OSPF (參考章節)
3.7.3. EIGRP Example for Partially Meshed Network

4. Border Gateway Protocol (BGP)
4.1. Overview
4.1.1. BGP Peering
4.1.2. BGP Routing Updates
4.1.3. BGP Path Attributes
4.1.4. BGP Best Path Selection Algorithm
4.2. More about BGP Peering
4.3. BGP Route Summarization
4.3.1. Summarization before Entering BGP Table
4.3.2. Summarization by BGP
4.3.3. Summarization with as-set
4.3.4. Summarization with Route Leaking
4.4. BGP Route Filtering
4.4.1. Route Filtering Configuration
4.4.2. BGP Route Refresh
4.5. BGP Dampening
4.6. iBGP
4.6.1. iBGP Peering
4.6.2. Route Reflector
4.6.3. Confederation
4.6.4. BGP Next Hop and Synchronization Rule
4.7. BGP for IPv6
4.8. Exercise for BGP

5. Redistribution
5.1. Overview
5.2. Parameters for redistribute Command
5.2.1. Types of Routes
5.2.2. Metric Value
5.2.3. Other Parameters
5.2.4. Example
5.3. Filtering
5.4. Problems in Redistribution
5.4.1. Only One Router at Routing Protocols’ Boundary
5.4.2. Two Routers at Routing Protocols’ Boundary
5.4.3. Two Routers performing Redistribution
5.4.4. More Complex Redistribution Problems
5.5. Route Tagging
5.6. Exercise for Redistribution

6. Policy Based Routing
6.1. Overview
6.2. PBR Configuration
6.2.1. Sample Route Map for PBR
6.2.2. match condition in Route Map for PBR
6.2.3. set in Route Map for PBR
6.3. Exercise for PBR

7. MPLS
7.1. MPLS
7.1.1. Overview
7.1.2. MPLS Label
7.1.3. Label Assignment and LIB
7.1.4. Label Exchange
7.1.5. Label Forwarding Information Base (LFIB)
7.1.6. Label Operations
7.1.7. Penultimate Hop Popping (PHP)
7.1.8. MPLS Configuration
7.2. MPLS VPN
7.2.1. Overview
7.2.2. VRF
7.2.3. MP-BGP
7.2.4. More about Setup / Feature for MPLS VPN
7.3. Exercise for MPLS

8. VRF Lite
8.1. Overview
8.2. Examples for Connecting Two VRF-Lite Routers
8.3. Import / Export Routes Between VRFs
8.4. Exercise for VRF Lite
8.5. Other Ways for Inter-VRF Routing
8.5.1. Inter-VRF Static Routes
8.5.2. Inter-VRF PBR

9. DMVPN
9.1. Overview
9.2. mGRE
9.3. NHRP
9.4. IPsec
9.4.1. Background
9.4.2. Traditional IPsec VPN Setup (參考章節)
9.4.3. IPsec Setup for DMVPN
9.5. Additional DMVPN Settings
9.5.1. Multicast Traffic
9.5.2. NHRP Tuning
9.5.3. Working with OSPF
9.5.4. Working with EIGRP
9.5.5. DMVPN Phase 3
9.6. Exercise for DMVPN

10. Security
10.1. IPv6 Security
10.1.1. IPv6 Access List
10.1.2. IPv6 First Hop Security (FHS)
10.2. Unicast Reverse Path Forwarding (uRPF)
10.2.1. Background
10.2.2. Mechanism and Configuration of uRPF
10.2.3. Options for Configuring uRPF
10.3. Access Control / Policy for Router’s Service
10.3.1. Inbound ACL
10.3.2. Service’ Access Control by ACL
10.3.3. Service’ Access Control by Authentication
10.3.4. Control Plane Policing (CoPP)
10.4. Exercise for Security

11. Monitoring and Troubleshooting
11.1. Config Log Archive
11.1.1. Overview
11.1.2. Configuration Settings
11.1.3. Password / Key Protection
11.1.4. Sending to Syslog
11.1.5. Time Information
11.2. IP SLA
11.2.1. Overview
11.2.2. Configuring Reaction Configuration
11.2.3. Configuring Track Object
11.3. Other Monitoring Tools
11.3.1. SNMP
11.3.2. SNMP Trap
11.3.3. NetFlow
11.4. DHCP
11.4.1. DHCP Operations
11.4.2. DHCP Configuration
11.4.3. DHCP Relay Agent
11.5. Exercise for Monitoring / Troubleshooting
11.6. Troubleshooting with Cisco DNA Center Assurance



Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed