Ön Koşul
.
Eğitim Hakkında
Bu eğitim, kurumsal kablolu ve kablosuz ağları yapılandırmak, sorun gidermek ve yönetmek için gereken bilgi ve becerileri sağlar. Ayrıca, bir kurumsal ağ içinde güvenlik ilkelerini uygulamayı ve SD-Access ve SD-WAN gibi çözümleri kullanarak ağ tasarımının nasıl üst üste bindirileceğini kapsamaktadır.
Sertifika
Eğitimlerimize %80 oranında katılım gösterilmesi ve eğitim müfredatına göre uygulanacak sınav/projelerin başarıyla tamamlanması durumunda, eğitimin sonunda dijital ve QR kod destekli “BT Akademi Başarı Sertifikası” verilmektedir.
Eğitim İçeriği
- 1 Explain the different design principles used in an enterprise network
- 1.a Enterprise network design such as Tier 2, Tier 3, and Fabric Capacity planning
- 1.b High availability techniques such as redundancy, FHRP, and SSO
- 2 Analyze design principles of a WLAN deployment
- 2.a Wireless deployment models (centralized, distributed, controller-less, controller based, cloud, remote branch)
- 2.b Location services in a WLAN design
- 3 Differentiate between on-premises and cloud infrastructure deployments
- 4 Explain the working principles of the Cisco SD-WAN solution
- 4.a SD-WAN control and data planes elements
- 4.b Traditional WAN and SD-WAN solutions
- 5 Explain the working principles of the Cisco SD-Access solution
- 5.a SD-Access control and data planes elements
- 5.b Traditional campus interoperating with SD-Access
- 6 Describe concepts of wired and wireless QoS
- 6.a QoS components
- 6.b QoS policy
- 7 Differentiate hardware and software switching mechanisms
- 7.a Process and CEF
- 7.b MAC address table and TCAM
- 7.c FIB vs. RIB
- 1 Describe device virtualization technologies
- 1.a Hypervisor type 1 and 2
- 1.b Virtual machine
- 1.c Virtual switching
- 2 Configure and verify data path virtualization technologies
- 2.a VRF
- 2.b GRE and IPsec tunneling
- 3 Describe network virtualization concepts
- 3.a LISP
- 3.b VXLAN
- 1 Layer 2
- 1.a Troubleshoot static and dynamic 802.1q trunking protocols
- 1.b Troubleshoot static and dynamic EtherChannels
- 1.c Configure and verify common Spanning Tree Protocols (RSTP and MST)
- 2 Layer 3
- 2.a Compare routing concepts of EIGRP and OSPF (advanced distance vector vs. linked state, load balancing, path selection, path operations, metrics)
- 2.b Configure and verify simple OSPF environments, including multiple normal areas, summarization, and filtering (neighbor adjacency, point-to-point and broadcast network types, and passive interface)
- 2.c Configure and verify eBGP between directly connected neighbors (best path selection algorithm and neighbor relationships)
- 3 Wireless
- 3.a Describe Layer 1 concepts, such as RF power, RSSI, SNR, interference noise, band and channels, and wireless client devices capabilities
- 3.b Describe AP modes and antenna types
- 3.c Describe access point discovery and join process (discovery algorithms, WLC selection process)
- 3.d Describe the main principles and use cases for Layer 2 and Layer 3 roaming
- 3.e Troubleshoot WLAN configuration and wireless client connectivity issues
- 4 IP Services
- 4.a Describe Network Time Protocol (NTP)
- 4.b Configure and verify NAT/PAT
- 4.c Configure first hop redundancy protocols, such as HSRP and VRRP
- 4.d Describe multicast protocols, such as PIM and IGMP v2/v3
- 1 Diagnose network problems using tools such as debugs, conditional debugs, trace route, ping, SNMP, and syslog
- 2 Configure and verify device monitoring using syslog for remote logging
- 3 Configure and verify NetFlow and Flexible NetFlow
- 4 Configure and verify SPAN/RSPAN/ERSPAN
- 5 Configure and verify IPSLA
- 6 Describe Cisco DNA Center workflows to apply network configuration, monitoring, and management
- 7 Configure and verify NETCONF and RESTCONF
- 1 Configure and verify device access control
- 1.a Lines and password protection
- 1.b Authentication and authorization using AAA
- 2 Configure and verify infrastructure security features
- 2.a ACLs
- 2.b CoPP
- 3 Describe REST API security
- 4 Configure and verify wireless security features
- 4.a EAP
- 4.b WebAuth
- 4.c PSK
- 5 Describe the components of network security design
- 5.a Threat defense
- 5.b Endpoint security
- 5.c Next-generation firewall
- 5.d TrustSec, MACsec
- 5.e Network access control with 802.1X, MAB, and WebAuth
- 1 Interpret basic Python components and scripts
- 2 Construct valid JSON encoded file
- 3 Describe the high-level principles and benefits of a data modeling language, such as YANG
- 4 Describe APIs for Cisco DNA Center and vManage
- 5 Interpret REST API response codes and results in payload using Cisco DNA Center and RESTCONF
- 6 Construct EEM applet to automate configuration, troubleshooting, or data collection
- 7 Compare agent vs. agentless orchestration tools, such as Chef, Puppet, Ansible, and SaltStack
Neden Bu Eğitimi Almalısınız ?
.
Önemli Notlar
Program ücretlerine KDV dahil değildir.
Paylaş: