Skip to main content

Durata corso:

5 giorni


2.900,00 €

Implementing Cisco Enterprise Network Core Technologies (ENCOR) (CIS02)

Codice: CIS02

Il corso ENCOR Implementing Cisco Enterprise Network Core Technologies rappresenta il pilastro fondamentale del percorso tecnologico e di certificazione Enterprise. Esso infatti prepara il partecipante all’esame Core della Certificazione CCNP Enterprise (Esame 350-401). Questo corso affronta tematiche fondamentali delle moderne infrastrutture di rete tra le quali: High availability, redundancy, FHRP, WLAN deployment, Cisco SD-WAN solution,  Cisco SD-Access solution, wired and wireless QoS, VRF, GRE, IPsec tunneling, VXLAN, RSTP, MST, Advanced EIGRP e OSPF, eBGP, NetFlow, Flexible NetFlow, SPAN, RSPAN, ERSPAN, NETCONF, RESTCONF, Cisco DNA Center e altro ancora.

Modalità di erogazione

In aula o Live Virtual Classroom

Attestato di partecipazione

Al termine del corso verrà rilasciato l’attestato di frequenza


350-401 – Implementing Cisco Enterprise Network Core Technologies

Contenuti del corso

Examining Cisco Enterprise Network Architecture

  1. Cisco Enterprise Architecture Model
  2. Campus LAN Design Fundamentals
  3. Traditional Multilayer Campus Layer Design
  4. Campus Distribution Layer Design

Understanding Cisco Switching Paths

  1. Layer 2 Switch Operation
  2. Investigate the CAM
  3. Control and Data Plane
  4. Cisco Switching Mechanisms
  5. Analyze Cisco Express Forwarding

Implementing Campus LAN Connectivity

  1. Revisiting VLANs
  2. Trunking with 802.1Q
  3. Troubleshoot VLAN and Trunk Issues
  4. Inter-VLAN Routing

Building Redundant Switched Topology

  1. Spanning-Tree Protocol Overview
  2. Spanning-Tree Protocol Operation
  3. Spanning-Tree Protocols Types and Features
  4. Tuning STP and Configuring RSTP
  5. Multiple Spanning Tree Protocol
  6. Configure Multiple Spanning Tree Protocol
  7. PortFast and BPDU Guard

Implementing Layer 2 Port Aggregation

  1. Need for EtherChannel
  2. EtherChannel Mode Interactions
  3. Layer 2 EtherChannel Configuration Guidelines
  4. EtherChannel Load-Balancing Options
  5. Troubleshoot EtherChannel Issues
  6. Troubleshoot EtherChannel

Understanding EIGRP

  1. EIGRP Features
  2. EIGRP Reliable Transport
  3. Establishing EIGRP Neighbor Adjacency
  4. EIGRP Metrics
  5. EIGRP Path Selection
  6. Explore EIGRP Load Balancing and Sharing
  7. EIGRP for IPv6
  8. Compare EIGRP and OSPF Routing Protocols

Implementing OSPF

  1. Describe OSPF
  2. The OSPF Process
  3. OSPF Neighbor Adjacencies
  4. Building a Link-State Database
  5. OSPF LSA Types
  6. Compare Single-Area and Multiarea OSPF
  7. OSPF Area Structure
  8. OSPF Network Types
  9. Implement Multiarea OSPF

Optimizing OSPF

  1. OSPF Cost
  2. Implement OSPF Tuning
  3. OSPF Route Summarization
  4. OSPF Route Filtering Tools
  5. Apply OSPF Optimization
  6. Compare OSPFv2 and OSPFv3
  7. Implement OSPFv3

Exploring EBGP

  1. Interdomain Routing with BGP
  2. BGP Operations
  3. Types of BGP Neighbor Relationships
  4. BGP Path Selection
  5. BGP Path Attributes
  6. Configure and Verify Single-Homed EBGP

Implementing Network Redundancy

  1. Need for Default Gateway Redundancy
  2. Define FHRP
  3. Implementing HSRP
  4. HSRP Advanced Features
  5. Configure VRRP
  6. Cisco Switch High Availability Features

Implementing NAT

  1. Define Network Address Translation
  2. NAT Address Types
  3. Explore NAT Implementations
  4. NAT Virtual Interface
  5. Implement NAT

Introducing Virtualization Protocols and Techniques

  1. 12.2 Server Virtualization
    12.3 Need for Network Virtualization
    12.4 Path Isolation Overview
    12.5 Introducing VRF
    12.6 Configure and Verify VRF
    12.7 Introducing Generic Routing Encapsulation
    12.8 Configure and Verify a GRE Tunnel

Understanding Virtual Private Networks and Interfaces

  1. Site-to-Site VPN Technologies
  2. IPsec VPN Overview
  3. IPsec: IKE
  4. IPsec Modes
  5. IPsec VPN Types
  6. Cisco IOS VTI
  7. Configure Static VTI Point-to-Point Tunnels

Understanding Wireless Principles

  1. Explain RF Principles
  2. Describe Watts and Decibels
  3. Describe Antenna Characteristics
  4. Describe IEEE Wireless Standards
  5. Identify Wireless Component Roles

Examining Wireless Deployment Options

  1. Wireless Deployment Overview
  2. Describe Autonomous AP Deployment
  3. Describe Centralized Cisco WLC Deployment
  4. Describe FlexConnect Deployment
  5. Cloud Deployment and Its Effect on Enterprise Networks
  6. Describe the Cloud-Managed Meraki Solution
  7. Cisco Catalyst 9800 Series Controller Deployment Options
  8. Describe Cisco Mobility Express

Understanding Wireless Roaming and Location Services

  1. Wireless Roaming Overview
  2. Mobility Groups and Domains
  3. Wireless Roaming Types
  4. Describe Location Services

Examining Wireless AP Operation

  1. Universal AP Priming
  2. Explore the Controller Discovery Process
  3. Describe AP Failover
  4. Explain High Availability
  5. Explore AP Modes

Understanding Wireless Client Authentication

  1. Authentication Methods
  2. Pre-Shared Key (PSK) Authentication
  3. 802.1X User Authentication Overview
  4. PKI and 802.1X Certificate-Based Authentication
  5. EAP-Transport Layer Security (EAP-TLS)
  6. Protected Extensible Authentication Protocol (PEAP)
  8. Guest Access with Web Auth
  9. Configure Wireless Client Authentication in a Centralized Deployment

Troubleshooting Wireless Client Connectivity

  1. Wireless Troubleshooting Tools Overview
  2. Spectrum Analysis
  3. Wi-Fi Scanning
  4. Packet Analysis
  5. Cisco AireOS GUI and CLI Tools
  6. Cisco Wireless Config Analyzer Express
  7. Common Wireless Client Connectivity Issues Overview
  8. Client to AP Connectivity
  9. 10 WLAN Configuration
  10. 11 Infrastructure Configuration
  11. 12 Troubleshoot Wireless Client Connectivity Issues

Introducing Multicast Protocols

  1. Multicast Overview
  2. Internet Group Management Protocol
  3. Multicast Distribution Trees
  4. IP Multicast Routing
  5. Rendezvous Point

Introducing QoS

  1. Understand the Impact of User Applications on the Network
  2. Need for Quality of Service (QoS)
  3. Describe QoS Mechanisms
  4. Define and Interpret a QoS Policy

Implementing Network Services

  1. Understanding Network Time Protocol (NTP)
  2. Logging Services
  3. Configure Syslog
  4. Simple Network Management Protocol (SNMP)
  5. Introducing NetFlow
  6. Flexible NetFlow
  7. Configure and Verify Flexible NetFlow
  8. Understanding Cisco IOS Embedded Event Manager (EEM)
  9. Configuring Cisco IOS Embedded Event Manager (EEM)

Using Network Analysis Tools

  1. Troubleshooting Concepts
  2. Network Troubleshooting Procedures: Overview
  3. Network Troubleshooting Procedures: Case Study
  4. Basic Hardware Diagnostics
  5. Filtered Show Commands
  6. Troubleshoot Connectivity and Analyze Traffic with Ping, Traceroute, and Debug
  7. Cisco IOS IP SLAs
  8. Configure and Verify Cisco IP SLAs
  9. Switched Port Analyzer (SPAN) Overview
  10. Remote SPAN (RSPAN)
  11. Encapsulated Remote Switched Port Analyzer (ERSPAN)
  12. Cisco Packet Capture Tools Overview

Implementing Infrastructure Security

  1. ACL Overview
  2. ACL Wildcard Masking
  3. Types of ACLs
  4. Configure Numbered Access Lists
  5. Use ACLs to Filter Network Traffic
  6. Apply ACLs to Interfaces
  7. Configure Named Access Lists
  8. Configure Standard and Extended ACLs
  9. Control Plane Overview
  10. Control Plane Policing
  11. Configure Control Plane Policing

Implementing Secure Access Control

  1. Securing Device Access
  2. AAA Framework Overview
  3. Benefits of AAA Usage
  4. Authentication Options
  6. Enabling AAA and Configuring a Local User for Fallback
  7. Configuring RADIUS for Console and VTY Access
  8. Configuring TACACS+ for Console and VTY Access
  9. Configure Authorization and Accounting
  10. Implement Local and Server-Based AAA

Understanding Enterprise Network Security Architecture

  1. Explore Threatscape
  2. Intrusion Prevention Systems
  3. Virtual Private Networks
  4. Content Security
  5. Logging
  6. Endpoint Security
  7. Personal Firewalls
  8. Antivirus and Antispyware
  9. Centralized Endpoint Policy Enforcement
  10. Cisco AMP for Endpoints
  11. Firewall Concepts
  12. TrustSec
  13. MACsec
  14. Identity Management
  15. 802.1X for Wired and Wireless Endpoint Authentication
  16. MAC Authentication Bypass
  17. Web Authentication

Exploring Automation and Assurance Using Cisco DNA Center

  1. Need for Digital Transformation
  2. Cisco Digital Network Architecture
  3. Cisco Intent-Based Networking
  4. Cisco DNA Center
  5. Cisco DNA Assurance
  6. Cisco DNA Center Automation Workflow
  7. Cisco DNA Assurance Workflow

Examining the Cisco SD-Access Solution

  1. Need for Cisco SD-Access
  2. Software-Defined Access Overview
  3. Cisco SD-Access Fabric Control Plane Based on LISP
  4. Cisco SD-Access Fabric Data Plane Based on VXLAN
  5. Cisco SD-Access Fabric Policy Plane Based on Cisco TrustSecù
  6. Cisco SD-Access Fabric Components
  7. Role of Cisco ISE and Cisco DNA Center in SD-Access
  8. Cisco SD-Access Wireless Integration
  9. Traditional Campus Interoperating with Cisco SD-Access

Understanding the Working Principles of the Cisco SD-WAN Solution

  1. Need for Software Defined Networking for WAN
  2. SD-WAN Components
  3. SD-WAN Orchestration Plane
  4. SD-WAN Management Plane
  5. SD-WAN Control Plane
  6. SD-WAN Data Plane
  7. SD-WAN Automation and Analytics

Understanding the Basics of Python Programming

  1. Describe Python Concepts
  2. String Data Types
  3. Numbers Data Types
  4. Boolean Data Types
  5. Script Writing and Execution
  6. Analyze Code
  7. Writing and Troubleshooting Python Scripts

Introducing Network Programmability Protocols

  1. Configuration Management
  2. Evolution of Device Management and Programmability
  3. Data Encoding Formats
  4. Explore JSON Objects and Scripts in Python
  5. Data Models
  6. Model Driven Programmability Stack
  7. Describe YANG
  8. REST
  10. Explain NETCONF and YANG
  11. Describe the RESTCONF Protocol
  12. Cisco IOS XE and IOS XR Systems Overview
  13. Use NETCONF Via SSH
  14. Use RESTCONF with Cisco IOS XE Software

Introducing APIs in Cisco DNA Center and vManage

  1. Application Programming Interfaces
  2. REST API Response Codes and Results
  3. REST API Security
  4. API in DNA-Center
  5. REST API in vManage


  • Investigate the CAM
  • Analyze Cisco Express Forwarding
  • Troubleshoot VLAN and Trunk Issues
  • Tuning Spanning Tree Protocol (STP) and Configuring Rapid Spanning Tree Protocol (RSTP)
  • Configure Multiple Spanning Tree Protocol
  • Troubleshoot EtherChannel
  • Implement Multi-area OSPF
  • Implement OSPF Tuning
  • Apply OSPF Optimization
  • Implement OSPFv3
  • Configure and Verify Single-Homed EBGP
  • Implementing Hot Standby Routing Protocol (HSRP)
  • Configure Virtual Router Redundancy Protocol (VRRP)
  • Implement NAT
  • Configure and Verify Virtual Routing and Forwarding (VRF)
  • Configure and Verify a Generic Routing Encapsulation (GRE) Tunnel
  • Configure Static Virtual Tunnel Interface (VTI) Point-to-Point Tunnels
  • Configure Wireless Client Authentication in a Centralized Deployment
  • Troubleshoot Wireless Client Connectivity Issues
  • Configure Syslog
  • Configure and Verify Flexible NetFlow
  • Configuring Cisco IOS Embedded Event Manager (EEM)
  • Troubleshoot Connectivity and Analyze Traffic with Ping, Traceroute, and Debug
  • Configure and Verify Cisco IP SLAs
  • Configure Standard and Extended ACLs
  • Configure Control Plane Policing
  • Implement Local and Server-Based AAA
  • Writing and Troubleshooting Python Scripts
  • Explore JavaScript Object Notation (JSON) Objects and Scripts in Python
  • Use RESTCONF with Cisco IOS XE Software



  • Mid-level network engineers
  • Network administrators
  • Network support technicians
  • Help desk technicians

Si consiglia la partecipazione al CCNA.


Al termine del corso i partecipanti saranno in grado di:

  • Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers
  • Compare and contrast the various hardware and software switching mechanisms and operation, while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM), along with process switching, fast switching, and Cisco Express Forwarding concepts
  • Troubleshoot Layer 2 connectivity using VLANs and trunking
Vuoi ulteriori info?

Torna a trovarci per conoscere i nuovi Corsi inseriti

Oppure richiedi informazioni sul corso che ti interessa nella sezione Contatti

My Agile Privacy
Questo sito utilizza cookie tecnici e di profilazione. Cliccando su accetta si autorizzano tutti i cookie di profilazione. Cliccando su rifiuta o la X si rifiutano tutti i cookie di profilazione. Cliccando su personalizza è possibile selezionare quali cookie di profilazione attivare.