114培訓(xùn)網(wǎng)歡迎您來到杭州博學(xué)國際教育培訓(xùn)中心!

400-850-8622

全國統(tǒng)一學(xué)習(xí)專線 8:30-21:00

杭州CISCO認(rèn)證資深網(wǎng)絡(luò)工程師(CCNP R&S)培訓(xùn)

授課機(jī)構(gòu):杭州博學(xué)國際教育培訓(xùn)中心

關(guān)注度:176

課程價(jià)格: 請咨詢客服

上課地址:請咨詢客服

開課時(shí)間:滾動(dòng)開班

咨詢熱線:400-850-8622

在線報(bào)名

課程詳情在線報(bào)名

更新時(shí)間:2024-12-28
CISCO認(rèn)證資深網(wǎng)絡(luò)工程師(CCNP R&S)培訓(xùn) 培訓(xùn)班型: 周末班/脫產(chǎn)班 課程長度: 14天/84小時(shí);15天/90小時(shí) 培訓(xùn)日期: 待定 培訓(xùn)價(jià)格: 技術(shù)培訓(xùn)3000元/人 認(rèn)證考試: 認(rèn)證考試6900元/人,7600元/人(含票) 認(rèn)證培訓(xùn)9500元/人,10000元/人(含票) 培訓(xùn)地點(diǎn): 博學(xué)國際教育培訓(xùn)中心 環(huán)境要求: 投影儀、白板、電腦 培訓(xùn)形式: 課堂講授與實(shí)踐操作 培訓(xùn)資料: 思科培訓(xùn)教材 課程內(nèi)容 認(rèn)證描述: CCNP認(rèn)證表示資深網(wǎng)絡(luò)工程師具有對從100個(gè)節(jié)點(diǎn)到超過500個(gè)節(jié)點(diǎn)的融合局域網(wǎng)和廣域網(wǎng)進(jìn)行安裝、配置和故障排除的能力。獲得CCNP認(rèn)證資格的資深網(wǎng)絡(luò)工程師擁有豐富的知識(shí)和技能,能夠管理構(gòu)成網(wǎng)絡(luò)核心的路由器和交換機(jī),以及將語音、無線和安全集成到網(wǎng)絡(luò)中的邊緣應(yīng)用。 實(shí)施Cisco IP 路由(ROUTE 300-101)是獲得思科CCNP和CCDP認(rèn)證需要通過的一項(xiàng)考試??荚嚂r(shí)間為120分鐘,包括50-60道考題。ROUTE 300-101考試證明通過的考生具備網(wǎng)絡(luò)路由的知識(shí)和相關(guān)技能。他們有能力使用先進(jìn)的IP尋址技術(shù)和路由技術(shù)實(shí)施可擴(kuò)展的、高安全性的思科路由與局域網(wǎng),廣域網(wǎng)及IPv6的連接。 實(shí)施Cisco IP交換網(wǎng)絡(luò)(SWITCH 300-115) 獲得思科CCNP和CCDP認(rèn)證需要通過的一項(xiàng)考試??荚嚂r(shí)間為120分鐘,包括45-55道考題。SWITCH 300-115考試證明通過的考生具備網(wǎng)絡(luò)交換的知識(shí)和技能。他們有能力使用思科企業(yè)架構(gòu)來設(shè)計(jì)、配置和驗(yàn)證企業(yè)網(wǎng)絡(luò)交換解決方案的實(shí)施。SWITCH考試還涵蓋了高度安全集成的VLAN和WLANs技術(shù) 認(rèn)證先決條件:有效的CCNA或CCIE認(rèn)證,CCNP證書有效期3年。 課程概述: 思科認(rèn)證資深網(wǎng)絡(luò)工程師(CCNP)路由和交換認(rèn)證幫助甄別網(wǎng)絡(luò)工程師對本地局域網(wǎng)及廣域網(wǎng)的設(shè)計(jì),實(shí)施,驗(yàn)證,故障排除及與其他網(wǎng)絡(luò)專家合作關(guān)于先進(jìn)的網(wǎng)絡(luò)安全、語音、無線及視頻解決方案時(shí)必備的能力。對于那些至少有一年網(wǎng)絡(luò)工作經(jīng)驗(yàn),并準(zhǔn)備提升復(fù)雜網(wǎng)絡(luò)解決方案相關(guān)技能和獨(dú)立工作能力的人來說,CCNP路由和交換認(rèn)證十分合適。獲得CCNP路由和交換認(rèn)證的考生,證明了他們具備網(wǎng)絡(luò)工程師,網(wǎng)絡(luò)支持工程師,系統(tǒng)工程師或網(wǎng)絡(luò)技術(shù)員等企業(yè)職位所需的技能。此認(rèn)證中的路由和交換協(xié)議知識(shí)將為您提供一個(gè)持久的適應(yīng)于當(dāng)今物理網(wǎng)絡(luò)和未來虛擬化網(wǎng)絡(luò)的知識(shí)基礎(chǔ)。 授課對象:渠道合作伙伴、經(jīng)銷商、客戶、員工 入學(xué)要求: 熟悉如何使用微軟Window的各種應(yīng)用程序;了解如何使用Internet和 Intranet,建議擁有在一個(gè)網(wǎng)絡(luò)化環(huán)境內(nèi)工作的經(jīng)驗(yàn);有CCNA網(wǎng)絡(luò)基礎(chǔ)更優(yōu) 培訓(xùn)內(nèi)容: 實(shí)施Cisco IP 路由(300-101) 1.0 Network Principles (10% ) 1.1 Identify Cisco Express Forwarding concepts 1.1.a FIB 1.1.b Adjacency table 1.2 Explain general network challenges 1.2.a Unicast 1.2.b Out-of-order packets 1.2.c Asymmetric routing 1.3 Describe IP operations 1.3.a ICMP Unreachable and Redirects 1.3.b IPv4 and IPv6 fragmentation 1.3.c TTL 1.4 Explain TCP operations 1.4.a IPv4 and IPv6 (P)MTU 1.4.b MSS 1.4.c Latency 1.4.d Windowing 1.4.e Bandwidth-delay product 1.4.f Global synchronization 1.5 Describe UDP operations 1.5.a Starvation 1.5.b Latency 1.6 Recognize proposed changes to the network 1.6.a Changes to routing protocol parameters 1.6.b Migrate parts of the network to IPv6 1.6.c Routing protocol migration 2.0 Layer 2 Technologies(10% ) 2.1 Configure and verify PPP 2.1.a Authentication (PAP, CHAP) 2.1.b PPPoE (client side only) 2.2 Explain Frame Relay 2.2.a Operations 2.2.b Point-to-point 2.2.c Multipoint 3.0 Layer 3 Technologies(40%) 3.1 Identify, configure, and verify IPv4 addressing and subnetting 3.1.a Address types (Unicast, broadcast, multicast, and VLSM) 3.1.b ARP 3.1.c DHCP relay and server 3.1.d DHCP protocol operations 3.2 Identify IPv6 addressing and subnetting 3.2.a Unicast 3.2.b EUI-64 3.2.c ND, RS/RA 3.2.d Autoconfig (SLAAC) 3.2.e DHCP relay and server 3.2.f DHCP protocol operations 3.3 Configure and verify static routing 3.4 Configure and verify default routing 3.5 Evaluate routing protocol types 3.5.a Distance vector 3.5.b Link state 3.5.c Path vector 3.6 Describe administrative distance 3.7 Troubleshoot passive interfaces 3.8 Configure and verify VRF lite 3.9 Configure and verify filtering with any protocol 3.10 Configure and verify redistribution between any routing protocols or routing sources 3.11 Configure and verify manual and autosummarization with any routing protocol 3.12 Configure and verify policy-based routing 3.13 Identify suboptimal routing 3.14 Explain ROUTE maps 3.15 Configure and verify loop prevention mechanisms 3.15.a Route tagging and filtering 3.15.b Split-horizon 3.15.c Route poisoning 3.16 Configure and verify RIPv2 3.17 Describe RIPng 3.18 Describe EIGRP packet types 3.19 Configure and verify EIGRP neighbor relationship and authentication 3.20 Configure and verify EIGRP stubs 3.21Configure and verify EIGRP load balancing 3.21.a Equal cost 3.21.b Unequal cost 3.22 Describe and optimize EIGRP metrics 3.23 Configure and verify EIGRP for IPv6 3.24 Describe OSPF packet types 3.25 Configure and verify OSPF neighbor relationship and authentication 3.26 Configure and verify network types, area types, and router types 3.26.a Point-to-point, multipoint, broadcast, nonbroadcast 3.26.b LSA types, area type: backbone, normal, transit, stub, NSSA, totally stub 3.26.c Internal router, backbone router, ABR, ASBR 3.26.d Virtual link 3.27 Configure and verify OSPF path preference 3.28 Configure and verify OSPF operations 3.29 Configure and verify OSPF for IPv6 3.30 Describe, configure, and verify BGP peer relationships and authentication 3.30.a Peer group 3.30.b Active, passive 3.30.c States and timers 3.31 Configure and verify eBGP (IPv4 and IPv6 address families) 3.31.a eBGP 3.31.b 4-byte AS number 3.31.c Private AS 3.32 Explain BGP attributes and best-path selection 4.0 VPN Technologies(10%) 4.1 Configure and verify GRE 4.2 Describe DMVPN (single hub) 4.3 Describe Easy Virtual Networking (EVN) 5.0 Infrastructure Security(10%) 5.1 Describe IOS AAA using local database 5.2 Describe device security using IOS AAA with TACACS+ and RADIUS 5.2.a AAA with TACACS+ and RADIUS 5.2.b Local privilege authorization fallback 5.3 Configure and verify device access control 5.3.a Lines (VTY, AUX, console) 5.3.b Management plane protection 5.3.c Password encryption 5.4 Configure and verify router security features 5.4.a IPv4 access control lists (standard, extended, time-based) 5.4.b IPv6 traffic filter 5.4.c Unicast reverse path forwarding 6.0 Infrastructure Services(10%) 6.1 Configure and verify device management 6.1.a Console and VTY 6.1.b Telnet, HTTP, HTTPS, SSH, SCP 6.1.c (T)FTP 6.2 Configure and verify SNMP 6.2.a v2 6.2.b v3 6.3 Configure and verify logging 6.3.a Local logging, syslog, debugs, conditional debugs 6.3.b Timestamps 6.4 Configure and verify Network Time Protocol (NTP) 6.4.a NTP master, client, version 3, version 4 6.4.b NTP authentication 6.5 Configure and verify IPv4 and IPv6 DHCP 6.5.a DHCP client, IOS DHCP server, DHCP relay 6.5.b DHCP options (describe) 6.6 Configure and verify IPv4 Network Address Translation (NAT) 6.6.a Static NAT, dynamic NAT, PAT 6.7 Describe IPv6 NAT 6.7.a NAT64 6.7.b NPTv6 6.8 Describe SLA architecture 6.9 Configure and verify IP SLA 6.9.a ICMP 6.10 Configure and verify tracking objects 6.10.a Tracking objects 6.10.b Tracking different entities (for example, interfaces, IPSLA results) 6.11 Configure and verify Cisco NetFlow 6.11.a NetFlow v5, v9 6.11.b Local retrieval 6.11.c Export (configuration only) 實(shí)施Cisco IP 交換網(wǎng)絡(luò)(300-115) 1.0 Layer 2 Technologies (65%) 1.1 Configure and verify switch administration 1.1.a SDM templates 1.1.b Managing MAC address table 1.1.c Troubleshoot Err-disable recovery 1.2 Configure and verify Layer 2 protocols 1.2.a CDP, LLDP 1.2.b UDLD 1.3 Configure and verify VLANs 1.3.a Access ports 1.3.b VLAN database 1.3.c Normal, extended VLAN, voice VLAN 1.4 Configure and verify trunking 1.4.a VTPv1, VTPv2, VTPv3, VTP pruning 1.4.b dot1Q 1.4.c Native VLAN 1.4.d Manual pruning 1.5 Configure and verify EtherChannels 1.5.a LACP, PAgP, manual 1.5.b Layer 2, Layer 3 1.5.c Load balancing 1.5.d EtherChannel misconfiguration guard 1.6 Configure and verify spanning tree 1.6.a PVST+, RPVST+, MST 1.6.b Switch priority, port priority, path cost, STP timers 1.6.c PortFast, BPDUguard, BPDUfilter 1.6.d Loopguard and Rootguard 1.7 Configure and verify other LAN switching technologies 1.7.a SPAN, RSPAN 1.8 Describe chassis virtualization and aggregation technologies 1.8.a Stackwise 2.0 Infrastructure Security(20%) 2.1Configure and verify switch security features 2.1.a DHCP snooping 2.1.b IP Source Guard 2.1.c Dynamic ARP inspection 2.1.d Port security 2.1.e Private VLAN 2.1.f Storm control 2.2 Describe device security using Cisco IOS AAA with TACACS+ and RADIUS 2.2.a AAA with TACACS+ and RADIUS 2.2.b Local privilege authorization fallback 3.0 nfrastructure Services(15%) 3.1 Configure and verify first-hop redundancy protocols 3.1.a HSRP 3.1.b VRRP 3.1.c GLBP TSHOOT(300-135) 1.1 Complex network maintenance planning 1.2 Select maintenance and troubleshooting tools and Applications 1.3 Planning troubleshooting process for complex enterprise networks 1.4 Maintenance and troubleshooting campus exchange based issues 1.5 Maintenance and troubleshooting solutions based on Routing 1.6 Maintain and troubleshoot network security solutions 1.7 Integration of maintenance and troubleshooting, complex enterprise networks 1.8 Troubleshooting for exchange performance problems 1.9 Wireless connection troubleshooting 2.0 Voice ip 2.1 Video solution 2.2 Multicast solution 2.3 Troubleshooting NAT and PAT 2.4 Troubleshooting DHCP 2.5 Mobile IPv6, OSPFv3, RIPn
姓名不能為空
手機(jī)號(hào)格式錯(cuò)誤