Course Overview:
The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You’ll also learn to implement security principles, implement automation and programmability within an enterprise network, and how to overlay network design by using SD-Access and SD-WAN solutions.
Attendees to N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) will receive TechNow approved course materials, expert instruction, and prepare you to take the 350-401 Implementing Cisco® Enterprise Network Core Technologies (ENCOR) exam.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers
- Compare and contrast the various hardware and software switching mechanisms and operation, while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM), along with process switching, fast switching, and Cisco Express Forwarding concepts
- Troubleshoot Layer 2 connectivity using VLANs and trunking
- Implementation of redundant switched networks using Spanning Tree Protocol
- Troubleshooting link aggregation using Etherchannel
- Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP)
- Implementation and optimization of Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4 and IPv6
- Implementing External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking
- Implementing network redundancy using protocols including Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP)
- Implementing internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT)
- Describe the virtualization technology of servers, switches, and the various network devices and components
- Implementing overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP)
- Describe the components and concepts of wireless networking including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards
- Describe the various wireless deployment models available, include autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture
- Describe wireless roaming and location services
- Describe how APs communicate with WLCs to obtain software, configurations, and centralized management
- Configure and verify Extensible Authentication Protocol (EAP), WebAuth, and Pre-Shared Key (PSK) wireless client authentication on a WLC
- Troubleshoot wireless client connectivity issues using various available tools
- Troubleshooting Enterprise networks using services such as Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), Cisco Internetwork Operating System (Cisco IOS®) IP Service Level Agreements (SLAs), NetFlow, and Cisco IOS Embedded Event Manager
- Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting
- Configure secure administrative access for Cisco IOS devices using the Command-Line Interface (CLI) access, Role-Based Access Control (RBAC), Access Control List (ACL), and Secure Shell (SSH), and explore device hardening concepts to secure devices from less secure applications, such as Telnet and HTTP
- Implement scalable administration using Authentication, Authorization, and Accounting (AAA) and the local database, while exploring the features and benefits
- Describe the enterprise network security architecture, including the purpose and function of VPNs, content security, logging, endpoint security, personal firewalls, and other security features
- Explain the purpose, function, features, and workflow of Cisco DNA Center™ Assurance for Intent-Based Networking, for network visibility, proactive monitoring, and application experience
- Describe the components and features of the Cisco SD-Access solution, including the nodes, fabric control plane, and data plane, while illustrating the purpose and function of the Virtual Extensible LAN (VXLAN) gateways
- Define the components and features of Cisco SD-WAN solutions, including the orchestration plane, management plane, control plane, and data plane
- Describe the concepts, purpose, and features of multicast protocols, including Internet Group Management Protocol (IGMP) v2/v3, Protocol-Independent Multicast (PIM) dense mode/sparse mode, and rendezvous points
- Describe the concepts and features of Quality of Service (QoS), and describe the need within the enterprise network
- Explain basic Python components and conditionals with script writing and analysis
- Describe network programmability protocols such as Network Configuration Protocol (NETCONF) and RESTCONF
- Describe APIs in Cisco DNA Center and vManage
Prerequisites:
- CCNA certification
- Implementation of Enterprise LAN networks
- Basic understanding of Enterprise routing and wireless connectivity
- Basic understanding of Python scripting
Comments
Latest comments from students
User: don.seguin
Instructor comments: Tim was a great.
Facilities comments: The classroom was great.
User: jrtrussell
Instructor comments: Awesome
Facilities comments: Great
Liked the class? Then let everyone know!
TechNow Provides Integrated Solutions
TechNow delivers enterprise hardware, software, and consulting that implements technologies in the areas of virtualization, IP telephony, open source systems, or security. If your company is interested in the benefits of cost effective and secure hardware, software and consulting solutions, please contact us for further information.
TechNow Virtualization Solutions: TechNow delivers virtualization solutions in several virtualization stacks: Microsoft HyperV, Oracle VM, and VMware. TechNow integrates open system RAID NAS storage solutions that enable high availability solutions for all stacks. High performance I/O is critical to virtualized solutions and TechNow delivers the hardware, software, and consulting to make that happen. Mission critical environment and optimized for be both scalable and secure. If you are interested in purchasing a virtualization solution please contact TechNow to setup an appointed to discuss your requirements.
TechNow VoIP Solutions: TechNow delivers VoIP affordable solutions utilizing SIP and integrating desktop softphones, physical handset phones, iPad/iPod clients, cell phones, web status, email, voicemail, extisting landlines, and VoIP SIP Trunks. There are many marketing terms for highly integrated solutions, the term our product is "Great". If you are interested in purchasing a VoIP solution please contact TechNow to setup an appointed to discuss your requirements.
TechNow Security Solutions: TechNow delivers security solutions that are enterprise centric. As organizations grapple with managing security in their infrastructure, TechNow can architect, deliver, and implement hardware, software, and consulting required to insure a responsive and integrated approach to infastructure security.
Course Overview:
What a great course that is slightly misnamed! This course may be labeled Security Essentials, but covers much of the subject matter of CISSP! This course does more than just cover the basics. TechNow takes the time to give the student hands on labs to exemplify an objective. Security Essentials Prep Training Course sets the foundation for your security career and sets the expectation of comprehension with more detail than Security+ and more on par with CISSP.
This course provides students skills to take courses that prepare for higher level certifications.
Attendees to TN-929: Security Essentials Training Course will receive TechNow approved course materials and expert instruction.
Date/Locations:
Duration: 9 days
Course Objectives:
- 802.11 Suite of Protocols
- Access Control Theory
- Alternate Network Mapping Techniques
- Authentication and Password Management
- Contingency Planning
- Crypto Concepts
- Crypto Fundamentals
- Defense-in-Depth
- DNS
- Firewall Subversion
- Firewalls
- HIDS Overview
- Honeypots
- ICMP
- IDS Overview
- Incident Handling Fundamentals
- Information Warfare
- Introduction to OPSEC
- IP Packets
- IPS Overview
- IPv6
- Legal Aspects of Incident Handling
- Linux/Unix Configuration Fundamentals
- Linux/Unix Logging and Log Management
- Linux/Unix OS Security Tools and Utilities
- Linux/Unix Overview
- Linux/Unix Patch Management
- Linux/Unix Process and Service Management
- Mitnick-Shimomura
- Network Addressing
- Network Design
- Network Hardware
- Network Mapping and Scanning
- Network Plumbing
- Network Protocol
- NIDS
- OverviewPhysical Security
- Policy Framework
- Protecting Data at Rest
- Public Key Infrastructure
- PKI
- Reading Packets
- Risk Management
- Safety Threats
- Securing Windows Server Services
- Steganography
- OverviewTCPUDP
- Virtual Machines
- Virtual Private Networks VPNs
- Viruses and Malicious Code
- VoIP
- Vulnerability Management Overview
- Vulnerability Scanning
- Web Application Security
- Windows Auditing
- Windows Automation and Configuration
- Windows Family of Products
- Windows Network Security Overview
- Windows Permissions & User Rights
- Windows Security Templates & Group Policy
- Windows Service Packs, Hotfixes and Backups
- Windows Workgroups, Active Directory and Group Policy Overview
- Wireless Overview
Prerequisites:
Comments
Latest comments from students
User: sjsmith2262
Instructor comments: without question, Dave Askey knows his material!!! great instructor that gave a personalized approach.
Facilities comments: class was taught in a hotel reception area, very nice, quiet and convenient for all people
User: synistry
Instructor comments: Dave was great! (as always). Wealth of knowledge and a master at customizing course content to match the education level of his students. The class kept entirely in pace with where we were at as a group overall on a day to day basis.
Facilities comments: Facilities were overall really nice. The only complaint is that the hotel / conference center had us move rooms on one occasion, and kicked us out early on two others. I would assume this is due to the last minute location change, so I don't think there is anything anyone could have done better in the situation.
Liked the class? Then let everyone know!
Course Overview:
The Certified Information Security Manager (CISM) certification program is developed specifically for experienced information security managers & those who have information security management responsibilities. The CISM certification is for the individual who manages, designs, oversees and/or assesses an enterprise’s information security (IS). The CISM certification promotes international practices & provides executive management with assurance that those earning the designation have the required experience & knowledge to provide effective security management & consulting services. Individuals earning the CISM certification become part of an elite peer network, attaining a one-of-a-kind credential. The CISM job practice also defines a global job description for the information security manager & a method to measure existing staff or compare prospective new hires.
This course is designed to assist in your exam preparation for the CISM exam.
Attendees to TN-825: Certified Information Security Manager (CISM) Seminar will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Information Security Governance (24%)
- Establish and/or maintain an information security governance framework and supporting processes to ensure that the information security strategy is aligned with organizational goals and objectives
- Information Risk Management (30%)
- Manage information risk to an acceptable level based on risk appetite to meet organizational goals and objectives
- Information Security Program Development and Management (27%)
- Develop and maintain an information security program that identifies, manages and protects the organization’s assets while aligning to information security strategy and business goals, thereby supporting an effective security posture
- Information Security Incident Management (19%)
- Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact
Prerequisites:
A minimum of five years of information security work experience, with a minimum of three years of information security management work experience in three or more of the job practice analysis areas.
Comments
Latest comments from students
User: tracycampbell
Instructor comments: Dave had great command of the class and the flow of information. The lessons seem relevant to the exam and the course material should assist greatly with passing.
As a bonus, his breakdown of PKI helped with my current job requirements.
Facilities comments: The Home2Suites by Hilton was FANTASTIC!
Liked the class? Then let everyone know!