Training

Contract our flexible, tailored training programs that cover everything from test drives and technology comparison to network transformers and emerging technologies.

Advance your career while learning anywhere, anytime.

Network Transformers

We’ll help you get to know the latest emerging technologies, such as 5G, Network Automation, Slicing and much more.

Network Automation Essential

Our experts will help you understand better the Network Automation essentials, such as DevOps, CI/CD and open-source frameworks/tools.

Solutions Test Drive

We can guide you through a test drive of any solution or technology you’re interested in.

Training for Operations Teams

Tailored training for your operations team, based upon your requests and your specific project.

Technology Comparison

We offer an in-depth comparison of the same or similar technologies from multiple vendors and interoperability testing so you can make informed, data-driven decisions.

Vendor-Specific

We offer vendor-specific courses, including Cisco, Meraki, F5, Checkpoint and Arbor.

L2X Bootcamps

Let us guide you and your team.

5G

The Bootcamp that will make you a 5G expert.

Highly scalable and future-proof network architecture is required to enable the deployment and operation of new revenue-generating services.

  • Training Duration: 5 DAYS
  • Delivery: ONLINE

WHO SHOULD ATTEND

  • Engineers who require a detailed understanding of 5G Transport including but limited to; network engineers, network managers, system engineers, and/or network design engineers.

WHAT YOU WILL LEARN

  • For 5G, a highly scalable and future-proof network architecture is required to enable the deployment and operation of new revenue-generating services.
  • 5G will bring an increment in capacity with more stringent requirements including lower predictable delay, loss, and jitter.
  • Transport architecture with Segment Routing and Network Sliding will converge as a key SDN Solution.

COURSE OUTLINE

  • 5G Requirements
  • 5G Transport Evolution
  • Converged SDN 5G Transport Solution
  • Segment Routing
  • Network Slicing
  • Customer case studies

PREREQUISITES

  • Technical knowledge of IP and MPLS as well as automation skills will be beneficial.

This 5G Core Beginner Level course is intended to give an initial understanding of the fundamentals of 5G as well as 5G Standards & Specifications.

  • Training Duration:1 Day
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that would like to have a basic understanding of 5G Core fundamentals. This course is also a prerequisite for more advanced courses.

WHAT WILL YOU LEARN

  • This 5G Core Beginner Level course is intended to give an initial understanding of the fundamentals of 5G as well as 5G Standards & Specifications.

COURSE OUTLINE

  • Evolution of LTE Technology to Beyond 4G
  • Driving Factors/Pillars of 5G
  • 5G Standardization & Specifications
  • 5G Use Cases
  • 5G NSA Options & SA Requirements Network Reconfiguration and Virtualization Support

PREREQUISITES

  • Knowledge of LTE will be beneficial

This 5G Core Associate Level course is intended to give a strong understanding of 5G from an architecture perspective to Voice, Network Slicing, Interworking, QoS, and Security.

  • Training Duration: 3 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that require a solid knowledge of 5G Core technology.

WHAT YOU WILL LEARN

  • This 5G Core Associate Level course is intended to give a strong understanding of 5G from an architecture perspective to Voice, Network Slicing, Interworking, QoS, and Security.
  • Attendees will gain a strong knowledge of the main 5G topics with enough detail to improve their daily work, from design to support 5G Core networks.

COURSE OUTLINE

  •  5G Concepts and Drivers Review
  • Architecture Concepts and Call Flows
    • High-Level architecture
    • Evolution 4G to 5G: NSA
    • Deployment view
    • Block diagram view
  • 5G Concepts
    • 5G Identities SUPI, GUTI, GUAMI, DNN
    • 5G Core Protocols and Signaling
    • Control Plane
    • User Plane
  • MEC & Service Continuity
    • Multi-access Edge Computing
    • Architecture: Functional, Reference
  • Voice in New Radio 5G
    • VoNR drivers
    • Future of Voice
    • VoNR Architecture
  • 5G Network Slicing
    • Network Slice concepts
    • Network Slice Architecture
    • Slice Identification
    • Binding an Application to Slice
    • Selection of AMF, PCF, SMF
    • Radio Slicing
  • QoS Model
    • QoS in 4G evolution to 5G
    • QoS in 5G
    • QoS model: Parameters, QoS Id
    • Bearers and Connections
  • 5G NSA Non-Standalone Architecture
    • NSA architecture
    • Initial Procedures: Registration, Authentication
  • 5G CORE PROGRAMMING INTERFACE
    • Rest Principles
    • Rest API, Open API
    • Rest in 5G
    • 5GC APIs
  • 5G INTERWORKING
    • Interworking with LTE
    • PDN Connection/PDU Session establishment aspects:
    • Single and dual registration mode UEs.
    • Interworking with and without N26 interfaces between 4G and 5G
    • Interworking with Wi-Fi
    • N3IWF
  • 5G SECURITY
    • 5G Security Overview: Basics, Aspects, Threats
    • 5G Access security
    • Security setup signaling
    • Non-3GPP Access Security
  • 5G Cloud Native and Networking
    • Cloud-Native Overview
    • Containers
    • Kubernetes Architecture
    • Kubernetes Concepts
    • Istio

PREREQUISITES

  • It is highly recommended to attend the 1-day course 5G Core Beginner Level.

This 5G Core Advanced Level course will give you detailed knowledge of 5G Core topics including 5G NSA migrating to SA, SBA, vertical enhancements, and introduction to KPI.

  • Training Duration: 2 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that require further detailed knowledge of 5G Technologies as a path forward after attending the associate level bootcamp.

WHAT YOU WILL LEARN

  • This 5G Core Advanced Level course will give you detailed knowledge of 5G Core topics including 5G NSA migrating to SA, SBA, vertical enhancements, and introduction to KPI.
  • Attendees will gain a strong understanding of the main 5G topics with enough detail to improve their daily work, from design to support 5G Core networks.

COURSE OUTLINE

  • 5G CORE
    • 5G Core Introduction
    • Requirements to build 5G Core
    • 5G SA use cases
    • 5G NSA and 5G Core
    • Migrating to 5G NSA to SA
    • 5G enablers and use cases
  • 5G Ran Deployment
    • Option 3/3a/3x Comparison
  • New 5G Core Enhancements
    • Service Binding and Routing Binding
    • enhanced Service-Based Arch (eSBA)
    • UE Radio Capability Support (RACS)
    • enhanced Network Slicing (eNS)
  • New requirements and features
  • New vertical enhancements
    • Enterprise (Private 5G)
    • Industrial (URLLC)
    • Fixed Mobile Convergence (5WWC)
    • 5G CIOT
  • 5G Service Based Architecture (SBA)
    • Network Function Virtualization
    • SBA Model
    • SBA Protocol Stack
  • 5G PERFORMANCE KPI
    • KPI Parameters
    • KPI Template
    • End to end KPI definitions
    • Error code Handling
    • NR Volume reporting
    • Performance report KPI

PREREQUISITES

  • It is highly recommended to attend the 3-day 5G Core Associate Level course.

In this Specialist Security Bootcamp, you will learn all aspects of Security required in current 5G Core deployments, from Security to SBI to Cloud and Virtual Security.

  • Training Duration: 2 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers with strong knowledge of 5G Core technologies that are seeking detailed knowledge of 5G Core Security.

WHAT YOU WILL LEARN

  • In this Specialist Security Bootcamp, you will learn all aspects of Security required in current 5G Core deployments, from Security to SBI to Cloud and Virtual Security.

COURSE OUTLINE

  • 5G Security Overview: Basics, Aspects, Threats
  • 5G Access security
    • Security setup signaling
    • Non-3GPP Access Security
  • 5G Security for SBI
    • Nonroaming SBI Security
    • Roaming SBI Security
    • NEF Security with AF
  • 5G Security Procedures
  • Design Principles for 5G Security
  • 5G Network Security
    • Physical Layer Security
    • 5G WLAN Security
    • Security 5G Framework
  • 5G Cloud and Virtual Security
    • NFV Security
    • Cloud and MEC Security

PREREQUISITES

  • It is highly recommended to attend the 3-day 5G Core Associate Level and 2-day 5G Core Advanced Level.

In this Specialist Core Bootcamp, you will learn all aspects related to 5G Core design, from SMF to NRF, PCF, and UCF.

  • Training Duration: 2 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that require further knowledge of the latest technologies apply to 5G Core design.

WHAT YOU WILL LEARN

  • In this Specialist Core Bootcamp, you will learn all aspects related to 5G Core design, from SMF to NRF, PCF, and UCF.

COURSE OUTLINE

New 5G Core enhancements
Service Binding and Routing Binding
Enhanced Service-Based Arch (eSBA)
UE Radio Capability Support (RACS)
Enhanced Network Slicing (eNS)
Slice Authentication
ETSUN
ATTS Access Traffic Steering, Switching and Splitting

New vertical enhancements

Enterprise (Private 5G)
Industrial (URLLC)
Fixed Mobile Convergence (5WWC)

5G CIOT

5G NSA Non-Standalone Architecture
Dual Connectivity Secondary Node Addition, Change, Release
Inter MeNB Handover
NSA call Flows
5G NSA feature list and parameters

5G Core Examples
5G Core SMF
SMF Overview
SMF Architecture
SMF Features

5G Core NRF
NRF Services
NRF Architecture
NRF Hierarchy

5G Core PCF
PCF Overview
PCRF to PCF Usage Evolution
PCF Architecture
PCF Administration
PCF Networking & Call Flows

5G Core UCF
UPF Overview
UPF Architecture
5G Concepts for UPF
UPF Networking
UPF Redundancy
UPF Call Flows

PREREQUISITES

It is highly recommended to attend the 3-day 5G Core Associate Level and 2-day 5G Core Advanced Level.

In this Specialist Cloud-Native Bootcamp, you will learn how to apply Kubernetes concepts to the 5G Core.

  • Training Duration: 1 Day
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that require further knowledge of the latest deployments with 5G Cloud Native.

WHAT YOU WILL LEARN

  • In this Specialist Cloud-Native Bootcamp, you will learn how to apply Kubernetes concepts to the 5G Core.

COURSE OUTLINE

  • Cloud-Native Overview
  • Containers
  • Kubernetes Architecture
  • Kubernetes Concepts
  • Kubernetes Networking
  • Istio
  • Helm
  • Logging and Monitoring

PREREQUISITE

  • It is highly recommended to attend the 3-day 5G Core Associate Level and 2-day 5G Core Advanced Level.

In this Specialist KPI course, you will learn the fundamentals of the 5G KPI.

  • Training Duration: 1 Day
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that require further knowledge of 5G KPI.

WHAT YOU WILL LEARN

  • In this Specialist KPI course, you will learn the fundamentals of the 5G KPI.

COURSE OUTLINE

  • KPI Parameters
  • KPI Template
  • End to end KPI definitions
  • Error code Handling
  • NR Volume reporting
  • Performance report KPI

PREREQUISITES

  • It is highly recommended to attend the 3-day 5G Core Associate Level and 2-day 5G Core Advanced Level.

MEF

Enhance your knowledge on Carrier Ethernet technologies, the MEF specifications for services, and how these can be delivered over carrier core.

Attendees will learn in a vendor-independent environment, an overview of Carrier Ethernet technologies, the MEF specifications for services, and how these can be delivered over carrier core.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that want to reach MEF CECP certification and have a strong knowledge of Metro Ethernet Forum.

WHAT YOU WILL LEARN

  • Attendees will learn in a vendor-independent environment, an overview of Carrier Ethernet technologies, the MEF specifications for services, and how these can be delivered over carrier core.

COURSE OUTLINE

  • Module 1: Ethernet and MEF Basics
  • Module 2: Services and Attributes
  • Module 3: Class of Service and Traffic Management
  • Module 4: Service OAM
  • Module 5: Infrastructure, Operations, and Applications
  • Module 6: MEF Certification

 

PREREQUISITES

  • It is recommended to have knowledge of IP and QoS.

Attendees will learn the requirements for an application-aware, over-the-top WAN connectivity service that uses policies to determine how application flows are directed over multiple underlay networks irrespective of the underlay technologies or service providers who deliver them.

  • Training Duration: 4 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that are looking for MEF-SDCP certification and technology engineers looking to expand their understanding of SD-WAN.

WHAT YOU WILL LEARN

  • Attendees will learn the requirements for an application-aware, over-the-top WAN connectivity service that uses policies to determine how application flows are directed over multiple underlay networks irrespective of the underlay technologies or service providers who deliver them.

COURSE OUTLINE

Module 1 Overview of Basic Networking

  • Network Definitions
    • Node
    • Endpoint
    • Local Area Network (LAN)
    • MAC Address
    • Ethernet
    • Ethernet Frame
    • Virtual Local Area Network (VLAN)
    • IEEE 802.1ad, Q-in-Q
    • Wide Area Network (WAN)
    • Subscriber
    • Service Provider
    • Multiprotocol Label Switching (MPLS)
    • Routing
    • Routing Information Protocol (RIP)
    • Border Gateway Protocol (BGP)
    • Open Shortest Path First (OSPF)
    • Intermediate System – Intermediate System (IS-IS)
    • Source Packet Routing in Networking (SPRING)/Segmented Routing (SR)
  • Network Robustness
    • Bidirectional Forwarding Detection (BFD)
    • Fast Reroute (FRR)
  • Network Failures and Performance Issues
    • Two-Way Active Measurement Protocol (TWAMP)
    • Simple Network Message Protocol (SNMP)
    • Internet Control Message Protocol (ICMP)
    • Internet Control Message Protocol for IPv6 (ICMPv6)
    • Ping
    • Ping6
    • Traceroute
    • Traceroute6
  • Traffic Addresses
    • Internet Protocol version 4 (IPv4)
    • IPv4 Address
    • Classless Inter-Domain Routing (CIDR)
    • Dynamic Host Configuration Protocol (DHCP)
    • Internet Protocol version 5 (IPv5)
    • Internet Protocol version 6 (IPv6)
    • IPv6 Packet
    • Stateless Address Auto Configuration (SLAAC)

 

Module 2 Assessing, Planning, and Designing

  • Characteristics and Benefits of an SD-WAN Service
  • SD-WAN Components
    • SD-WAN UNI
    • Underlay Connectivity Services (UCS)
    • Tunnel Virtual Connection (TVC)
    • SD-WAN Virtual Connection (SWVC)
    • SD-WAN Virtual Connection Endpoint
    • SD-WAN Edge
  • Internet Breakout
  • SWVC Service Attributes
    • SWVC Identifier Service Attribute
    • SWVC End Point List Service Attribute
    • Service Uptime Objective Service Attribute
    • SWVC Reserved Prefixes Service Attribute
    • SWVC List of Policies Service Attribute
    • SWVC List of Application Flow Groups Service Attribute
    • SWVC List of Application Flows Service Attribute
    • Application Flow Groups and Policies
  • SWVC End Point Service Attributes
    • SWVC End Point Identifier Service Attribute
    • SWVC End Point Policy Map Service Attribute
  • SD-WAN UNI Service Attributes
    • SD-WAN UNI Identifier Service Attribute
    • SD-WAN UNI L2 Interface Service Attribute
    • SD-WAN UNI L2 Maximum Frame Size Service Attribute
    • SD-WAN UNI IPv4 Connection Addressing Service Attribute
    • SD-WAN UNI IPv6 Connection Addressing Service Attribute
    • SD-WAN UNI Example Scenario
  • Application Flows and Groups
  • Policies
    • Policy Criteria
  • Legacy Migration to SD-WAN
    • SOHO or Small Office Branch Type
    • Medium or Larger Offices Branch Type
    • SD-WAN Use Policies
  • Designing and Planning Scenarios

 

Module 3 Underlay Connectivity Services

  • Types of Underlay Connectivity Services
  • Characteristics of Underlay Connectivity Services
    • Carrier Ethernet Services
    • IP Services
    • L1 Connectivity Services
    • Public Internet
  • Access Methods for Underlay Connectivity Services
    • Copper Access / DSL
    • Synchronous Optical Network (SONET) / Synchronous Digital Hierarchy (SDH)
    • Fiber Access
    • HFC / DOCSIS
    • Packet Radio Access
    • Passive Optical Network
    • PDH Access
    • LTE
  • Public versus Private
    • Private UCS
    • Public UCS
    • Backup UCS
  • Traffic Requirements and Allocation of Bandwidth across Multiple Underlay Connectivity Services
    • Allocation of Bandwidth
    • BANDWIDTH Policy Effect on Packets
    • BANDWIDTH Policy Application
  • UCS Scenarios

 

Module 4 SD-WAN Components

  • Using an SD-WAN Gateway to Interconnect an SD-WAN Service to an External Service
    • Defining an SD-WAN Gateway
    • SD-WAN Gateway Use Case
  • Defining the SD-WAN Controller and SD-WAN Orchestrator
    • SD-WAN Controller
    • SD-WAN Service Orchestrator
  • Challenge Questions

Appendix: A Understanding the Basic Structure of the LSO API

  • Benefits of LSO API
  • LSOs with existing SDKs
  • LSOs without SDKs

Module 5 SD-WAN Security

  • Security
    • End-to-End Encryption
    • Security in the SD-WAN Context
  • Firewall Usage With SD-WAN
    • Firewalls
    • Firewalls in SD-WAN Context
  • Security Protocols
    • Transport Layer Security (TLS)
    • Secure Sockets Layer (SSL)
    • Internet Protocol Security (IPSec)
  • Encryption
    • IPSec Cryptographic Algorithms
    • WireGuard
  • Security Scenarios

 

PREREQUISITES

  • It is recommended to have a basic understanding of L2 and L3 protocols.

CYBER SECURITY

Cyber security, more than ever, has become a priority for individuals and companies. Make sure you are up-to-speed.

Attendees will learn many different views of cybersecurity, encryption technology, understand the concepts of confidentiality, code signing, digital signatures, learn how to reduce the attack surface and prevent hacking attempts.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that would like to have a clear knowledge of CyberSecurity and the techniques that it encompasses.

WHAT YOU WILL LEARN

  • Attendees will learn many different views of cybersecurity, encryption technology, understand the concepts of confidentiality, code signing, digital signatures, learn how to reduce the attack surface and prevent hacking attempts.

COURSE OUTLINE

  • Confidentiality, OPSEC concerns
  • Encryption concepts, symm and asymm encryption techniques
  • Key exchange techniques and system and message integrity
  • Secure boot techniques and message integrity codes
  • Biometrics, authentication server, and authorization
  • Data Security techniques
  • Intrusion detection and prevention systems
  • Case study Cisco IPS, Cisco IDS
  • System auditing requirements
  • Typical attack vectors and spoofing techniques
  • Malware code interpreters
  • Case study Cisco AMP
  • Tools for scanning systems via network

PREREQUISITES

  • It is highly recommended to have some knowledge of IP LAN/Wan.

Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization.

  • Training Duration: 5 Days
  • Delivery: Online

 

WHO SHOULD ATTEND

  • Engineers that would like to understand Cisco ISE in detail as well as best practices.

WHAT YOU WILL LEARN

  • Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization. Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios. Describe and configure Cisco ISE profiling services and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying profiler service in your specific environment.

COURSE OUTLINE

  • Module 1: Introducing Cisco ISE Architecture and Deployment
  • Module 2: Cisco ISE Policy Enforcement
  • Module 3: Web Auth and Guest Services
  • Module 4: Cisco ISE Profiler
  • Module 5: Cisco ISE BYOD
  • Module 6: Cisco ISE Endpoint Compliance Services
  • Module 7: Working with Network Access Device

PREREQUISITES

  • CCNA level of networking skills is required.

You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that require an in-depth knowledge of Cisco FirePower solution.

WHAT YOU WILL LEARN

  • Attendees will learn how to deploy and use Cisco Firepower Threat Defense system, starting with initial device setup and configuration and including routing, high availability, Cisco Adaptive Security Appliance (ASA) to Cisco Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT).
  • You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection.

COURSE OUTLINE

Cisco Firepower Threat Defense Overview

    • Examining Firewall and IPS Technology
    • Firepower Threat Defense Features and Components
    • Examining Firepower Platforms
    • Examining Firepower Threat Defense Licensing
    • Cisco Firepower Implementation Use Cases

Cisco Firepower NGFW Device Configuration

    • Firepower Threat Defense Device Registration
    • FXOS and Firepower Device Manager
    • Initial Device Setup
    • Managing NGFW Devices
    • Examining Firepower Management Center Policies
    • Examining Objects
    • Examining System Configuration and Health Monitoring
    • Device Management
    • Examining Firepower High Availability
    • Configuring High Availability
    • Cisco ASA to Firepower Migration
    • Migrating from Cisco ASA to Firepower Threat Defense

Cisco Firepower NGFW Traffic Control

    • Firepower Threat Defense Packet Processing
    • Implementing QoS
    • Bypassing Traffic

Cisco Firepower NGFW Address Translation

    • NAT Basics
    • Implementing NAT
    • NAT Rule Examples
    • Implementing NAT

Cisco Firepower Discovery

    • Examining Network Discovery
    • Configuring Network Discovery

Implementing Access Control Policies

    • Examining Access Control Policies
    • Examining Access Control Policy Rules and Default Action
    • Implementing Further Inspection
    • Examining Connection Events
    • Access Control Policy Advanced Settings
    • Access Control Policy Considerations
    • Implementing an Access Control Policy

Security Intelligence

    • Examining Security Intelligence
    • Examining Security Intelligence Objects
    • Security Intelligence Deployment and Logging
    • Implementing Security Intelligence

File Control and Advanced Malware Protection

    • Examining Malware and File Policy
    • Examining Advanced Malware Protection

Next-Generation Intrusion Prevention Systems

    • Examining Intrusion Prevention and Snort Rules
    • Examining Variables and Variable Sets
    • Examining Intrusion Policies

Site-to-Site VPN

    • Examining IPsec
    • Site-to-Site VPN Configuration
    • Site-to-Site VPN Troubleshooting
    • Implementing Site-to-Site VPN

Remote-Access VPN

    • Examining Remote-Access VPN
    • Examining Public-Key Cryptography and Certificates
    • Examining Certificate Enrollment
    • Remote-Access VPN Configuration
    • Implementing Remote-Access VPN

SSL Decryption

    • Examining SSL Decryption
    • Configuring SSL Policies
    • SSL Decryption Best Practices and Monitoring

Detailed Analysis Techniques

    • Examining Event Analysis
    • Examining Event Types
    • Examining Contextual Data
    • Examining Analysis Tools
    • Threat Analysis

System Administration

    • Managing Updates
    • Examining User Account Management Features
    • Configuring User Accounts
    • System Administration

Cisco Firepower Troubleshooting

    • Examining Common Misconfigurations
    • Examining Troubleshooting Commands
    • Firepower Troubleshooting

PREREQUISITES

  • CCNA level of networking skills is highly recommended.

You’ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors.

  • Training Duration: 4 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that would like to obtain an in-depth knowledge of the Cisco AMP solution.

WHAT YOU WILL LEARN

  • Attendees will learn how to deploy and use Cisco AMP for Endpoints that prevent, detects, and responds to advanced threats and how to implement and use this powerful solution through a number of step-by-step attack scenarios.
  • You’ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors.
  • You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool.

COURSE OUTLINE

  • Introducing to Cisco AMP Technologies
  • Introducing AMP for Endpoints Overview and Architecture
  • Navigating the Console Interface
  • Using Cisco AMP for Endpoints
  • Identifying Attacks
  • Analyzing Malware
  • Managing Outbreak Control
  • Creating Endpoint Policies
  • Working with AMP for Endpoint Groups
  • Using Orbital for Endpoint Visibility
  • Introducing AMP REST API
  • Navigating Accounts

PREREQUISITES

  • CCNA level of networking skills is highly recommended.

Engineers that would like to obtain an in-depth knowledge of the Cisco Umbrella solution can take advantage of this training.

  • Training Duration: 3 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that would like to obtain an in-depth knowledge of the Cisco Umbrella solution.

WHAT YOU WILL LEARN

  • Describe Cisco Umbrella
  • Understand Secure Internet Gateway & Ransomware Protection
  • Comprehend DNS & IP layer enforcement & Intelligent Proxy
  • Describe Command & control callback blocking
  • Discuss Threat Intelligence
  • Compare Umbrella Packages
  • Understand Roaming Security
  • Use Cisco Roaming Client
  • Deploy the Cisco Umbrella Virtual Appliance
  • Integrate Cisco Umbrella into Active Directory
  • Configure Umbrella Reporting
  • Utilize Multi-Organization Tools

COURSE OUTLINE

Module 1: Describe Cisco Umbrella

  • Umbrella and Available Features Overview

Module 2: Umbrella Deployment Options

  • DHCP
  • DNS Server
  • Roaming Client

Module 3: Configure Policy Components -Part 1

  • Destination Lists
  • Content Categories
  • Application Settings
  • Tenant Controls
  • Security Settings

Module 4: Configure Policy Components-Part 2

  • Block Page Appearance
  • Integrations
  • Selective Decryption Lists
  • Bypass Users
  • Bypass Codes

Module 5: Umbrella Policies-DNS, Firewall and Web

  • DNS Policies
  • Firewall Policies
  • Web Policies

Module 6: Integrating Umbrella with Active Directory

  • AD Connector and Script
  • Virtual Appliance
  • Roaming Client
  • AnyConnect Roaming Security

Module 7: Umbrella Roaming Security – Roaming Client

Module 8: Umbrella Roaming Security – AnyConnect Roaming Security

Module 9: Cisco Umbrella DNS Mobile Security

  • MDM Integration
  • IOS Devices
  • Android Devices

Module 10: User Account Management

  • Local Accounts
  • User Roles

Module 11: Umbrella Reporting

  • Core Reports
  • Additional Reports
  • Management Reports

Module 12: Umbrella Investigate

Module 13: Umbrella Multi-Organization

Module 14: Integrating Umbrella within Cisco SecureX

 

PREREQUISITES

  • CCNA level of networking skills is highly recommended.

Attendees will learn how to define the use and placement IDS/IPS components, identify Snort features and requirements, compile and install Snort, define, and use different modes of Snort and install and utilize Snort supporting software.

  • Training Duration: 4 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that require an in-depth knowledge of Open-Source Snort.

WHAT YOU WILL LEARN

  • Attendees will learn how to define the use and placement IDS/IPS components, identify Snort features and requirements, compile and install Snort, define, and use different modes of Snort and install and utilize Snort supporting software.

COURSE OUTLINE

Detecting Intrusions with Snort 3.0

  • History of Snort
  • IDS
  • IPS
  • IDS vs. IPS
  • Examining Attack Vectors
  • Application vs. Service Recognition

Sniffing the Network

  • Protocol Analyzers
  • Configuring Global Preferences
  • Capture and Display Filters
  • Capturing Packets
  • Decrypting Secure Sockets Layer (SSL) Encrypted Packets

Architecting Nextgen Detection

  • Snort 3.0 Design
  • Modular Design Support
  • Plug Holes with Plugins
  • Process Packets
  • Detect Interesting Traffic with Rules
  • Output Data

Choosing a Snort Platform

  • Provisioning and Placing Snort
  • Installing Snort on Linux

Operating Snort 3.0

  • Topic 1: Start Snort
  • Monitor the System for Intrusion Attempts
  • Define Traffic to Monitor
  • Log Intrusion Attempts
  • Actions to Take When Snort Detects an Intrusion Attempt
  • License Snort and Subscriptions

Examining Snort 3.0 Configuration

  • Introducing Key Features
  • Configure Sensors
  • Lua Configuration Wizard

Managing Snort

  • Pulled Pork
  • Barnyard2
  • Elasticsearch, Logstash, and Kibana (ELK)

Analyzing Rule Syntax and Usage

  • Anatomy of Snort Rules
  • Understand Rule Headers
  • Apply Rule Options
  • Shared Object Rules
  • Optimize Rules
  • Analyze Statistics

Use Distributed Snort 3.0

  • Design a Distributed Snort System
  • Sensor Placement
  • Sensor Hardware Requirements
  • Necessary Software
  • Snort Configuration
  • Monitor with Snort

Examining Lua

  • Introduction to Lua
  • Get Started with Lua

PREREQUISITES

  • It is highly recommended to attend Securing Networks with Cisco Firepower Next Generation Firewall Bootcamp.

Attendees will learn how to configure and manage Cisco Email Security Appliance, control sender and recipient domains, control span with Talos, use anti-virus and outbreak filters, use mail policies, content and message filters, prevent data loss, encrypt email, as well as test and troubleshoot the Cisco ESA solution.

  • Training Duration: 4 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers who want to have an in-depth knowledge of how to deploy high-availability email protection against the dynamic, rapidly changing threats affecting companies and gain skills on enterprise security.

WHAT YOU WILL LEARN

Attendees will learn how to configure and manage Cisco Email Security Appliance, control sender and recipient domains, control span with Talos, use anti-virus and outbreak filters, use mail policies, content and message filters, prevent data loss, encrypt email, as well as test and troubleshoot the Cisco ESA solution.

COURSE OUTLINE

Describing the Cisco Email Security Appliance

  • Cisco Email Security Appliance Overview
  • Technology Use Case
  • Cisco Email Security Appliance Data Sheet
  • SMTP Overview
  • Email Pipeline Overview
  • Installation Scenarios
  • Initial Cisco Email Security Appliance Configuration
  • Centralizing Services on a Cisco Content Security Management Appliance (SMA)
  • Release Notes for AsyncOS 11.x

Administering the Cisco Email Security Appliance

  • Distributing Administrative Tasks
  • System Administration
  • Managing and Monitoring Using the Command Line Interface (CLI)
  • Other Tasks in the GUI
  • Advanced Network Configuration
  • Using Email Security Monitor
  • Tracking Messages
  • Logging

Controlling Sender and Recipient Domains

  • Public and Private Listeners
  • Configuring the Gateway to Receive Email
  • Host Access Table Overview
  • Recipient Access Table Overview
  • Configuring Routing and Delivery Features

Controlling Spam with Talos SenderBase and Anti-Spam

  • SenderBase Overview
  • Anti-Spam
  • Managing Graymail
  • Protecting Against Malicious or Undesirable URLs
  • File Reputation Filtering and File Analysis
  • Bounce Verification

Using Anti-Virus and Outbreak Filters

  • Anti-Virus Scanning Overview
  • Sophos Anti-Virus Filtering
  • McAfee Anti-Virus Filtering
  • Configuring the Appliance to Scan for Viruses
  • Outbreak Filters
  • How the Outbreak Filters Feature Works
  • Managing Outbreak Filters

Using Mail Policies

  • Email Security Manager Overview
  • Mail Policies Overview
  • Handling Incoming and Outgoing Messages Differently
  • Matching Users to a Mail Policy
  • Message Splintering
  • Configuring Mail Policies

Using Content Filters

  • Content Filters Overview
  • Content Filter Conditions
  • Content Filter Actions
  • Filter Messages Based on Content
  • Text Resources Overview
  • Using and Testing the Content Dictionaries Filter Rules
  • Understanding Text Resources
  • Text Resource Management
  • Using Text Resources

Using Message Filters to Enforce Email Policies

  • Message Filters Overview
  • Components of a Message Filter
  • Message Filter Processing
  • Message Filter Rules
  • Message Filter Actions
  • Attachment Scanning
  • Examples of Attachment Scanning Message Filters
  • Using the CLI to Manage Message Filters
  • Message Filter Examples
  • Configuring Scan Behavior

Preventing Data Loss

  • Overview of the Data Loss Prevention (DLP) Scanning Process
  • Setting Up Data Loss Prevention
  • Policies for Data Loss Prevention
  • Message Actions
  • Updating the DLP Engine and Content Matching Classifiers

Using LDAP

  • Overview of LDAP
  • Working with LDAP
  • Using LDAP Queries
  • Authenticating End-Users of the Spam Quarantine
  • Configuring External LDAP Authentication for Users
  • Testing Servers and Queries
  • Using LDAP for Directory Harvest Attack Prevention
  • Spam Quarantine Alias Consolidation Queries
  • Validating Recipients Using an SMTP Server

SMTP Session Authentication

  • Configuring AsyncOS for SMTP Authentication
  • Authenticating SMTP Sessions Using Client Certificates
  • Checking the Validity of a Client Certificate
  • Authenticating User Using LDAP Directory
  • Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate
  • Establishing a TLS Connection from the Appliance
  • Updating a List of Revoked Certificates

Email Authentication

  • Email Authentication Overview
  • Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing
  • Verifying Incoming Messages Using DKIM
  • Overview of Sender Policy Framework (SPF) and SIDF Verification
  • Domain-based Message Authentication Reporting and Conformance (DMARC) Verification
  • Forged Email Detection

Email Encryption

  • Overview of Cisco Email Encryption
  • Encrypting Messages
  • Determining Which Messages to Encrypt
  • Inserting Encryption Headers into Messages
  • Encrypting Communication with Other Message Transfer Agents (MTAs)
  • Working with Certificates
  • Managing Lists of Certificate Authorities
  • Enabling TLS on a Listener’s Host Access Table (HAT)
  • Enabling TLS and Certificate Verification on Delivery
  • Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services

Using System Quarantines and Delivery Methods

  • Describing Quarantines
  • Spam Quarantine
  • Setting Up the Centralized Spam Quarantine
  • Using Safelists and Blocklists to Control Email Delivery Based on Sender
  • Configuring Spam Management Features for End Users
  • Managing Messages in the Spam Quarantine
  • Policy, Virus, and Outbreak Quarantines
  • Managing Policy, Virus, and Outbreak Quarantines
  • Working with Messages in Policy, Virus, or Outbreak Quarantines
  • Delivery Methods

Centralized Management Using Clusters

  • Overview of Centralized Management Using Clusters
  • Cluster Organization
  • Creating and Joining a Cluster
  • Managing Clusters
  • Cluster Communication
  • Loading a Configuration in Clustered Appliances
  • Best Practices

Testing and Troubleshooting

  • Debugging Mail Flow Using Test Messages: Trace
  • Using the Listener to Test the Appliance
  • Troubleshooting the Network
  • Troubleshooting the Listener
  • Troubleshooting Email Delivery
  • Troubleshooting Performance
  • Web Interface Appearance and Rendering Issues
  • Responding to Alerts
  • Troubleshooting Hardware Issues
  • Working with Technical Support

References

  • Model Specifications for Large Enterprises
  • Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch Offices
  • Cisco Email Security Appliance Model Specifications for Virtual Appliances
  • Packages and Licenses

PREREQUISITES

  • CCNA level of networking skills is highly recommended.

Attendees will learn how to deploy proxy services with Cisco WSA, utilize authentication, configure decryption policies to control HTTPS traffic, understand differentiated traffic access policies and identification profiles, enforce acceptable use control settings, defend against malware and perform Cisco WSA administration and troubleshooting.

  • Training Duration: 2 Days
  • Delivery: Online

WHO SHOULD ATTEND

Engineers who want to have in-depth knowledge of Cisco WSA to secure web gateways, provide malware protection and use policy controls to address the challenges of securing and controlling web traffic.

WHAT YOU WILL LEARN

Attendees will learn how to deploy proxy services with Cisco WSA, utilize authentication, configure decryption policies to control HTTPS traffic, understand differentiated traffic access policies and identification profiles, enforce acceptable use control settings, defend against malware and perform Cisco WSA administration and troubleshooting.

COURSE OUTLINE

Describing Cisco WSA

  • Technology Use Case
  • Cisco WSA Solution
  • Cisco WSA Features
  • Cisco WSA Architecture
  • Proxy Service
  • Integrated Layer 4 Traffic Monitor
  • Data Loss Prevention
  • Cisco Cognitive Intelligence
  • Management Tools
  • Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration
  • Cisco Content Security Management Appliance (SMA)

Deploying Proxy Services

  • Explicit Forward Mode vs. Transparent Mode
  • Transparent Mode Traffic Redirection
  • Web Cache Control Protocol
  • Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow
  • Proxy Bypass
  • Proxy Caching
  • Proxy Auto-Config (PAC) Files
  • FTP Proxy
  • Socket Secure (SOCKS) Proxy
  • Proxy Access Log and HTTP Headers
  • Customizing Error Notifications with End User Notification (EUN) Pages

Utilizing Authentication

  • Authentication Protocols
  • Authentication Realms
  • Tracking User Credentials
  • Explicit (Forward) and Transparent Proxy Mode
  • Bypassing Authentication with Problematic Agents
  • Reporting and Authentication
  • Re-Authentication
  • FTP Proxy Authentication
  • Troubleshooting Joining Domains and Test Authentication
  • Integration with Cisco Identity Services Engine (ISE)

Creating Decryption Policies to Control HTTPS Traffic

  • Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview
  • Certificate Overview
  • Overview of HTTPS Decryption Policies
  • Activating HTTPS Proxy Function
  • Access Control List (ACL) Tags for HTTPS Inspection
  • Access Log Examples

Understanding Differentiated Traffic Access Policies and Identification Profiles

  • Overview of Access Policies
  • Access Policy Groups
  • Overview of Identification Profiles
  • Identification Profiles and Authentication
  • Access Policy and Identification Profiles Processing Order
  • Other Policy Types
  • Access Log Examples
  • ACL Decision Tags and Policy Groups
  • Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications

Defending Against Malware

  • Web Reputation Filters
  • Anti-Malware Scanning
  • Scanning Outbound Traffic
  • Anti-Malware and Reputation in Policies
  • File Reputation Filtering and File Analysis
  • Cisco Advanced Malware Protection
  • File Reputation and Analysis Features
  • Integration with Cisco Cognitive Intelligence

Enforcing Acceptable Use Control Settings

  • Controlling Web Usage
  • URL Filtering
  • URL Category Solutions
  • Dynamic Content Analysis Engine
  • Web Application Visibility and Control
  • Enforcing Media Bandwidth Limits
  • Software as a Service (SaaS) Access Control
  • Filtering Adult Content

Data Security and Data Loss Prevention

  • Data Security
  • Cisco Data Security Solution
  • Data Security Policy Definitions
  • Data Security Logs

Performing Administration and Troubleshooting

  • Monitor the Cisco Web Security Appliance
  • Cisco WSA Reports
  • Monitoring System Activity Through Logs
  • System Administration Tasks
  • Troubleshooting
  • Command Line Interface

References

  • Comparing Cisco WSA Models
  • Comparing Cisco SMA Models
  • Overview of Connect, Install, and Configure
  • Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template
  • Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks
  • Connecting to the Cisco Web Security Virtual Appliance
  • Enabling Layer 4 Traffic Monitor (L4TM)
  • Accessing and Running the System Setup Wizard
  • Reconnecting to the Cisco Web Security Appliance
  • High Availability Overview
  • Hardware Redundancy
  • Introducing Common Address Redundancy Protocol (CARP)
  • Configuring Failover Groups for High Availability
  • Feature Comparison Across Traffic Redirection Options
  • Architecture Scenarios When Deploying Cisco AnyConnect® Secure Mobility

PREREQUISITES

  • CCNA level of networking skills is highly recommended.

Attendees will learn how to plan for network deployments and integrations using the Meraki Platform, how to operate Meraki networks, and troubleshoot complex network incidents using the Meraki Dashboard and analytics.

  • Training Duration: 4 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that require detailed knowledge of the Cisco Meraki Solution.

WHAT YOU WILL LEARN

  • Attendees will learn how to plan for network deployments and integrations using the Meraki Platform, how to operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics. You will also learn how to design Meraki architectures for redundancy, high-density, and scalability by implementing comprehensive Meraki product features to meet design objectives.

COURSE OUTLINE

  • Planning new Cisco Meraki architectures and expanding existing deployments
  • Designing for scalable management and high availability
  • Automating and scaling Meraki deployments
  • Designing routing and practices on the Meraki platform
  • Describing Quality of Service (QoS) and traffic shaping design
  • Building VPN and WAN topologies
  • Securing, expanding, and shaping the network
  • Describing network concepts and practices
  • Implementing wireless configuration practices and concepts
  • Describing Endpoint management concepts and practices
  • Describing physical security concepts and practices
  • Gaining network insight through monitoring applications
  • Preparing monitoring, logging, and alerting services
  • Setting up reporting and auditing capabilities in the Cisco Meraki Dashboard
  • Gaining visibility and resolving issues using Meraki features and built-in troubleshooting tools

PREREQUISITES

  • CCNA level of networking skills is highly recommended.

DEVNET

Evolve your team into engineers of the future.

Attendees will learn the details of Ansible and its different uses in network automation.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that would like to increase their knowledge in Ansible as a first step to become an expert in DevNet.

WHAT YOU WILL LEARN

  • Attendees will learn the details of Ansible and its different uses in network automation.

COURSE OUTLINE

Getting Started with Ansible

  • Ansible and Infrastructure Management
  • Installing Ansible
  • Creating a basic inventory file
  • Introduction to Ad-Hoc Ansible command

Introduction to Ansible Documentation

  • Ansible online documentation

Introduction to Core Components of Ansible

  • Control Nodes o Managed Nodes
  • Inventory
  • Modules
  • Tasks
  • Playbooks
  • Ansible for Network automation
  • How Network Automation is Different
  • Execution on the Control Node
  • Multiple Communication Protocols

Non-Ansible components that make Ansible work

Data format comparison

  • XML
  • JSON
  • YAML

Introduction to common version control operations with Git:

  • Git
  • Github
  • Clones
  • Add/remove
  • Commit
  • Push / pull
  • Branch
  • Merge
  • Diff

Understanding and Using APIs

Introduction to Rests and APIs

Inventory Management

  • Inventory essentials
  • Inventory variable
  • Using YAML in Inventories
  • Intro to Dynamic Inventories

Run your first Ansible Command

  • Running your first Ad-Hoc Ansible command
  • Introduction to Playbooks
  • Common Network ansible modules
  • Introduction to Variables
  • Benefits of using Tags for selective Tasks in Playbooks
  • Introduction to Conditions
  • Ansible errors and error handling

Explore NETCONF with Python

Configure Network Devices with Ansible

Collect Network Data with Ansible

Build and Deploy Configurations with Ansible

PREREQUISITES

  • It is highly recommended to have knowledge of Unix.

Attendees will learn how to implement basic network applications using Cisco platforms as a base, and how to implement automation workflows across a network, security, collaboration, and computing infrastructure.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that would like to take their first knowledge step of their DevNet career.

WHAT YOU WILL LEARN

  • Attendees will learn how to implement basic network applications using Cisco platforms as a base, and how to implement automation workflows across a network, security, collaboration, and computing infrastructure.

COURSE OUTLINE

1.0 Software Development and Design

1.1 Compare data formats (XML, JSON, and YAML)

1.2 Describe parsing of common data format (XML, JSON, and YAML) to Python data structures

1.3 Describe the concepts of test-driven development

1.4 Compare software development methods (agile, lean, and waterfall)

1.5 Explain the benefits of organizing code into methods / functions, classes, and modules

1.6 Identify the advantages of common design patterns (MVC and Observer)

1.7 Explain the advantages of version control

1.8 Utilize common version control operations with Git

1.8.a Clone

1.8.b Add/remove

1.8.c Commit

1.8.d Push / pull

1.8.e Branch

1.8.f Merge and handling conflicts

1.8.g diff

 

2.0 Understanding and Using APIs

2.1 Construct a REST API request to accomplish a task given API documentation

2.2 Describe common usage patterns related to webhooks

2.3 Identify the constraints when consuming APIs

2.4 Explain common HTTP response codes associated with REST APIs

2.5 Troubleshoot a problem given the HTTP response code, request and API documentation

2.6 Identify the parts of an HTTP response (response code, headers, body)

2.7 Utilize common API authentication mechanisms: basic, custom token, and API keys

2.8 Compare common API styles (REST, RPC, synchronous, and asynchronous)

2.9 Construct a Python script that calls a REST API using the requests library

3.0 Cisco Platforms and Development

3.1 Construct a Python script that uses a Cisco SDK given SDK documentation

3.2 Describe the capabilities of Cisco network management platforms and APIs (Meraki, Cisco DNA Center, ACI, Cisco SD-WAN, and NSO)

3.3 Describe the capabilities of Cisco compute management platforms and APIs (UCS Manager, UCS Director, and Intersight)

3.4 Describe the capabilities of Cisco collaboration platforms and APIs (Webex Teams, Webex devices, Cisco Unified Communication Manager including AXL and UDS interfaces, and Finesse)

3.5 Describe the capabilities of Cisco security platforms and APIs (Firepower, Umbrella, AMP, ISE, and ThreatGrid)

3.6 Describe the device level APIs and dynamic interfaces for IOS XE and NX-OS

3.7 Identify the appropriate DevNet resource for a given scenario (Sandbox, Code Exchange, support, forums, Learning Labs, and API documentation)

3.8 Apply concepts of model-driven programmability (YANG, RESTCONF, and NETCONF) in a Cisco environment

3.9 Construct code to perform a specific operation based on a set of requirements and given API reference documentation such as these:

3.9.a Obtain a list of network devices by using Meraki, Cisco DNA Center, ACI, Cisco SD-WAN, or NSO

3.9.b Manage spaces, participants, and messages in Webex Teams

3.9.c Obtain a list of clients/hosts seen on a network using Meraki or Cisco DNA Center

 

4.0 Application Deployment and Security

4.1 Describe benefits of edge computing

4.2 Identify attributes of different application deployment models (private cloud, public cloud, hybrid cloud, and edge)

4.3 Identify the attributes of these application deployment types

4.3.a Virtual machines

4.3.b Bare metal

4.3.c Containers

4.4 Describe components for a CI/CD pipeline in application deployments

4.5 Construct a Python unit test

4.6 Interpret contents of a Dockerfile

4.7 Utilize Docker images in a local developer environment

4.8 Identify application security issues related to secret protection, encryption (storage and transport), and data handling

4.9 Explain how firewall, DNS, load balancers, and reverse proxy in application deployment

4.10 Describe top OWASP threats (such as XSS, SQL injections, and CSRF)

4.11 Utilize Bash commands (file management, directory navigation, and environmental variables)

4.12 Identify the principles of DevOps practices

5.0 Infrastructure and Automation

5.1 Describe the value of model-driven programmability for infrastructure automation

5.2 Compare controller-level to device-level management

5.3 Describe the use and roles of network simulation and test tools (such as VIRL and pyATS)

5.4 Describe the components and benefits of CI/CD pipeline in infrastructure automation

5.5 Describe principles of infrastructure as code

5.6 Describe the capabilities of automation tools such as Ansible, Puppet, Chef, and Cisco NSO

5.7 Identify the workflow being automated by a Python script that uses Cisco APIs including ACI, Meraki, Cisco DNA Center, or RESTCONF

5.8 Identify the workflow being automated by an Ansible playbook (management packages, user management related to services, basic service configuration, and start/stop)

5.9 Identify the workflow being automated by a bash script (such as file management, app install, user management, directory navigation)

5.10 Interpret the results of a RESTCONF or NETCONF query

5.11 Interpret basic YANG models

5.12 Interpret a unified diff

5.13 Describe the principles and benefits of a code review process

5.14 Interpret sequence diagram that includes API calls

6.0 Network Fundamentals

6.1 Describe the purpose and usage of MAC addresses and VLANs

6.2 Describe the purpose and usage of IP addresses, routes, subnet mask/prefix, and gateways

6.3 Describe the function of common networking components (such as switches, routers, firewalls, and load balancers)

6.4 Interpret a basic network topology diagram with elements such as switches, routers, firewalls, load balancers, and port values

6.5 Describe the function of management, data, and control planes in a network device

6.6 Describe the functionality of these IP Services: DHCP, DNS, NAT, SNMP, NTP

6.7 Recognize common protocol port values (such as SSH, Telnet, HTTP, HTTPS, and NETCONF)

6.8 Identify cause of application connectivity issues (NAT problem, Transport Port blocked, proxy, and VPN)

6.9 Explain the impacts of network constraints on applications

PREREQUISITES

  • It is recommended to have had hands-on experience with a programming language (specifically Python).

Attendees will learn how to implement network applications using Cisco platforms as a base, from initial software design to diverse system integration, as well as testing and deployment automation.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that want to take a further step forward in their DevNet Career Path after attending the Fundamentals Bootcamp.

WHAT YOU WILL LEARN

  • Attendees will learn how to implement network applications using Cisco platforms as a base, from initial software design to diverse system integration, as well as testing and deployment automation.

COURSE OUTLINE

  • Designing for Maintainability
  • Implementing ChatOps Application
  • Describing Advanced REST API Integration
  • Automating Application-Release
  • Deploying Applications
  • Understanding Distributed Systems
  • Orchestrating Network and Infrastructure
  • Modeling Data with YANG

PREREQUISITES

  • It is recommended to attend DevNet Fundamentals Bootcamp.

Attendees will learn how to automate application deployment, enable automated configuration, enhance management, and improve the scalability of cloud microservices and infrastructure processes on Cisco platforms, etc.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that want to take a further step forward in their DevNet Career Path after attending the DEVCOR Bootcamp.

WHAT YOU WILLL LEARN

  • Attendees will learn how to automate application deployment, enable automated configuration, enhance management, and improve the scalability of cloud microservices and infrastructure processes on Cisco platforms as well as learn how to integrate Docker and Kubernetes to create advanced capabilities and flexibility in application deployment.

COURSE OUTLINE

  • Introducing the DevOps Model
  • Introducing Containers
  • Packaging an Application Using Docker
  • Deploying a Multitier Application
  • Introducing CI/CD
  • Building the DevOps Flow
  • Validating the Application Build Process
  • Building an Improved Deployment Flow
  • Extending DevOps Practices to the Entire Infrastructure
  • Implementing On-Demand Test Environments at the Infrastructure Level
  • Monitoring in NetDevOps
  • Engineering for Visibility and Stability
  • Securing DevOps Workflows
  • Exploring Multicloud Strategies
  • Examining Application and Deployment Architectures
  • Describing Kubernetes
  • Integrating Multiple Data Center Deployments with Kubernetes
  • Monitoring and Logging in Kubernetes

PREREQUISITES

  • It is recommended to attend the DEVCOR Bootcamp.

Attendees will commence developing Internet of Things (IoT) applications for Cisco IoT edge compute and network architecture and will learn how to implement and deploy Cisco IOx applications using Cisco Field Network Director and Cisco Kinetic.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers with great skills in DevNet that want to learn how to apply them to the IoT world.

WHAT YOU WILL LEARN

  • Attendees will commence developing Internet of Things (IoT) applications for Cisco IoT edge compute and network architecture and will learn how to implement and deploy Cisco IOx applications using Cisco Field Network Director and Cisco Kinetic.

COURSE OUTLINE

Defining Cisco IoT

  • Describe Cisco IoT and the motivations behind it, as well common standards and protocols used in IoT and Cisco IoT

IoT Networking and Other Devices

  • List common devices used with Cisco IoT

Examining IoT Protocols

  • List the common protocols used with IoT

Examining IoT Standards

  • Describe Cisco IoT common standards and protocols used in Cisco IoT

Recognizing Cisco IoT Needs and Solutions

  • Describe the fundamentals of Cisco IoT operations

Using Programmability with Cisco IoT

  • Explain how programmability can be used to automate and make operations, deployment, and support of Cisco IoT more effective

Describing Cisco IoT Applications

  • Describe common Cisco IoT applications and how they apply to Cisco IoT use cases

Defining Cisco Security Applications

  • Describe Cisco security applications that form a foundation for Cisco IoT security design considerations

PREREQUISITES

  • It is recommended to attend the DEVCOR Bootcamp.

Attendees will learn how to implement Cisco Data Center automated solutions including programming concepts, orchestration, and automation tools.

  • Training Duration: 4 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that want to apply their DevNet knowledge into the Data Center world.

WHAT YOU WILL LEARN

  • Attendees will learn how to implement Cisco Data Center automated solutions including programming concepts, orchestration, and automation tools.

COURSE OUTLINE

  • Describing the Cisco ACI Policy Model
  • Describing the Cisco APIC REST API
  • Using Python to Interact with the ACI REST API
  • Using Ansible to Automate Cisco ACI
  • Describing Cisco ACI Apps Center and Kubernetes Integration
  • Introducing Cisco NX-OS Programmability
  • Describing Day-Zero Provisioning with Cisco NX-OS
  • Implementing On-Box Programmability and Automation with Cisco NX-OS
  • Implementing Off-Box Programmability and Automation with Cisco NX-OS
  • Understanding Model-Driven Telemetry
  • Automating Cisco UCS Using Developer Tools
  • Implementing Workflows Using Cisco UCS Director
  • Describing Cisco DCNM
  • Describing Cisco Intersight

PREREQUISITES

  • It is recommended to have good knowledge of Data Center and DevNet solutions.

Attendees will learn how to implement and support automation solutions in Service Provider network infrastructure, using network programmability principles, protocols, tools, and mechanisms.

  • Training Duration: 4 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that want to apply their Devnet knowledge into the Service Provider world.

WHAT YOU WILL LEARN

  • Attendees will learn how to implement and support automation solutions in Service Provider network infrastructure, using network programmability principles, protocols, tools, and mechanisms.

COURSE OUTLINE

Implementing Network Device Programmability Interfaces

  • Implement NETCONF Protocol
  • Implement RESTCONF Protocol

Implementing Model-Driven Programmability

  • YANG Data Models
  • YANG Tools
  • YANG Development Kit

Implementing Model-Driven Telemetry

  • Implementing Model-Driven Telemetry with gRPC
  • Implementing Model-Driven Telemetry with gNMI

Automating Service Provider Network Traffic with Cisco XTC

  • Cisco XTC Fundamentals
  • Configure Cisco XTC

Automating Networks with Tools That Utilize SSH

  • Implement Device Configurations with Python Netmiko Library
  • Implement Device Configurations with Ansible Playbooks

Orchestrating Network Services with Cisco NSO

  • Cisco NSO Fundamentals
  • Cisco NSO Device Manager
  • Cisco NSO Services
  • Implement Device Configurations with Python

Automating Virtualized Resources with Cisco Elastic Services Controller

  • Cisco ESC Architecture
  • Cisco ESC Resource Management

Automating the WAN with Cisco WAE

  • Describe the Cisco WAE Components

PREREQUISITES

It is recommended to attend the following bootcamps: DevNet Fundamentals, Introduction to NSO and WAE

Attendees will learn how to design advanced automated security solutions for their networks.

  • Training Duration: 4 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that want to apply their DevNet knowledge into the Security world.

WHAT YOU WILL LEARN

  • Attendees will learn how to design advanced automated security solutions for their networks.

COURSE OUTLINE

  • Introducing Cisco Security APIs
  • Consuming Cisco Advanced Malware Protection APIs
  • Using Cisco ISE
  • Using Cisco pxGrid APIs
  • Using Cisco Threat Grid APIs
  • Investigating Cisco Umbrella Security Data Programmatically
  • Exploring Cisco Umbrella Reporting and Enforcement APIs
  • Automating Security with Cisco Firepower APIs
  • Operationalizing Cisco Stealthwatch and the API Capabilities
  • Using Cisco Stealthwatch Cloud APIs
  • Describing Cisco Security Management Appliance APIs

PREREQUISITES

  • It is recommended to attend DevNet Bootcamp and have good knowledge of Cisco AMP, ISE, Umbrella, Firepower solutions.

AWS

Beyond the basics of AWS is a world of solution-centered architecture.

Attendees will learn how to recognize terminology and concepts as they relate to the AWS platform.

  • Training Duration: 1 DAY
  • Delivery: Online

WHO SHOULD ATTEND

  • Individuals responsible for articulating the technical benefits of AWS services to customers or who are interested in simply learning how to get started with using AWS.
  • SysOps Administrators, Solution Architects, and developers interested in utilizing AWS services.

WHAT YOU WILL LEARN

  • Attendees will learn how to recognize terminology and concepts as they relate to the AWS platform. How to differentiate between the AWS storage options and how to create an Amazon Simple Storage Service (S3) bucket. How to recognize AWS Compute and Networking options and use Amazon Elastic Compute Cloud (EC2) and Amazon Elastic Block Storage (EBS).
  • To be able to describe Managed Services and Database Options plus how to Identify Deployment and Management options.

COURSE OUTLINE

  • Module 1: Introduction & History to AWS
    • Navigate the AWS Management Console
    • Recognize AWS Global Infrastructure
    • Describe the security measures AWS provides
  • Module 2: AWS Storage & Content Delivery
    • Identify key AWS storage options
    • Describe Amazon EBS
    • Create an Amazon S3 bucket and manage associated objects
  • Module 3: Compute Services & Networking
    • Identify the different AWS compute and networking options
    • Describe an Amazon Virtual Private Cloud (VPC)
    • Create an Amazon EC2 instance
    • Verify how to use Amazon EBS
  • Module 4: AWS Managed Services & Database
    • Describe Amazon DynamoDB
    • Verify key aspects of Amazon RDS
    • Execute an Amazon RDS drive application
  • Module 5: Deployment and Management
    • Identify AWS CloudFormation
    • Describe Amazon CloudWatch metrics and alarms
    • Describe Amazon Identity and Access Management (IAM)

PREREQUISITES

There are no prerequisites for this course.

Attendees will learn how to make architectural decisions based on AWS architectural principles and best practices.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Solutions Architects and any IT/Cloud engineers who are new to designing and building cloud architectures. Data Center Architects who are migrating from an on-premises environment to cloud architectures.

WHAT YOU WILL LEARN

  • Attendees will learn how to make architectural decisions based on AWS architectural principles and best practices. How to use AWS services to make your infrastructure scalable, reliable, and highly available. How to Use AWS Managed Services to enable greater flexibility and resiliency in an infrastructure.
  • How to Make an AWS-based infrastructure more efficient to increase performance and reduce costs as well as how to use the Well-Architected Framework to improve architectures with AWS solutions.

COURSE OUTLINE

  • The Well-Architected Framework
  • Networking with AWS
  • Core AWS concepts, knowledge, and services, including designing your environment and making your environment highly available
  • Event-driven scaling
  • Automation
  • Decoupling
  • Building for resilience
  • Optimization
  • Serverless designs
  • Data security
  • Advance networking topics
  • Migration
  • How to grow your architecture from small to extremely large

PREREQUISITES

  • To understand AWS cloud computing, which can be learned in AWS Technical Essentials. To have some familiarity with TCP/IP networking concepts such as VPNs, routing, subnets/gateways, and user permissions. Basic knowledge of multi-tier architectures and distributed systems.

Attendees will learn how to make architectural decisions based on AWS architectural principles and best practices.

  • Training Duration: 3 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Solutions Architects and Solution Design Engineers seeking to gain further in-depth knowledge of AWS architectural principles and best practices.

WHAT YOU WILL LEARN

  • Attendees will learn how to make architectural decisions based on AWS architectural principles and best practices. How to demonstrate basic knowledge of best security practices when using AWS. How to leverage AWS services to make your servers scalable.
  • How to create a cloud migration roadmap as well as a business continuity plan and achieve High Availability.

COURSE OUTLINE

  • Leveraging Global Infrastructure
  • Extending On-Premises into the Cloud
  • Computing in the Cloud
  • Designing Storage Subsystems
  • Distributed Environments
  • Choosing a Datastore
  • Designing Web-Scale Media Hosting
  • Event-Driven Scaling
  • Infrastructure as Code
  • Orchestrating Batch Processing
  • Reviewing Large Scale Design Patterns
  • Designing for Cost
  • Planning for High Availability and Disaster Recovery

PREREQUISITES

  • It is highly recommended to have attended the AWS Technical Essentials course (AWS ESS).

Attendees will learn how to build more complex solutions with Amazon Virtual Private Cloud (Amazon VPC), Leverage bootstrapping and auto-configuration in your designs, architect solutions with multiple regions, plus learn when and how to use Availability Zones for high availability and fault tolerance.

  • Training Duration: 3 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Systems Engineers and Developers who are responsible for designing and implementing advanced architectures on AWS. Individuals who are responsible for designing cloud infrastructure and reference architectures.

WHAT YOU WILL LEARN

  • Attendees will learn how to build more complex solutions with Amazon Virtual Private Cloud (Amazon VPC), Leverage bootstrapping and auto-configuration in your designs, architect solutions with multiple regions, plus learn when and how to use Availability Zones for high availability and fault tolerance.
  • Employ Auto Scaling design patterns, become familiar with caching techniques using Amazon CloudFront plus become familiar with big data services including AWS Data Pipeline, Amazon Redshift, and Amazon Elastic MapReduce. Plan for application management services including AWS Elastic Beanstalk and AWS OpsWorks and also improve security with AWS Identity and Access Management (IAM).

COURSE OUTLINE

  • Course Overview
  • Architecting with Amazon VPC
  • High availability and Amazon VPC
  • Designing networks with AWS CloudFormation
  • Building architectures with bootstrapping and auto-configuration
  • Planning for Big Data
  • Managing your storage lifecycle
  • Applying concepts: building a multi-region network
  • Applying security principles with Amazon IAM
  • Leveraging Amazon CloudSearch
  • Amazon CloudFront and caching
  • Example walkthrough: SharePoint Server Farm

PREREQUISITES

It is recommended to have knowledge of architectural design, cloud computing concepts plus some experience with core AWS products and services, such as Amazon EC2, Amazon S3, and/or Amazon RDS.

Attendees will learn what the cloud is and how it works a detailed overview of cloud concepts, AWS services, security, architecture, pricing, and support.

  • Training Duration: 1 Day
  • Delivery: Online

WHO SHOULD ATTEND

  • This course is designed for individuals who want to have an overall understanding of AWS Cloud and is primarily for aimed for non-technical people in support functions including legal, marketing, finance, business analysts and project managers.

WHAT YOU WILL LEARN

  • Attendees will learn what the cloud is and how it works a detailed overview of cloud concepts, AWS services, security, architecture, pricing, and support.

COURSE OUTLINE

  • Define what the cloud is and how it works
  • Differentiate between cloud computing and deployment models
  • Describe the AWS Cloud value proposition
  • Describe the basic global infrastructure of the cloud
  • Compare the different methods of interacting with AWS
  • Describe and differentiate between AWS service domains
  • Given a scenario, identify an appropriate solution using AWS Cloud services
  • Describe the Well-Architected Framework
  • Describe basic AWS Cloud architectural principles
  • Explain the Shared Responsibility model
  • Describe security services with the AWS cloud
  • Define the billing, account management, and pricing models for the AWS platform
  • Identify future services and developments built on the cloud

PREREQUISITES

  • Basic understanding of IT.

DATA CENTERS

In-depth learning of the fundamentals, policies, hyper-convergence, security challenges, etc

Attendees will learn how Cisco ACI Fabric Infrastructure works, how is the Cisco ACI policy model logical built, the Cisco ACI basic packet forwarding, how the external network connectivity works, etc.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that require the knowledge and skills to configure and manage the Cisco Nexus 9000 Series Switches in ACI mode, how to connect the Cisco ACI fabric to external networks and services, and fundamentals of Virtual Machine Manager (VMM) integration.

WHAT YOU WILL LEARN

  • Attendees will learn how Cisco ACI Fabric Infrastructure works, how is the Cisco ACI policy model logical built, the Cisco ACI basic packet forwarding, how the external network connectivity works, the VMM integration, understanding Layer 4 to Layer 7 integrations and to know about the main Cisco ACI management features.

COURSE OUTLINE

  • Introducing Cisco ACI Fabric Infrastructure and Basic Concepts
    • What Is Cisco ACI?
    • Cisco ACI Topology and Hardware
    • Cisco ACI Object Model
    • Faults, Event Record, and Audit Log
    • Cisco ACI Fabric Discovery
    • Cisco ACI Access Policies
  • Describing Cisco ACI Policy Model Logical Constructs
    • Cisco ACI Logical Constructs
    • Tenant
    • Virtual Routing and Forwarding
    • Bridge Domain
    • Endpoint Group
    • Application Profile
    • Tenant Components Review
    • Adding Bare-Metal Servers to Endpoint Groups
    • Contracts
  • Describing Cisco ACI Basic Packet Forwarding
    • Endpoint Learning
    • Basic Bridge Domain Configuration
  • Introducing External Network Connectivity
    • Cisco ACI External Connectivity Options
    • External Layer 2 Network Connectivity
    • External Layer 3 Network Connectivity
  • Introducing VMM Integration
    • VMware vCenter VDS Integration
    • Resolution Immediacy in VMM
    • Alternative VMM Integrations
  • Describing Layer 4 to Layer 7 Integrations
    • Service Appliance Insertion Without ACI L4-L7 Service Graph
    • Service Appliance Insertion via ACI L4-L7 Service Graph
    • Service Graph Configuration Workflow
    • Service Graph PBR Introduction
  • Explaining Cisco ACI Management
    • Out-of-Band Management
    • In-Band Management
    • Syslog
    • Simple Network Management Protocol
    • Configuration Backup
    • Authentication, Authorization, and Accounting
    • Role-Based Access Control
    • Cisco ACI Upgrade
    • Collect Tech Support

PREREQUISITES

  • It is recommended to know the foundations of Cisco Data Centers.

Attendees will learn how Cisco ACI advanced fabric packet forwarding works, advanced ACI policy, and tenant configuration, Cisco ACI Multi-Pod deployment, etc.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that require advanced knowledge of how to configure and manage the Cisco Nexus 9000 Series Switches in ACI mode, providing enhanced management and policy framework, along with the protocols used in the underlying fabric.

WHAT YOU WILL LEARN

  • Attendees will learn how Cisco ACI advanced fabric packet forwarding works, advanced ACI policy, and tenant configuration, Cisco ACI Multi-Pod deployment, how to implement and integrate the traditional network with Cisco ACI, details of Cisco ACI Service Graph Policy-Based Redirect (PBR) and Cisco ACI Multi-Site deployment.

COURSE OUTLINE

  • Cisco ACI Advanced Packet Forwarding
    • Packet Forwarding Between Leaf Switches
    • Endpoint Learning
    • Network Interface Card (NIC) Teaming to ACI Fabric
    • Endpoint Learning Optimizations
    • Endpoint Loop Protection
    • Rogue Endpoint Control
  • Using Advanced Cisco ACI Policy and Tenant Configuration
    • Layer 3 Outside Transit Routing
    • Using Tenant Common for Shared Services
    • Using Virtual Routing and Forwarding (VRF) Route Leaking for Shared Services
    • Using Layer 3 Outside configuration policy (L3Out) VRF Route Leaking for Shared Services
    • Detailed Contract Architecture with pcTag
    • Contract with vzAny
    • Contract Preferred Group
  • Implementing Traditional Network in Cisco ACI
    • Integrating Switched Network with Cisco ACI
    • Migrating Existing Switched Network to Cisco ACI
    • Network- vs. Application-Centric Deployment Models
  • Cisco ACI Service Graph PBR
    • Service Graph PBR Overview
    • PBR End-to-End Packet Flow
    • Service Graph PBR Requirements and Topologies
    • Service Graph PBR Tracking Options
  • Cisco ACI Multi-Pod Deployment
    • Cisco ACI Multi-Pod Overview
    • Inter-Pod Network Overview
    • Multi-Pod Provisioning and Packet Flow Between Pods
    • Connectivity to External L3 Networks
    • Service Node Integration Considerations
    • Service Graph Considerations
  • Cisco ACI Multi-Site Deployment
    • Cisco ACI Multi-Site Overview
    • Cisco ACI Multi-Site Orchestrator
    • Inter-Site Network Overview
    • Tenant Configuration Deployment from Multi-Site Orchestrator (MSO)
    • Packet Flow Between Sites
    • Multi-Site Stretched Components
    • Multi-Site vs Multi-Pod Comparison

PREREQUISITES

  • It is highly recommended to attend the ACI Fundamentals Bootcamp.

Attendees will learn how to review and verify basic connectivity to the Cisco Application Policy Infrastructure Controller (APIC), explain Cisco APIC and its monitoring, management, and troubleshooting aspects, etc.

  • Training Duration: 4 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that need to know the key components and procedures to manage, monitor, and troubleshoot the Cisco Nexus 9000 Series Switches in Application Centric Infrastructure (ACI) mode, a solution to simplify, optimize, and accelerate infrastructure deployment.

WHAT YOU WILL LEARN

  • Attendees will learn how to review and verify basic connectivity to the Cisco Application Policy Infrastructure Controller (APIC), explain Cisco APIC and its monitoring, management, and troubleshooting aspects, describe Cisco Network Assurance and Cisco Network Insights and how to use them to improve operational efficiency and finally, how to avoid common mistakes and recognize common symptoms.

COURSE OUTLINE

  • Cisco ACI Day-2 Operations
    • Management Information Tree
    • Cisco ACI APIC and Built-In Tools
  • Day-2 Operational Challenges
    • Day-2 Challenges and Solutions
  • Introducing Cisco Network Assurance Engine (NAE)
    • Overview of Cisco Network Assurance Engine
    • Components of Cisco NAE
  • Introducing Cisco Network Insights
    • Introducing Cisco Network Insights Advisor
    • Introducing Cisco Network Insights Resources
  • Cisco ACI Fabric Operation and Forwarding
    • Virtual Extensible LAN Basics
    • Cisco ACI Initial Configuration Overview
  • Cisco ACI Troubleshooting Methodology
    • Review of Logical Model
    • Review of Concrete Model
  • Troubleshooting the Logical Model
    • Troubleshooting Logical Model Methodology
  • Troubleshooting the Concrete Model
    • Troubleshooting Concrete Model Methodology
  • Troubleshooting Virtual Machine Manager (VMM) Integration
    • Troubleshooting VMware
    • Verifying Blade Chassis
  • Troubleshooting Layer 4-7 Service Insertion
    • Layer 4-7 Service Graph Overview
    • Device Packages
  • Troubleshooting Layer 2
    • VLAN and Virtual Extensible LAN (VXLAN) Mapping
    • Traffic Flow
  • Troubleshooting Layer 3 Routing
    • Troubleshooting Routing
    • Layer 3 Transit Routing
  • Troubleshooting Contracts and Route Leaking
    • Virtual Routing and Forwarding (VRF)-VRF Contracts and Route Leaking
  • Cisco ACI Best Practices
    • Cisco ACI Naming Conventions
    • Day-0 Configuration

PREREQUISITES

  • It is highly recommended to attend the Advanced ACI Bootcamp.

Attendees will learn how to describe hyper-convergence, Cisco HyperFlex, and the components of Cisco HyperFlex, describe how Cisco HyperFlex Data Platform (HXDP) and HX maintenance mode work, etc.

  • Training Duration: 4 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that need to know how to deploy and use the Cisco HyperFlex data platform to support multi-cloud workloads as well as understand the HyperFlex components and learn how to install, design, manage and troubleshoot Cisco HyperFlex to support highly scalable and resilient multi-cloud implementations.

WHAT YOU WILL LEARN

  • Attendees will learn how to describe hyper-convergence, Cisco HyperFlex, and the components of Cisco HyperFlex, describe how Cisco HyperFlex Data Platform (HXDP) and HX maintenance mode work, describe the physical components of Cisco HyperFlex, install and expand Regular vSphere Cisco HyperFlex, manage vCisco HyperFlex VMware ESXi-based cluster.
  • How to maintain Cisco HyperFlex, design a Cisco HyperFlex solution and explain third-party data restore solutions, protect the data on your Cisco HyperFlex cluster using replication and data at rest encryption, describe an Edge cluster and how is it different from a standard cluster, design a multi-cloud data center with Cisco HyperFlex.

COURSE OUTLINE

  • Introducing Hyperconvergence and Cisco HyperFlex
    • Traditional Data Center Design
    • What Is Hyperconvergence?
    • What Is Cisco HyperFlex?
    • Cisco HyperFlex Primer
    • Evolution of Cisco HyperFlex
  • Describing Cisco UCS: The Foundation of Cisco HyperFlex
    • Cisco Server Deployment Models: Standalone Versus Managed
    • Cisco UCS Managed Model Benefits
    • Cisco UCS M5 Overview
    • Cisco UCS M5 Server Types
    • Cisco Virtual Interface Cards (VICs) and Their Benefits
    • Cisco UCS Fabric Interconnects
    • Cisco UCS Manager
  • Describing Cisco HyperFlex Software Components
    • Virtual Machine Hypervisor
    • Log-Structured File System
    • Cisco HyperFlex Snapshots Versus VMware Snapshots
    • Cisco HyperFlex Versus Regular Virtualized Server
    • Cisco HyperFlex Data Distribution
    • Writing and Reading Process
    • Data Optimization Overview
    • Cisco HyperFlex vs. Other Hyper-Converged Infrastructure (HCI) Solutions
  • Describing Cisco HyperFlex Hardware Components
    • Introducing Cisco HyperFlex Servers
    • Storage Technologies in Cisco HyperFlex
    • Storage Components of Cisco HyperFlex Converged Nodes
    • Non-Storage Components of Cisco HyperFlex Converged Nodes
    • Cisco UCS Fabric Interconnects
    • Compute-Only Nodes
  • Installing and Expanding Standard ESXi Cisco HyperFlex
    • Installation Summary
    • Software Prerequisites
    • Hardware Prerequisites
    • Cisco HyperFlex Networking
    • Required Deployment Information
    • Installing Physical Components
    • Configure Upstream Switches
    • Prepare Fabric Interconnects
    • Deploy the Installer Virtual Machine (VM)
    • HyperFlex Installation
    • Post-Installation Script
    • Cluster Expansion
    • Additional Installation Options
  • Managing Cisco HyperFlex in vSphere Environment
    • Management Interfaces Overview
    • Cisco HyperFlex Plugin for vCenter
    • Cisco HyperFlex Connect
    • Storage Command Line Interface
    • Representational State Transfer (REST) API Overview
    • ReadyClones
    • Cisco HyperFlex Snapshots
  • Maintaining Cisco HyperFlex
    • Cisco HyperFlex Upgrade Overview
    • Cisco HyperFlex Online Upgrade
    • Cisco HyperFlex Offline Upgrade
    • HX Maintenance Mode
    • ESXi Upgrade
    • Moving Cisco HyperFlex Storage Cluster to Another vCenter
  • Designing Cisco HyperFlex
    • Cluster Resiliency: VM-Level
    • Cluster Resiliency: HXDP-Level
    • Cisco HyperFlex Cluster Scalability
    • Cluster Capacity
    • Multiple Clusters on One Cisco UCS Domain
    • Cisco HyperFlex and External Storage
    • Licensing Tiers
    • Smart Licensing
    • Cisco HyperFlex Positioning
    • Graphical Processing Units and Cisco HyperFlex
  • Protecting Your Data
    • Disaster Recovery Overview
    • Third-Party Data Restore Solutions
    • Cisco HyperFlex Native Replication Solution
    • Configuring Native Replication
    • Protecting Your VMs with Native Replication
    • Restoring Your VMs with Native Replication
    • Data at Rest Encryption
    • D@RE: Remote Key Management
  • Introducing Stretched Cluster
    • Stretched Cluster Overview
    • Prerequisites
    • Data Distribution
    • Datastores and VM Affinity
    • Installation Process
    • Maintenance and Monitoring
  • Introducing EDGE Cluster
    • Cisco HyperFlex EDGE Cluster Overview
    • Prerequisites and Recommendations
    • Installation Process
    • Management and Monitoring
    • Upgrades and Maintenance
  • Introducing HyperV-Based Standard Cluster
    • HyperV-Based Standard Cluster Overview
    • Prerequisites and Recommendations
    • Preinstallation Tasks
    • Installation Process
    • Post-Installation Process
    • Maintenance and Monitoring
  • Designing Multicloud Data Center with Cisco HyperFlex
    • Cisco UCS Director Overview
    • Cisco CloudCenter Overview
    • Cisco Workload Optimization Manager (CWOM) Overview
    • Cisco HyperFlex with Kubernetes and Cisco Container Platform
    • Cisco Intersight Overview
    • HyperFlex: Releases Beyond 3.5(1a)
  • Troubleshooting Cisco HyperFlex
    • Troubleshooting Guidelines
    • Generating Tech Support Bundles
    • Common Troubleshooting Issues
  • HyperFlex Case Studies

PREREQUISITES

  • It is highly recommended to have CCNA Data Center level plus to have familiarity with VMware vCenter and EXSi.

Attendees will learn how to implement and use the Cisco Tetration platform to address data center security challenges and provide a secure infrastructure for workload protection, etc.

  • Training Duration: 3 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that need to deploy, use, and operate the Cisco Tetration Analytics platform for comprehensive workload-protection and application and network insights across a multi-cloud infrastructure.

WHAT YOU WILL LEARN

  • Attendees will learn how to implement and use the Cisco Tetration platform to address data center security challenges and provide a secure infrastructure for workload protection, learn how Cisco Tetration Analytics integrates into the intent-based network management automation infrastructure using application security policy and other network policies, learn how the Cisco Tetration big data platform analyses data using unsupervised machine learning and behavior analysis to support application, network, and security use cases.

COURSE OUTLINE

Exploring Cisco Tetration

  • Data Center Challenges
  • Define and Position Cisco Tetration
  • Cisco Tetration Features
  • Cisco Tetration Architecture
  • Cisco Tetration Deployment Models
  • Cisco Tetration GUI Overview

Implementing and Operating Cisco Tetration

  • Explore Data Collection
  • Install the Software Agent
  • Install the Hardware Agent
  • Import Context Data
  • Describe Cisco Tetration Operational Concepts

Examining Cisco Tetration ADM and Application Insight

  • Describe Cisco Tetration Application Insight
  • Perform ADM
  • Interpret ADM Results Application Visibility

Examining Cisco Tetration Intent-Based Networking

  • Describe Intent-Based Policy
  • Examine Policy Features
  • Implement Policies

Enforcing Tetration Policy Pipeline and Compliance

  • Examine Policy Enforcement
  • Implement Application Policy
  • Examine Policy Compliance Verification and Simulation

Examining Tetration Security Use Cases

  • Examine Workload Security
  • Attack Prevention
  • Attack Detection
  • Attack Remediation

Examining IT Operations Use Cases

  • Key Features and IT Operations Use Cases
  • Performing Operations in Neighborhood App-based Use Cases

Examining Platform Enhancement Use Cases

  • Integrations and Advanced Features
  • Third-party Integration Examples
  • Explore Data Platform Capabilities

Exploring Cisco Tetration Analytics Administration

  • Examine User Authentication and Authorization
  • Examine Cluster Management
  • Configure Alerts and Syslog

PREREQUISITES

  • It is recommended to have knowledge of cloud basic networking concepts as well as familiarity with basic Cisco telemetry protocols and Big Data analytics.

SD-WAN

Learn all aspects related to SD-WAN from a different perspectives, as fundamentals and characteristics of SD-WAN solutions, service components, and service attributes.

You will learn all aspects related to SD-WAN from a MEF perspective, as fundamentals and characteristics of SD-WAN solutions, service components, and service attributes.

  • Training Duration: 4 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Networking engineers, service provider architects, and premise technology engineers looking to expand their understanding of SD-WAN and MEF certification.

WHAT YOU WILL LEARN

  • In this MEF-SDWAN Bootcamp, you will learn all aspects related to SD-WAN from a MEF perspective, as fundamentals and characteristics of SD-WAN solutions, service components and service attributes, service assurance of SD-WAN connections, High Availability of SD-WAN Services and applying Policy-based Packet Forwarding for SD-WAN.

COURSE OUTLINE

Module 1 Overview of Basic Networking

  • Network Definitions
    • Node
    • Endpoint
    • Local Area Network (LAN)
    • MAC Address
    • Ethernet
    • Ethernet Frame
    • Virtual Local Area Network (VLAN)
    • IEEE 802.1ad, Q-in-Q
    • Wide Area Network (WAN)
    • Subscriber
    • Service Provider
    • Multiprotocol Label Switching (MPLS)
    • Routing
    • Routing Information Protocol (RIP)
    • Border Gateway Protocol (BGP)
    • Open Shortest Path First (OSPF)
    • Intermediate System – Intermediate System (IS-IS)
    • Source Packet Routing in Networking (SPRING)/Segmented Routing (SR)
  • Network Robustness
    • Bidirectional Forwarding Detection (BFD)
    • Fast Reroute (FRR)
  • Network Failures and Performance Issues
    • Two-Way Active Measurement Protocol (TWAMP)
    • Simple Network Message Protocol (SNMP)
    • Internet Control Message Protocol (ICMP)
    • Internet Control Message Protocol for IPv6 (ICMPv6)
    • Ping
    • Ping6
    • Traceroute
    • Traceroute6
  • Traffic Addresses
    • Internet Protocol version 4 (IPv4)
    • IPv4 Address
    • Classless Inter-Domain Routing (CIDR)
    • Dynamic Host Configuration Protocol (DHCP)
    • Internet Protocol version 5 (IPv5)
    • Internet Protocol version 6 (IPv6)
    • IPv6 Packet
    • Stateless Address Auto Configuration (SLAAC)

Module 2 Assessing, Planning, and Designing

  • Characteristics and Benefits of an SD-WAN Service
  • SD-WAN Components
    • SD-WAN UNI
    • Underlay Connectivity Services (UCS)
    • Tunnel Virtual Connection (TVC)
    • SD-WAN Virtual Connection (SWVC)
    • SD-WAN Virtual Connection Endpoint
    • SD-WAN Edge
  • Internet Breakout
  • SWVC Service Attributes
    • SWVC Identifier Service Attribute
    • SWVC End Point List Service Attribute
    • Service Uptime Objective Service Attribute
    • SWVC Reserved Prefixes Service Attribute
    • SWVC List of Policies Service Attribute
    • SWVC List of Application Flow Groups Service Attribute
    • SWVC List of Application Flows Service Attribute
    • Application Flow Groups and Policies
  • SWVC End Point Service Attributes
    • SWVC End Point Identifier Service Attribute
    • SWVC End Point Policy Map Service Attribute
  • SD-WAN UNI Service Attributes
    • SD-WAN UNI Identifier Service Attribute
    • SD-WAN UNI L2 Interface Service Attribute
    • SD-WAN UNI L2 Maximum Frame Size Service Attribute
    • SD-WAN UNI IPv4 Connection Addressing Service Attribute
    • SD-WAN UNI IPv6 Connection Addressing Service Attribute
    • SD-WAN UNI Example Scenario
  • Application Flows and Groups
  • Policies
    • Policy Criteria
  • Legacy Migration to SD-WAN
    • SOHO or Small Office Branch Type
    • Medium or Larger Offices Branch Type
    • SD-WAN Use Policies
  • Designing and Planning Scenarios

Module 3 Underlay Connectivity Services

  • Types of Underlay Connectivity Services
  • Characteristics of Underlay Connectivity Services
    • Carrier Ethernet Services
    • IP Services
    • L1 Connectivity Services
    • Public Internet
  • Access Methods for Underlay Connectivity Services
    • Copper Access / DSL
    • Synchronous Optical Network (SONET) / Synchronous Digital Hierarchy (SDH)
    • Fiber Access
    • HFC / DOCSIS
    • Packet Radio Access
    • Passive Optical Network
    • PDH Access
    • LTE
  • Public versus Private
    • Private UCS
    • Public UCS
    • Backup UCS
  • Traffic Requirements and Allocation of Bandwidth across Multiple Underlay Connectivity Services
    • Allocation of Bandwidth
    • BANDWIDTH Policy Effect on Packets
    • BANDWIDTH Policy Application
  • UCS Scenarios

Module 4 SD-WAN Components

  • Using an SD-WAN Gateway to Interconnect an SD-WAN Service to an External Service
    • Defining an SD-WAN Gateway
    • SD-WAN Gateway Use Case
  • Defining the SD-WAN Controller and SD-WAN Orchestrator
    • SD-WAN Controller
    • SD-WAN Service Orchestrator
  • Challenge Questions

Appendix A – Understanding the Basic Structure of the LSO API

  • Benefits of LSO API
  • LSOs with existing SDKs
  • LSOs without SDKs

 

Module 5 SD-WAN Security

  • Security
    • End-to-End Encryption
    • Security in the SD-WAN Context
  • Firewall Usage With SD-WAN
    • Firewalls
    • Firewalls in SD-WAN Context
  • Security Protocols
    • Transport Layer Security (TLS)
    • Secure Sockets Layer (SSL)
    • Internet Protocol Security (IPSec)
  • Encryption
    • IPSec Cryptographic Algorithms
    • WireGuard

Security Scenarios

PREREQUISITES

  • It is recommended to have a basic understanding of L2 switching and L3 routing and experience in deployment, design, maintenance and troubleshooting of networks as MPLS and Ethernet.

Understand how to deploy the Cisco SD-WAN solution.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that require a solid knowledge of Cisco SD-Wan as System integrators, Networks Administrators, System Engineers, and Solutions Design Engineers.

WHAT YOU WILL LEARN

  • Understanding of how to deploy the Cisco SD-WAN solution.

COURSE OUTLINE

  • SD-Wan Architecture
  • SD-Wan Deployment
  • SD-Wan Dynamic Routing
  • SD-Wan Policy
  • SD-Wan Interoperability and Migration

PREREQUISITES

  • Engineers that attend this bootcamp should have knowledge of WAN Networks.

Engineers attending this advanced Cisco SD-Wan Bootcamp will learn how to deploy SD-WAN, configure SD-WAN environment, deploy Zero-Touch Provisioning, implement SD-WAN Security, configure SD-WAN Policies, operate SD-WAN Devices and software, and troubleshoot SD-WAN environment.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that require detail and advanced knowledge of Cisco SD-Wan solutions as System integrators, Networks Administrators, System Engineers, and Solutions Design Engineers.

WHAT YOU WILL LEARN

  • Engineers attending this advanced Cisco SD-Wan Bootcamp will learn how to deploy SD-WAN, configure SD-WAN environment, deploy Zero-Touch Provisioning, implement SD-WAN Security, configure SD-WAN Policies, operate SD-WAN Devices and software, and troubleshoot SD-WAN environment.

COURSE OUTLINE

Module 1: Cisco SD-WAN Introduction

  • High-level Cisco SD-WAN Deployment models
  • Application-level SD-WAN solution
  • Cisco SDWAN high availability solution
  • Cisco SD-WAN Scalability
  • Cisco SD-WAN Solution Benefits

Module 2: Cisco SD-WAN Orchestration

  • Introduction
  • vManage NMS
  • vSmart Controller
  • vBond Orchestrator
  • Controller Resiliency Architecture

Module 3: Site Architecture and Deployment Models

  • Site Capabilities
  • vEdge Router
  • vEdge form factors

Module 4: Zero Touch Provisioning

  • Overview
  • User Input Required for the ZTP Automatic Authentication Process
  • Authentication between the vBond Orchestrator and a vEdge Router
  • Authentication between the vEdge Router and the vManage NMS
  • Authentication between the vSmart Controller and the vEdge Router

Module 5: Cisco SD-WAN Solution

  • Overlay Management Protocol (OMP)
  • Cisco SD-WAN Circuit Aggregation Capabilities
  • Secure Connectivity in Cisco SD-WAN
  • Performance Tracking Mechanisms
  • Application Discovery
  • Dynamic Path Selection
  • Performance Based Routing
  • Dynamic Cloud Access

Module 6: Operations Best Practices   

  • Config: Test Configuration Changes Before Committing
  • NAT: Secure Routers Acting as NATs
  • vEdge Routers: Connect to the Console Port
  • vEdge Routers: Use the Poweroff Command
  • SD-WAN Devices: Site ID Naming Conventions
  • SD-WAN Devices: Using the System IP Address
  • vManage NMS: Disaster Recovery

Module 7: Application Monitoring

  • vManage
  • vAnalytics
  • Ecosystem Partner Solutions

Module 8: Troubleshooting Methods   

  • Remote Access
  • Console Access
  • LAN Interfaces
  • WAN Interfaces
  • Control Connections

Module 9: General Troubleshooting

  • Check Application-Aware Routing Traffic
  • Collect Device Data to Send to Customer Support
  • Monitor Alarms and Events
  • Monitor TCP Optimization
  • Ping a SD-WAN Device
  • Run a Traceroute
  • Simulate Flows
  • Troubleshoot Cellular Interfaces
  • Troubleshoot Device Bringup
  • Troubleshoot WiFi Connnections
  • Use Syslog Messages
  • Tunnel Health

Module 10: Troubleshooting: Data Plane Issues     

  • BFD Session Information
  • Cflowd Information
  • Data Policies
  • DPI Information
  • Symptom: Site Cannot Reach Applications in Datacenter
  • Symptom: vManage Showing vEdge or Interface Down
  • Symptom: Site-Wide Loss of Connectivity (Blackout)
  • Symptom: Poor Application Performance (Brownout)
  • Issue Severity Assessment

Module 11: Troubleshooting: Routing Issues

  • BGP Information
  • Multicast Information
  • OMP Information
  • OSPF Information
  • PIM Information
  • Symptom: Some or All Routes Missing from vEdge Routing table
  • Symptom: Data Traffic Using Suboptimal Path
  • Symptom: Data Traffic Not Using All Transports

Module 12: Application-Aware Routing

  • Application Performance with CloudExpress Service
  • Tunnel Latency Statistics
  • Tunnel Loss Statistics

Module 13: Interface Troubleshooting

  • Reset an Interface
  • All Interfaces
  • ARP Table Entries
  • Cellular Interface Information
  • DHCP Server and Interface Information
  • Interface MTU Information
  • Management Interfaces
  • VRRP Information
  • WAN Interfaces

Module 14: Network Operations

  • Check Alarms and Events
  • Check User Accounts and Permissions
  • Deploy the SD-WAN Overlay Network
  • Determine the Status of Network Sites
  • Control Connections
  • Data Connections
  • Network Performance with vAnalytics Platform
  • OMP Status

Module 15: Security Certificate Troubleshooting

  • Generate a Certificate
  • Upload the vEdge Serial Number File
  • Certificate
  • CSR

Module 16: SD-WAN Devices Maintenance

  • Decommission a vEdge Cloud Router
  • Determine the Status of a Network Device
  • Locate a SD-WAN Device
  • Migrate a Controller’s Virtual Machine Using vMotion
  • Reboot a Device
  • Remove a vEdge Router’s Serial Number from the vManage NMS
  • Replace a vEdge Router
  • Restore the vManage NMS
  • Set Up User Accounts to Access SD WAN Devices
  • Validate or Invalidate a vEdge Router
  • Software Versions Installed on a Device
  • Status of a vBond Orchestrator
  • Status of a vEdge Router
  • Status of a vSmart Controller

Module 17: SD-WAN Device Operation and Troubleshooting

  • Determine Changes to a Configuration Template
  • Determine Why a Device Rejects a Template
  • Alarm Severity Levels
  • Hardware Alarms
  • Checking Alarms and Notifications
  • LEDs
  • Additional Information
  • Restore a vEdge Router
  • Remove vEdge Router Components

Module 18: Working With SD-WAN Support     

  • Case Priority Levels and Response Times
  • Information for Opening Cases
  • SD-WAN Customer Support Portal

Other Ways to Contact Support

PREREQUISITES

  • It is highly recommended to attend the 5-day Cisco SD-Wan Foundations course.

Understanding the best practices and case studies of Cisco SD-WAN solution.

  • Training Duration: 3 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Program managers leading SD-WAN Projects and/or involved in SD-WAN Projects and SD-WAN Engineers looking to learn more about best practices in designing SD-WAN networks.

WHAT YOU WILL LEARN

  • Understanding the best practices and case studies of Cisco SD-WAN solution.

COURSE OUTLINE

  • DNA Architecture Overview
  • SD-WAN Solution architecture overview
  • SD-WAN Components
  • SD-WAN Security
  • SD-WAN Design and Positioning
  • SD-WAN Deployment Planning
  • SD-WAN Deployment Steps on Prem
  • SD-WAN DC and Branch Integration design
  • SD-WAN Demos
  • Cisco Virtualization Overview
  • DNA Center Overview
  • What you can deploy with DNA Center
  • SDA Solution architecture overview
  • SDA Components
  • SDA Assurance
  • SDA Security
  • SDA Design and Positioning
  • SDA Deployment Planning
  • SDA Deployment Steps Single and Multi-Sites
  • DNA Center and SDA Demos
  • Integration between SD-WAN and ACI
  • Integration between SD-WAN and SDA
  • WAN Network Migration to SD-WAN
  • Campus Network Migration to SDA

PREREQUISITES

  • Engineers that attend this bootcamp should attend the 5-day Cisco SD-Wan Foundations.

Understanding of how to manage and deploy Cisco SD-Access and Cisco DNA.

  • Training Duration: 5 Days
  • Deilvery: Online

 

WHO SHOULD ATTEND

  • Engineers that require a solid knowledge of Cisco SD-Access and Cisco DNA Solutions.

WHAT YOU WILL LEARN

  • Understanding of how to manage and deploy Cisco SD-Access and Cisco DNA.

COURSE OUTLINE

Module 1: Introduction to Cisco’s Software Defined Access (SD-Access)

  • SD-Access Overview
  • SD-Access Benefits
  • SD-Access Key Concepts
  • SD-Access Main Components
  • Campus Fabric
  • Wired
  • Wireless
  • Nodes
  • Edge
  • Border
  • Control Plane
  • DNA Controller
  • ISE (Policy)
  • NDP (Analytics and Assurance)

 

Module 2: SD-Access Campus Fabric

  • The concept of Fabric
  • Node types
  • Fabric Edge Nodes
  • Control Plane Nodes
  • Border Nodes
  • LISP as protocol for Control Plane
  • VXLAN as protocol for Data Plane
  • Concept of Virtual Network
  • Fabric-enabled WLAN
  • Fabric Enabled WLC
  • Fabric Enabled AP’s

Module 3: DNA Center and Workflow for SD-Access

  • Introduction to DNA Center
  • Workflow for SD-Access in DNA Center
  • Design Step overview
  • Policy Step overview
  • Provision Step overview
  • Assurance Step overview
  • Integration with Cisco ISE for Policy Enforcement
  • Integration with Cisco NDP for Analytics and Assurance
  • Relationship with APIC-EM controller

 

Module 4: DNA Center Workflow First Step – Design

  • Creating Enterprise and Sites Hierarchy
  • Discuss and Demonstrate General Network Settings
  • Loading maps into the GUI
  • IP Address Administration
  • Administering Software Images
  • Network Device Profiles

 

Module 5: DNA Center Workflow Second Step – Policy

  • 2-level Hierarchy
  • Macro Level: Virtual Network (VN)
  • Micro Level: Scalable Group (SG)
  • Policy Types
  • Access Policy
  • Access Control Policy
  • Traffic Copy Policy
  • ISE Integration with DNA Center
  • Cross Domain Policies

 

Module 6: DNA Center Workflow Third Step – Provision

Devices Onboarding

  • Discovering Devices
  • Assigning Devices to a site
  • Provisioning device with profiles

Fabric Domains

  • Understanding Fabric Domains
  • Using Default LAN Fabric Domain
  • Creating Additional Fabric Domains

Adding Nodes

  • Adding Fabric Edge Nodes
  • Adding Control Plane Nodes
  • Adding Border Nodes

 

Module 7: DNA Center Workflow Fourth Step – Assurance

  • Introduction to Analytics
  • NDP Fundamentals
  • Overview of DNA Assurance
  • Components of DNA Assurance
  • DNA Center Assurance Dashboard

 

Module 8: Implementing WLAN in SD-Access Solution

WLAN Integration Strategies in SD-Access Fabric

  • CUWN Wireless Over The Top (OTT)
  • SD-Access Wireless (Fabric enabled WLC and AP)

SD-Access Wireless Architecture

  • Control Plane: LISP and WLC
  • Data Plane: VXLAN
  • Policy Plane and Segmentation: VN and SGT

Sample Design for SD-Access Wireless

 

Module 9: Campus Fabric External Connectivity for SD-Access

  • Enterprise Sample Topology for SD-Access
  • Role of Border Nodes
  • Types of Border Nodes
  • Border
  • Default Border
  • Single Border vs. Multiple Border Designs
  • Collocated Border and Control Plane Nodes

Distributed (separated) Border and Control Plane Nodes

PREREQUISITES

  • Engineers that attend this bootcamp should have a basic understanding of IP / Ethernet networks.

SDN-NFV

Network programmability, SDN architecture and a lot more.

This Network Programmability and Python Bootcamp will explain the foundations of Network Programmability with an overview of Python, approaching the way to read and write Network devices and communicate with them.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • This course is considered a great class to provide a solid foundation in Programming skills that will make Engineers ready to take on more challenging projects and opportunities in Network Programmability.
  • The class will also prepare learners for the NSO class which will utilize Python skills to perform automation with YANG and NETCONF.

WHAT YOU WILL LEARN

  • This Network Programmability and Python Bootcamp will explain the foundations of Network Programmability with an overview of Python, approaching the way to read and write Network devices and communicate with them.
  • Will cover the Data Structure of Python as well as functions and Object-Oriented Programming, composition, and encapsulation.
  • Finally, we will see the relationship of modules and packages, python, data storage, and the process of debugging and logging.

COURSE OUTLINE

  • Network Programmability overview
  • Python Overview
  • Reading and writing Network Device Info
  • Communicating with Network Devices
  • Python Data Structure
  • Conditional, Loops, with, While
  • Functions
  • Object-Oriented Programming
  • Inheritance, Composition, Encapsulation
  • Modules and Packages
  • Python and Data Storage
  • Debugging and Logging

PREREQUISITES

  • No prior experience in Python is required.
  • CCNA level of networking skills is essential.

Attendees of this bootcamp will learn the fundamentals of SDN, Open SDN Solutions as well as commercial solutions and introductions to OpenStack and Network Automation.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that would like to understand SDN architecture and implications in networks of the future.

WHAT YOU WILL LEARN

  • Attendees of this bootcamp will learn the fundamentals of SDN, Open SDN Solutions as well as commercial solutions and introductions to OpenStack and Network Automation.

COURSE OUTLINE

  • Module 1: Introduction to SDN
  • Module 2: SDN Architecture
  • Module 3: Open SDN Solutions
  • Module 4: Commercial SDN Solutions
  • Module 5: Real-World SDN Use Cases
  • Module 6: OpenFlow Fundamentals
  • Module 7: Introduction to OpenStack
  • Module 8: Introduction to Network Automation

PREREQUISITES

  • It is highly recommended to have a CCNA level.

This class is designed to be very practical in nature and aligned with industry best practices. It will provide the theory and practice to enable Engineers to gain essential skills to use in real projects.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers (Design/Support/Pre Sales/Sales) that need to know the basics of a Cisco NSO Solution.

WHAT YOU WILL LEARN

  • This class is designed to be very practical in nature and aligned with industry best practices. It will provide the theory and practice to enable Engineers to gain essential skills to use in real projects.
  • The class will prepare Engineers to take on more challenging tasks and opportunities in real-world projects.
  • This NSO class provides key fundamental skills in YANG and NETCONF which is considered an important skill set in today’s market.

COURSE OUTLINE

  • NSO overview
  • Cisco NSO Architecture
  • NETCONF Overview
  • YANG Overview
  • Using NSO
  • Service Management
  • System Administration
  • System Troubleshooting
  • Alarms and Reporting

PREREQUISITES

  • No prior experience in NSO is required.
  • CCNA level of networking skills is needed.
  • Highly recommend attending the Network Programmability Bootcamp.

This Advanced NSO class provides NSO applications to Service Provider VPN Services as well as Cloud VPN Services, Cloud Service Bundle and other cases studies.

  • Training Duration: 4 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers (Design/Support/Presales/Sales) that want to have a deeper knowledge of the Cisco NSO Solution.

WHAT YOU WILL LEARN

  • This Advanced NSO class provides NSO applications to Service Provider VPN Services as well as Cloud VPN Services, Cloud Service Bundle and other cases studies.

COURSE OUTLINE

  • Part-1: Service Provider VPN Service Design with NSO Overview
    • Service Applications
    • Layer-3 MPLS VPN Service Design
    • P2P L2 VPN Service Design
  • Part-2: Cloud VPN Service Design
    • Cloud VPN
    • Simple Cloud VPN Service Design
    • Service Chaining Design
    • Service Chaining Implementation
  • Part-3:
  • Case Studies

PREREQUISITES

  • Highly recommend attending the Cisco NSO Foundations Bootcamp.

After taking this course, you should be able to define and differentiate between waterfall and agile software development methodologies, understand the role of network automation development environments and associated technologies such as Python virtual environments, and etc.

  • Training Duration: 4 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that want to have a solid foundation in Programming skills that will enable them to take on more challenging projects and opportunities in Network Programmability.

WHAT YOU WILL LEARN

  • After taking this course, you should be able to define and differentiate between waterfall and agile software development methodologies, understand the role of network automation development environments and associated technologies such as Python virtual environments, Vagrant, and Docker, understand and construct HTTP-based API calls to network devices, articulate the differences among and common use cases for XML, JSON, YAML, and protobuf, understand the role YANG plays in network automation, understand that a number of tools exist to simplify working with YANG models, describe the functionality of RESTCONF and NETCONF and the differences between them, construct Ansible playbooks to configure network devices and retrieve operational state data from them and build Jinja2 templates and YAML data structures to generate desired state configurations.

COURSE OUTLINE

  • Examining Network Management and Operations
  • Exploring Software Development Methodologies
  • Using Python for Network Automation
  • Describing NetDevOps: DevOps for Networking
  • Managing Automation Development Environments
  • Introducing HTTP Network APIs
  • Reviewing Data Formats and Data Encoding
  • Using Python Requests to Automate HTTP-Based APIs
  • Exploring YANG
  • Using YANG Tools
  • Automating Model-Driven APIs with Python
  • Introducing Ansible for Network Automation
  • Templating Configurations with Jinja2

PREREQUISITES

It is recommended to attend the Network Programmability Bootcamp

SERVICE PROVIDER CORE

Comprehensive bootcamps to enhance knowledge on all service provider related essentials – from ASR9K, SR, NCS5500, and more.

Attendees will learn the ASR9K family platform, best practice configuration, and Cisco IOSXR main Troubleshooting Processes.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that require detailed knowledge of ASR9K Platform as well as troubleshooting XR.

WHAT YOU WILL LEARN

  • Attendees will learn the ASR9K family platform, best practice configuration, and Cisco IOSXR main Troubleshooting Processes.

COURSE OUTLINE

  • HW-ASR9K review
  • ASR9K Environment
  • Configuration Management
  • Monitoring the Cisco IOS XR Operating System
  • Monitoring Processes
  • Interprocess Communication
  • Error Messages and Core Dumps
  • Cisco IOS XR Packet Forwarding
  • Troubleshooting ASR9K

PREREQUISITES

  • It is recommended to have knowledge of IOS XR.

Attendees will learn detailed fundamentals, configuration, and best practices of OSPFv2, ISIS, and BGP Routing Protocols with Cisco XR.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that require detailed IPv4 XR routing knowledge for OSPF, ISIS, and BGP.

WHAT YOU WILL LEARN

  • Attendees will learn detailed fundamentals, configuration, and best practices of OSPFv2, ISIS, and BGP Routing Protocols with Cisco XR.

COURSE OUTLINE

OSPF Routing IPv4XR

  • Describe fundamental and optional protocol behavior
  • Describe features of OPSFv2 to scale and support large networks
  • Configure and verify operation of OSPFv2 multiarea domain with route summarization
  • Configure route redistribution into OSPFv2 using RPL policies

ISIS Routing IPv4XR

  • Describe fundamental ISIS protocol behavior
  • Identify Cisco IOS XR implementation features that enhance scalability
  • Configure and verify ISIS functionality
  • Implement route redistribution and summarization
  • Use RPL policies with ISIS
  • Examine ISIS operation

BGP Routing IPv4XR

  • eBGP vs iBGP peering
  • Attributes and Best Path Selection Algorithm
  • Route Origination
  • AS-PATH, NEXT-HOP
  • Communities
  • Controlling Outbound Traffic
  • Controlling Inbound Traffic
  • Route Reflectors
  • RPL

PREREQUISITES

  • It is highly recommended to have knowledge of IOS XR.

Attendees will learn the fundamentals, configuration, and best practices of IPv6 Routing Protocols with Cisco XR.

  • Training Duration: 5 Days
  • Delivery: Online

 

WHO SHOULD ATTEND

  • Engineers that need require detailed IPv6 XR routing knowledge for OSPF, ISIS, BGP.

WHAT YOU WILL LEARN

  • Attendees will learn the fundamentals, configuration, and best practices of IPv6 Routing Protocols with Cisco XR.

COURSE OUTLINE

  • Module 1 – IPv6 Foundations Review
  • Module 2 – IPv6 Operation and Configuration
  • Module 3 – OSPFv3 Routing
  • Module 4 – IS-IS Routing for IPv6
  • Module 5 – MP-BGP Routing for IPv6
  • Module 6 – Other IPv6 Routing Protocols
  • Module 7 – IPv6 Provider Edge (6PE
  • Module 8 – IPv6 VPN Provider Edge (6VPE)
  • Module 9 – IPv6 Multicast

PREREQUISITES

  • It is highly recommended to have knowledge of IOS XR.

Attendees will learn all aspects of BGP Protocol as well as best practices.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that require detailed knowledge of BGP Protocol.

WHAT YOU WILL LEARN

  • Attendees will learn all aspects of BGP Protocol as well as best practices.

COURSE OUTLINE

BGP Overview

  • Introducing BGP
  • Understanding BGP Path Attributes
  • Establishing BGP Sessions
  • Processing BGP Routes
  • Configuring Basic BGP
  • Monitoring and Troubleshooting BGP

BGP Transit Autonomous Systems

  • Working with Transit AS
  • Interacting with iBGP and eBGP in Transit AS
  • Forwarding Packets in Transit AS
  • Monitoring and Troubleshooting iBGP in Transit AS

BGP Route Selection Using Policy Controls

  • Using Multihomed BGP Networks
  • Employing AS Path Filters
  • Filtering with Prefix List
  • Using Outbound Route Filtering
  • Applying Route-Maps as BGP Filters
  • Implementing Changes in BGP Policy

BGP Route Selection Using Attributes

  • Influencing BGP Route Selection with Weights
  • Setting BGP Local Preference
  • Using AS Path Prepending
  • Understanding BGP Multi-Exit Discriminators
  • Addressing BGP Communities

Customer-to-Provider Connectivity with BGP

  • Understanding Customer-to-Provider Connectivity Requirements
  • Implementing Customer Connectivity Using Static Routing
  • Connecting a Customer to a Single Service Provider
  • Connecting a Multi-Homed Customer to Multiple Service Providers

 Scaling Service Provider Networks

  • Scaling IGP and BGP in Service Provider Networks
  • Introducing and Designing Route Reflectors
  • Configuring and Monitoring Route Reflectors

PREREQUISITES

  • It is recommended to have IP knowledge.

Attendees will learn all aspects of MPLS, MPLS LDP, OAM, L3VPN, L3VPN Intra-AS, L3VPN Inter-AS, L2VPN, and MPLS-TE, as well as troubleshooting.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that require detailed knowledge of MPLS LDP protocol as well as the following applications: L3VPN, Inter-AS, Intra-AS, L2VPN and MPLS-TE.

WHAT YOU WILL LEARN

  • Attendees will learn all aspects of MPLS, MPLS LDP, OAM, L3VPN, L3VPN Intra-AS, L3VPN Inter-AS, L2VPN, and MPLS-TE, as well as troubleshooting.

COURSE OUTLINE

  • Module 1 – MPLS Technology
  • Module 2 – MPLS Operations, Administration, and Management (OAM)
  • Module 3 – MPLS Label Distribution Protocol (LDP)
  • Module 4 – Layer 3 Virtual Private Networks (L3VPN)
  • Module 5 – Intra-AS L3VPN
  • Module 6 – Inter-AS L3VPNs
  • Module 7 – Layer 2 Virtual Private Networks (L2VPN)
  • Module 8 – MPLS Traffic Engineering (MPLS-TE)

PREREQUISITES

  • It is highly recommended to have knowledge of IOS XR.

Attendees will learn about the ASR1K family platform as well as IOS XE used in this platform.

  • Training Duration: 3 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that require detailed knowledge of the ASR1K Platform.

WHAT YOU WILL LEARN

  • Attendees will learn about the ASR1K family platform as well as IOS XE used in this platform.

COURSE OUTLINE

Cisco ASR1K Platform

  • Basic features of ASR1K hardware and software architectures
  • Describe the types of ASR1K Series Chassis
  • Discuss the benefits of ASR1K Series operating system
  • Describe the features of ASR1K Series in Enterprise and Service Provider

Software Architecture

  • Describe the IOS XE Software components
  • Describe the benefits of the IOS XE Software

ASR1K Series Routers Hardware Architecture

  • Describe ASR1K Series hardware
  • Discuss ASR1K Series data path and control path
  • Discuss ASR1K Series packet flows

ASR1K Software Basics

  • List the three main components of Cisco IOS XE Software
  • List where the software components reside on the ASR1K hardware
  • Explain how the forwarding control plane works in ASR1K
  • Describe how chassis management and OIR messages are communicated in ASR1

ASR1K Series Routers Operation

  • Explain the ASR1K Series boot process
  • Describe connection methods to ASR1K
  • Use show commands to monitor ASR1K basic operations

Monitoring Cisco ASR1K

  • Describe the file system used on ASR1K
  • List commands to monitor ASR1K

ASR1K Series Routers High Availability

  • Describe the functionality of High Availability in ASR1K Series Routers
  • Discuss the system behavior if hardware failures occur
  • Describe the High Availability software differences between the ASR1K chassis

ASR1K Multicast Services

ASR1K Security Services

ASR1K Packet Flow and Troubleshooting

PREREQUISITES

  • It is highly recommended to have knowledge of IOS XE.

Attendees will learn the ASR903 platform as well as IOS XE used in this platform.

  • Training Duration: 3 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that require detailed knowledge of the ASR903 Platform.

WHAT YOU WILL LEARN

  • Attendees will learn the ASR903 platform as well as IOS XE used in this platform.

COURSE OUTLINE

  • ASR 903 Features
  • ASR 903 HW
  • ASR 903 SW
  • ASR 903 Basic Operations
  • ASR 903 High Availability
  • ASR 903 Ethernet
  • QoS ON ASR 903 Router

PREREQUISITES

  • It is recommended to have knowledge of IOS XE.

Attendees will learn how to configure the Catalyst 9800, migrate, and troubleshoot Catalyst 9800, plus be able to discuss Wi-Fi 6.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that require in-depth knowledge of Catalyst 9800, configuration, and troubleshooting.

WHAT YOU WILL LEARN

  • Attendees will learn how to configure the Catalyst 9800, migrate, and troubleshoot Catalyst 9800, plus be able to discuss Wi-Fi 6.

COURSE OUTLINE

  • Introducing new Cat9800 IOS-XE
  • Introducing Cat9800-CL
  • Cat9800 Configuration Model

Advanced Setup:

  • Flexconnect Configuration
  • Cat9800 Design Considerations and Use Cases
  • Cat9800 HA Configuration
  • Security Features

Smart License

Full Smart License

Migration tools

Cat9800 Troubleshooting

  • C9800 general architecture
  • IOS-XE logging architecture
  • Logging features and techniques
  • Packet captures and tracing
  • Useful commands and tools

Cat9800 Best Practices

PREREQUISITES

  • It is highly recommended to have a strong understanding of Wi-Fi technologies.

Attendees will learn how to configure the NCS 5500 router and learn about all the features in XR64-Bit technology.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that require detailed knowledge of the NCS 5500 Router and features of XR64 bits.

WHAT YOU WILL LEARN

  • Attendees will learn how to configure the NCS 5500 router and learn about all the features in XR64-Bit technology.

COURSE OUTLINE

NCS 5500

  • Examine NCS 5500 Series Chassis
  • Examine NCS 5500 Modular Hardware
  • Examine environment Monitoring
  • NCS 5500 Series Boot Process

Cisco IOS XR 64-Bit Architecture and Features

  • Describe Cisco IOS XR 64- bit foundations
  • Describe Cisco IOS XR 64-bit software architecture
    • Introduction to Containers
    • Linux Containers
    • iPXE
    • Automatic Provisioning
    • ZTP
    • Software Packages
    • RPM
    • Disaster Recovery
    • Examine Data Models
    • Implementing Telemetry
    • Exploring Model-Driven Programmability
    • Employing Application Hosting

PREREQUISITES

It is recommended to have knowledge of IOS XR.

Attendees will learn how to configure and verify segment routing within IGP, understand and implement Topology Independent Loop-Free Alternate using segment routing, implement Segment Routing – Traffic Engineering, and implement segment routing within Border Gateway Protocol.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that require a strong knowledge of Segment Routing and how to configure with Cisco IOS XR.

WHAT YOU WILL LEARN

  • Attendees will learn how to configure and verify segment routing within IGP, understand and implement Topology Independent Loop-Free Alternate using segment routing, implement Segment Routing – Traffic Engineering, and implement segment routing within Border Gateway Protocol.

COURSE OUTLINE

Introduction to Segment Routing

  • Introduction
  • Examining Unified Fabric Routing
  • Exploring Segment Routing Concepts
  • Examining Segment Types
  • Examining the Segment Routing Global Block (SRGB)

IGP Segment Routing Implementation and Verification

  • Introduction
  • Examining the IGP Control Plane
  • Examining SRGB and IGP Interactions
  • Examining Prefix and Adjacency SIDs
  • Intermediate System to Intermediate System (IS-IS) Multilevel and Open Shortest Path First (OSPF) Multi-Area
  • Configuring and Verifying IS-IS SR Operation
  • Configuring and Verifying OSPF SR Operation

Segment Routing and LDP Interworking

  • Introduction
  • SR and LDP Interworking Data Plane
  • Mapping Server Function and Configuration
  • Interworking Deployment Models

Topology Independent – Loop-Free Alternate

  • Introduction
  • Examining Classic LFA
  • Examining TI-LFA Fundamentals
  • Implementing and Verifying TI-LFA for SR Traffic
  • Implementing and Verifying SR TI-LFA for LDP Traffic
  • TI-LFA and SR LDP Interworking

Segment Routing Policies – Traffic Engineering (SR-TE)

  • Introduction
  • Exploring SR Policies
  • Anycast and Binding SIDs
  • Enabling and Verifying SR-TE
  • Explicit path SR-TE policies
  • Constrained dynamic path SR-TE policies
  • Instantiating SR Policies
  • Instantiating SR Policies using BGP Dynamic

Multidomain SR Policies

  • Introduction
  • Configuring and Verifying a Path Computation Element (PCE)
  • Configuring and Verifying BGP Link-State (LS)
  • Configuring Multidomain SR Policies with a PCE
  • Configuring Multidomain SR Policies with On Demand Next-Hop (ODN)

BGP Prefix Segment and Egress Peer Engineering

  • Introduction
  • Examining the BGP-based data center
  • Examining the BGP Prefix-SID Operation
  • Configuring and Verifying the BGP Prefix SID
  • Examining Egress Peer Engineering
  • Examining BGP peering segments
  • Configuring and verifying egress peer engineering

PREREQUISITES

  • It is recommended to have some knowledge of IOS XR and MPLS.

Attendees will learn how to use all Cisco Prime tools, manage tasks, devices, and configuration archives, deploy Cisco TrustSec identity services and learn how to track and troubleshoot the network using Cisco Prime solution.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that are required to have strong knowledge of Cisco IP Prime Infrastructure solution.

WHAT YOU WILL LEARN

  • Attendees will learn how to use all Cisco Prime tools, manage tasks, devices, and configuration archives, deploy Cisco TrustSec identity services and learn how to track and troubleshoot the network using Cisco Prime solution.

COURSE OUTLINE

  • Module 1: Cisco Prime Infrastructure Overview
  • Module 2: Inventory Management
  • Module 3: Map the Network
  • Module 4: Configuration Management
  • Module 5: Monitor and Troubleshoot
  • Module 6: System Administration

PREREQUISITES

  • CCNA level of networking skills is recommended.

Attendees will learn the basic knowledge necessary to plan, deploy, configure, and maintain the Cisco WAN Automation Engine solution.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that require a strong knowledge of the Cisco WAN Automation Engine (WAE) solution.

WHAT YOU WILL LEARN

  • Attendees will learn the basic knowledge necessary to plan, deploy, configure, and maintain the Cisco WAN Automation Engine solution.

COURSE OUTLINE

WAE Solution and Architecture Overview

  • Examining WAE
  • Examining WAE Architecture and Design
  • Examining WAE Applications and Use Cases

WAE Solution Implementation

  • Planning a WAE Deployment
  • Deploying WAE
  • Describing WAE Integration Options

Network Model Configuration

  • Describing the Collection Process
  • Describing Network Interface Modules
  • Creating Network Models
  • Configuring WAE Modeling Daemon

WAE Automation Bandwidth Applications

  • Deploying Bandwidth on Demand Application
  • Deploying Bandwidth Optimization Application

WAE Design Fundamentals

  • Getting Started with WAE Design
  • Describing Demands and Traffic Tools
  • Modeling Interior Gateway Protocol (IGP) and BGP
  • Describing Failures and Simulation Analysis

WAE Design Traffic Engineering and Optimization

  • Engineering Traffic by Using Metrics
  • Engineering Traffic by Using Resource Reservation Protocol with Traffic Engineering (RSVP-TE)
  • Engineering Traffic by Using Segment Routing-Traffic Engineering (SR-TE)
  • Engineering Traffic by Using Latency Constraints
  • Modeling Quality of Service (QoS)

Introduction to WAE API

  • Introducing WAE Design Remote Procedure Call (RPC) API
  • Introducing WAE Optimization and Prediction Module (OPM) API
  • Introducing WAE Server Representational State Transfer Configuration Protocol (RESTCONF) and Network Configuration Protocol (NETCONF) APIs
  • WAE Live Deployment
    • Describing the Components of WAE Live
    • Configuring WAE Live
    • Explaining WAE Live Features
  • Maintenance and Troubleshooting
    • Maintaining WAE
    • Troubleshooting WAE

PREREQUISITES

  • It is recommended to have knowledge of routing protocols, MPLS-TE and Linux tools.

Attendees will learn how to successfully deploy, configure, operate, maintain, and support a Cisco XR Broadband Network Gateway (BNG) solution.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that are required to have strong knowledge of the Cisco BNG Solution.

WHAT YOU WILL LEARN

  • Attendees will learn how to successfully deploy, configure, operate, maintain, and support a Cisco XR Broadband Network Gateway (BNG) solution. This course will show you how to implement and verify BNG on a Cisco IOS XR device to manage subscriber access.

COURSE OUTLINE

  • BNG Overview
  • AAA Functions
  • Control Policy Activation
  • Subscriber Sessions
  • QoS Deployment
  • Subscriber Features
  • BNG Geo Redundancy and XML Support

PREREQUISITES

  • It is recommended to have knowledge of IOS XR.

Attendees will learn how to implement and troubleshoot several EVPN technologies, including EVPN native, EVPN VPWS, PBB EVPN, EVPN IRB, and EVPN VXLAN on Cisco XR devices.

  • Training Duration: 4 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers that are required to have strong knowledge of the Cisco XR EVPN solution.

WHAT YOU WILL LEARN

  • Attendees will learn how to implement and troubleshoot several EVPN technologies, including EVPN native, EVPN VPWS, PBB EVPN, EVPN IRB, and EVPN VXLAN on Cisco XR devices.

COURSE OUTLINE

  • Module 1: EVPN Fundamentals
    • Examining Next-Generation Solutions for L2VPN
    • Examining EVPN Terminology and Concepts
    • Examining EVPN Traffic Forwarding
  • Module 2: EVPN Configuration and Verification
  • Implementing EVPN Native
  • Implementing EVPN VPWS
  • Implementing PBB EVPN
  • Implementing EVPN IRB
  • Implementing EVPN-SR DC Fabric
  • Implementing EVPN VXLAN
  • Module 3: EVPN Advanced Features
    • Examining EVPN Advanced Features

PREREQUISITES

  • It is recommended to have knowledge of IOS XR.

Attendees will learn Service Provide technologies including core architecture, services, networking, automation, quality of services, security, and network assurance.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers who want to know how to configure, verify, troubleshoot, and optimize next-generation, Service Provider IP network infrastructures.

WHAT YOU WILL LEARN

  • Attendees will learn Service Provide technologies including core architecture, services, networking, automation, quality of services, security, and network assurance.

COURSE OUTLINE

  • Describing Service Provider Network Architectures
  • Describing Cisco IOS Software Architectures
  • Implementing OSPF
  • Implementing IS-IS
  • Implementing BGP
  • Implementing Route Maps and Routing Protocol for LLN [Low-Power and Lossy Networks]
  • Transitioning to IPv6
  • Implementing High Availability in Networking
  • Implementing MPLS
  • Implementing Cisco MPLS Traffic Engineering
  • Describing Segment Routing
  • Describing VPN Services
  • Configuring L2VPN Services
  • Configuring L3VPN Services
  • Implementing Multicast
  • Describing QoS Architecture
  • Implementing QoS
  • Implementing Control Plane Security
  • Implementing Management Plane Security
  • Implementing Data Plane Security
  • Introducing Network Programmability
  • Implementing Automation and Assurance
  • Introducing Cisco NSO
  • Implementing Virtualization in Service Provider Environments

PREREQUISITES

  • It is recommended to have knowledge of IOS, IOS-XR, IP routing protocols and MPLS technologies.

Attendees will gain strong knowledge and skills for implementing Service Provider core advanced technologies.

  • Training Duration: 5 Days
  • Delivery: Online

 

WHO SHOULD ATTEND

  • Engineers that are required to know how to maintain and operate advanced technologies related to Service Provider core networks.

WHAT YOU WILL LEARN

  • Attendees will gain strong knowledge and skills for implementing Service Provider core advanced technologies.

COURSE OUTLINE

  • Implementing and Verifying Open Shortest Path First Multiarea Networks
  • Implementing and Verifying Intermediate System to Intermediate System Multilevel Networks
  • Introducing Routing Protocol Tools, Route Maps, and Routing Policy Language
  • Implementing Route Redistribution
  • Influencing Border Gateway Protocol Route Selection
  • Scaling BGP in Service Provider Networks
  • Securing BGP in Service Provider Networks
  • Improving BGP Convergence and Implementing Advanced Operations
  • Troubleshooting Routing Protocols
  • Implementing and Verifying MPLS
  • Implementing Cisco MPLS Traffic Engineering
  • Implementing Segment Routing
  • Describing Segment Routing Traffic Engineering (SR TE)
  • Deploying IPv6 Tunneling Mechanisms
  • Implementing IP Multicast Concepts and Technologies
  • Implementing PIM-SM Protocol
  • Implementing PIM-SM Enhancements
  • Implementing Interdomain IP Multicast
  • Implementing Distributed Rendezvous Point Solution in Multicast Network

PREREQUISITES

  • It is recommended to have knowledge of IOS, IOS-XR, IP routing protocols and MPLS technologies.

Attendees will reinforce MPLS VPN fundamental concepts, benefits, and classification, MPLS components, MPLS control plane, and data plane operations, and etc.

  • Training Duration: 5 Days
  • Delivery: Online

WHO SHOULD ATTEND

  • Engineers are required to prepare and manage end-customer Virtual Private Network (VPN) environments built over a common service provider Multiprotocol Label Switching (MPLS) backbone.

WHAT YOU WILL LEARN

  • Attendees will reinforce MPLS VPN fundamental concepts, benefits, and classification, MPLS components, MPLS control plane, and data plane operations, MPLS VPN routing using Virtual Routing and Forwarding (VRF), Layer 2 and Layer 3 MPLS VPNs, IPv6 MPLS VPN implementations, IP Multicast VPNs, and shared services VPNs.

COURSE OUTLINE

Introducing VPN Services

  • VPN Fundamentals
  • MPLS VPN Control Plane Operation

Troubleshooting MPLS VPN Underlay

  • Troubleshoot Core Interior Gateway Protocol (IGP)
  • Troubleshoot Border Gateway Protocol (BGP)

Implementing Layer 3 MPLS VPNs

  • Multiprotocol BGP (MP-BGP) Routing Requirements in MPLS VPNs
  • Provider Edge to Customer Edge (PE-to-CE) Routing Requirements in Layer 3 MPLS VPNs

Implementing Layer 3 Interdomain MPLS VPNs

  • Inter-Autonomous System (AS) for Layer 3 MPLS VPNs
  • Content Security and Control (CSC) for Layer 3 MPLS VPNs

Implementing Layer 3 Multicast MPLS VPNs

  • Multicast VPN (MVPN) Fundamentals
  • Implement Intranet MVPN

Troubleshooting Intra-AS Layer 3 VPNs

  • Troubleshoot PE-CE Connectivity
  • Troubleshoot PE-to-Route Reflector

Implementing Layer 2 VPNs

  • Layer 2 Service Architecture and Carrier Ethernet Services
  • Refresh on Traditional Ethernet LAN (E-LAN), E-Line, and E-Tree Solutions

Troubleshooting Layer 2 VPNs

  • Troubleshoot Common Issues for Traditional E-Line, E-LAN, and E-Tree Ethernet Solutions
  • Troubleshoot Common Issues for Ethernet VPN (EVPN) Native, EVPN Virtual Private Wire Service (VPWS), and EVPN Integrated Routing and Bridging (IRB) Solutions

Implementing Layer 3 IPv6 MPLS VPNs

  • Classical Solutions for Deploying IPv6 over IPv4 Environments
  • Using 6VPE to Deploy IPv6 Connectivity over MPLS Environment

Troubleshooting Layer 3 IPv6 MPLS VPNs

Troubleshooting PE-to-PE Connectivity

PREREQUISITES

  • It is recommended to have knowledge of IOS, IOS-XR, IP routing protocols and MPLS technologies.