Cisco Certified Network Professional Training in Canberra

CCNP Certification Introduction

The Cisco Certified Network Professional is a professional-level Cisco certification.

Certification holders possess the skills necessary to work with both local and wide-area enterprise networks, including planning, implementation, verification, and troubleshooting. CCNP professionals also possess knowledge required to work with network specialists from other disciplines such as wireless, video, voice, and security.

CCNP Course Outline

ROUTE: 300-101

Describe how a network works

  • Describe the purpose and functions of various network devices.
  • Select the components required to meet a network specification.
  • Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network.
  • Describe common networked applications the impact of applications.
  • Describe the purpose and basic operation of the protocols in the OSI and TCP models.
  • Interpret network diagrams.
  • Determine the path between two hosts across a network.
  • Describe the components required for network and Internet communications.
  • Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach.
  • Differentiate between LAN/WAN operation and features.

Configure, verify and troubleshoot a switch with VLANs and interswitch communications.

  • Explain the technology and media access control method for Ethernet networks.
  • Explain network segmentation and basic traffic management concepts.
  • Explain basic switching concepts and the operation of Cisco switches.
  • Perform and verify initial switch configuration tasks including remote access management.
  • Verify network status and switch operation using basic utilities (including: ping, traceroute, telnet, SSH, arp, ipconfig), SHOW & DEBUG commands.
  • Identify, prescribe, and resolve common switched network media issues, configuration issues, auto negotiation.
  • Describe enhanced switching technologies (including: VTP, RSTP, VLAN, PVSTP, 802.1q, Ether-Channel).
  • Describe how VLANs create logically separate networks and the need for routing between them.
  • Configure, verify, and troubleshoot VLANs.
  • Configure, verify, and troubleshoot trunking on Cisco switches.
  • Configure, verify, and troubleshoot interVLAN routing.
  • Configure, verify, and troubleshoot VTP.
  • Configure, verify, and troubleshoot RSTP operation.
  • Configure, verify, and troubleshoot Ether-channel.
  • Interpret the output of various show and debug commands to verify the operational status of a Cisco switched network.
  • Implement basic switch security (including: port security, trunk access, management vlan other than vlan1, etc.).
  • Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts.

Implement an IP addressing scheme and IP Services to meet network requirements in a medium-size Enterprise branch office network.

  • Describe the operation and benefits of using private and public IP addressing.
  • Explain the operation and benefits of using DHCP and DNS.
  • Configure, verify and troubleshoot DHCP and DNS operation on a router.
  • Implement static and dynamic addressing services for hosts in a LAN environment.
  • Calculate and apply an addressing scheme including VLSM IP addressing design to a network.
  • Determine the appropriate classless addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment.
  • Describe the technological requirements for running IPv6 in conjunction with IPv4 (including:tunneling).
  • Describe IPv6 addresses.
  • Identify and correct common problems associated with IP addressing and host configurations.

Configure, verify, and troubleshoot basic router operation and routing on Cisco device.

  • Describe basic routing concepts (including: packet forwarding, router lookup process).
  • Describe the operation of Cisco routers (including: router bootup process, POST, router components).
  • Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts.
  • Configure, verify, and troubleshoot RIPv2.
  • Access and utilize the router to set basic parameters.
  • Connect, configure, and verify operation status of a device interface.
  • Verify device configuration and network connectivity using ping, traceroute, telnet, SSH or other utilities.
  • Perform and verify routing configuration tasks for a static or default route given specific routing requirements.
  • Manage IOS configuration files. (including: save, edit, upgrade, restore).
  • Manage Cisco IOS.
  • Compare and contrast methods of routing and routing protocols.
  • Configure, verify, and troubleshoot OSPF.
  • Configure, verify, and troubleshoot EIGRP.
  • Verify network connectivity (including: using ping, traceroute, and telnet or SSH).
  • Troubleshoot routing issues.
  • Verify router hardware and software operation using SHOW & DEBUG commands.
  • Implement basic router security.

Implement an IPv4 based redistribution solution, given a network design and a set of requirements.

  • Create a redistribution implementation plan based upon the results of the redistribution analysis.
  • Create a redistribution verification plan.
  • Configure a redistribution solution.
  • Verify that a redistribution was implemented.
  • Document results of a redistribution implementation and verification plan.
  • Identify the differences between implementing an IPv4 redistribution solution.

Describe the purpose of ACLs and NAT.

  • Configure and apply ACLs based on network filtering requirements.
  • Configure and apply an ACLs to limit telnet and SSH access to the router using.
  • Verify and monitor ACLs in a network environment.
  • Troubleshoot ACL issues.
  • Explain the basic operation of NAT.
  • Configure NAT for given network requirements using.
  • Troubleshoot NAT issues.

Implement Layer 3 Path Control Solution and VPNs.

  • Create a Layer 3 path control implementation plan based upon the results of the redistribution analysis.
  • Create a Layer 3 path control verification plan.
  • Configure Layer 3 path control.
  • Verify that a Layer 3 path control was implemented.
  • Document results of a Layer 3 path control implementation and verification plan.
  • Implement basic branch services.
  • Describe basic VPN technologies.
  • Configure GRE.
  • Configure GRE over IPSEC.
  • Configure DMVPN.
  • Describe branch access technologies.

SWITCH 300-115

Implement VLAN based solution, given a network design and a set of requirements.

  • Determine network resources needed for implementing a VLAN based solution on a network.
  • Create a VLAN based implementation plan.
  • Create a VLAN based verification plan.
  • Configure switch-to-switch connectivity for the VLAN based solution.
  • Configure loop prevention for the VLAN based solution.
  • Configure Access Ports for the VLAN based solution.
  • Verify the VLAN based solution was implemented properly using show and debug commands.
  • Document results of VLAN implementation and verification.

Implement a Security Extension of a Layer 2 solution, given a network design and a set of requirements.

  • Determine network resources needed for implementing a Security solution
  • Create a implementation plan for the Security solution
  • Create a verification plan for the Security solution
  • Configure port security features
  • Configure general switch security features
  • Configure private VLANs Configure VACL and PACL
  • Verify the Security based solution was implemented properly using show and debug commands
  • Document results of Security implementation and verification

Implement Switch based Layer 3 services, given a network design and a set of requirements.

  • Determine network resources needed for implementing a Switch based Layer 3 solution
  • Create an implementation plan for the Switch based Layer 3 solution
  • Create a verification plan for the Switch based Layer 3 solution
  • Configure routing interfaces Configure Layer 3 Security
  • Verify the Switch based Layer 3 solution was implemented properly using show and debug commands
  • Document results of Switch based Layer 3 implementation and verification

Implement High Availability, given a network design and a set of requirements.

  • Determine network resources needed for implementing High Availability on a network
  • Create a High Availability implementation plan
  • Create a High Availability verification plan
  • Implement first hop redundancy protocols
  • Implement switch supervisor redundancy
  • Verify High Availability solution was implemented properly using show and debug commands
  • Document results of High Availability implementation and verification

Implementating plan to mitigate security threats like

  • Securing Layer 2
  • Port-Level Traffic controls
  • Private Vlan (PVLAN)
  • Mac-Address ACL (MACL)
  • IP DHCP snooping
  • Dynamic Arp Inspestion (DAI)
  • Root and Loop Guard

TSHOOT: 300-135

Maintain and monitor network performance.

  • Develop a plan to monitor and manage a network
  • Perform network monitoring using IOS tools
  • Perform routine IOS device maintenance
  • Isolate sub-optimal internetwork operation at the correctly defined OSI Model layer

Troubleshoot Multi Protocol system networks

  • Troubleshoot EIGRP
  • Troubleshoot OSPF
  • Troubleshoot eBGP and iBGP
  • Troubleshoot routing redistribution solution
  • Troubleshoot a DHCP client and server solution
  • Troubleshoot NAT
  • Troubleshoot first hop redundancy protocols
  • Troubleshoot IPv6 routing
  • Troubleshoot switch-to-switch connectivity for the VLAN based solution
  • Troubleshoot loop prevention for the VLAN based solution
  • Troubleshoot Access Ports for the VLAN based solution
  • Troubleshoot private VLANS
  • Troubleshoot port security
  • Troubleshoot general switch security
  • Troubleshoot VACL
  • Troubleshoot switch virtual interfaces (SVIs)
  • Troubleshoot Layer 3 Security
  • Troubleshoot issues related to ACLs used to secure access to Cisco routers
  • Troubleshoot configuration issues related to accessing the AAA server for authentication purposes
  • Troubleshoot security issues related to IOS services (i.e.,finger, NTP, HTTP and etc.)