Implementing and Operating Cisco Enterprise Network Core Technologies – Extended (ENCOR-EX) – Contenuti

Contenuti dettagliati del Corso

Introducing Multicast Protocols
Describe the concepts, purpose, and features of multicast protocols, including IGMP v2/v3, PIM dense mode/sparse mode, and rendezvous points.

This lesson includes these topics:

  • Multicast Overview:
    Describe the concepts, features, function, and operation of the multicast protocol.
  • Internet Group Management Protocol:
    Describe IGMP v2/v3
  • Multicast Distribution Trees:
    Describe multicast distribution trees.
    Source Trees
    Shared Trees
    Source Trees Versus Shared Trees
  • IP Multicast Routing:
    Differentiate PIM dense mode and sparse mode, and explain the basic need for IGMP and how IGMP is used by end hosts to join in multicast groups.
    PIM-DM Overview
    PIM-SM Overview
    PIM-SM Shared Tree Join
    PIM-SM Sender Registration
  • Rendezvous Point:
  • Summary Challenge:
    Form

Introducing QoS
Describe the concepts and features of QoS and describe the need within the enterprise network.

This lesson includes these topics:

  • Understand the Impact of User Applications on the Network:
    Describe the impact of various user applications, including batch, interactive, and real-time applictions on the network.
  • Need for Quality of Service (QoS):
    Identify the need for QoS in an Enterprise network.
  • Describe QoS Mechanisms:
    Describe the concepts, function, and capabilities of classification and marking.
  • Define and Interpret a QoS Policy:
    Interpret a QoS policy.
  • Summary Challenge:
    Form

Understanding Enterprise Network Security Architecture
Describe the enterprise network security architecture, including the purpose and function of VPNs, content security, logging, endpoint security, personal firewalls, and other security features.

This lesson includes these topics:

  • Explore Threatscape:
    Explain the reason for having complimentary security features in the network, and define the terminology, which includes vulnerability, exploit, threat, and risk.
  • Intrusion Prevention Systems:
    Describe the function and key concepts of Intrusion Prevention Systems.
  • Virtual Private Networks:
    Define the key concepts and components of VPN technologies.
  • Content Security:
    Describe the features and capabilities of content security and how the ESA and WSA protect email and Web services.
  • Logging:
    Describe the function, features, capabilities, and importance of logging for troubleshooting and policy compliance auditing.
  • Endpoint Security:
    Describe the function, features, and importance of endpoint protection and security.
  • Personal Firewalls:
    Describe the feature and functionality of personal firewalls to help protect endpoints.
  • Antivirus and Antispyware:
    Describe the function and protection services provided by antivirus and antispyware.
  • Centralized Endpoint Policy Enforcement:
    Explain the features and benefits of centralized endpoint policy enforcement.
  • Cisco AMP for Endpoints:
    Describe the features and functionality of Cisco Collective Security Intelligence Cloud and Cisco AMP for Endpoints which provides the level of visibility and control needed to stop advanced threats.
  • Firewall Concepts:
    Describe the features, functionality, and protections a firewall provides.
  • TrustSec:
    Describe the key concepts in a Cisco Trustsec enabled network.
  • MACsec:
    Describe Mac Security and how it protects VLAN and trustsec header information in addition to data.
  • Identity Management:
    Describe the concepts and functionality of identity management.
  • 802.1X for Wired and Wireless Endpoint Authentication:
    Describe the concepts and operation of 802.1X.
  • MAC Authentication Bypass:
    Describe the need for WebAuth and it's basic operation, including Local and central WebAuth.
  • Web Authentication:
    Describe the features and concepts of MAC Authentication Bypass (MAB) and when it could be used as a fallback for 802.1X.
  • Summary Challenge:
    Form

Exploring Automation and Assurance Using Cisco DNA Center
Explain the purpose, function, features, and workflow of Cisco DNA Center Assurance for Intent Based Networking, for network visibility, proactive monitoring, and application experience.

This lesson includes these topics:

  • Need for Digital Transformation:
    Describe the need for digital transformation
  • Cisco Digital Network Architecture:
    Describe the Cisco Digital Network Architecture
  • Cisco Intent-Based Networking:
    Describe how to implement Cisco DNA Center for Intent-Based Networking.
  • Cisco DNA Center:
    Describe the Cisco DNA Center
  • Cisco DNA Assurance:
    Describe the workflow of Cisco DNA Center Assurance.
  • Cisco DNA Center Automation Workflow:
    Describe the Cisco DNA Center Automation Workflow
  • Cisco DNA Assurance Workflow:
    Describe the Cisco DNA Assurance workflow.
  • Summary Challenge:
    Form

Examining the Cisco SD-Access Solution
Describe the components and features of the Cisco SD-Access solution, including the nodes, fabric control plane, and data plane, while illustrating the purpose and function of the VXLAN gateways.

This lesson includes these topics:

  • Need for Cisco SD-Access:
    Contrast and compare the old and new ways of implementing and designing the campus network highlighting the need for SD-Access.
  • Software-Defined Access Overview:
    Explain the campus fabric architecture that enables the use of virtual networks for Cisco SD-Access.
  • Cisco SD-Access Fabric Control Plane Based on LISP:
    Describe the SD-access control plane based on LISP.
  • Cisco SD-Access Fabric Data Plane Based on VXLAN:
    Describe the various concepts,functions, and components of the Cisco SD-Access Fabric Data Plane.
  • Cisco SD-Access Fabric Policy Plane Based on Cisco TrustSec:
    Describe the SD-Access policy plane based on Cisco TrustSec.
  • Cisco SD-Access Fabric Components:
    Explain the different fabric nodes and their principle roles in SD-Access.
  • Role of Cisco ISE and Cisco DNA Center in SD-Access:
    Explain the need for the fabric border in the SD-Access solution.
  • Cisco SD-Access Wireless Integration:
    Explain how wireless devices integrate with the overall Cisco SD-Access solution, and the parts that work together to create the solution.
  • Traditional Campus Interoperating with Cisco SD-Access:
    Compare and contrast the traditional campus interoperations with the Cisco SD-Access solution.
  • Summary Challenge:
    Form

Understanding the Working Principles of the Cisco SD-WAN Solution
Define the components and features of Cisco SD-WAN solution, including the orchestration plane, management plane, control plane, and data plane.

This lesson includes these topics:

  • Need for Software Defined Networking for WAN:
    Contrast and compare the features and differences between the Cisco SD-Access and SD-WAN solutions.
  • SD-WAN Components:
    Define the features and functions of the various components within the SD-WAN solution.
  • SD-WAN Orchestration Plane:
    Discuss the characteristics of the SD-WAN Orchestration plane and zero touch provisioning.
  • SD-WAN Management Plane:
    Describe the purpose and function of the SD-WAN management plane.
  • SD-WAN Control Plane:
    Describe the purpose and function of the SD-WAN control plane.
  • SD-WAN Data Plane:
    Describe the purpose and function of the SD-WAN data plane.
  • SD-WAN Automation and Analytics:
    Explain the function and capabilities of the SD-WAN Automation and Analytics.
  • Summary Challenge:
    Form

Understanding the Basics of Python Programming
Explain basic Python components and conditionals with script writing and analysis.

This lesson includes these topics:

  • Describe Python Concepts:
    Describe the requirements, operations and outcome of simple Python scripts that interact with network devices.
    Execute Python Code
    Python Scripts
    Python Helper Utilities and Function
    Write Idiomatic Python
    Common Python Data Types
  • String Data Types:
    Describe the features of string data types.
    Printing Strings
    Concatenating Strings
    String Built in Methods
    Variable Assignment
  • Numbers Data Types:
    Describe the features of number data types.
  • Boolean Data Types:
    Describe the features of boolean data types.
    Describe Conditionals
  • Script Writing and Execution:
    Explain the functionality and the writing process to create a Python script.
    Execute Scripts
  • Analyze Code:
    Explain the process and procedures required to analyze and troubleshoot a Python script.
  • Discovery 28: Writing and Troubleshooting Python Scripts:
    Write and troubleshoot a Python script.
    Task 1: Writing a Hello World Script
    Task 2: Writing a Network Script Task 3: Analyzing and Troubleshooting a Script
  • Summary Challenge:
    Form

Introducing Network Programmability Protocols
Describe network programmability protocols.

This lesson includes these topics:

  • Configuration Management:
    Describe various configuration management tools.
  • Evolution of Device Management and Programmability:
    Describe the evolution of device management and programmability.
  • Data Encoding Formats:
    Describe data encoding formats.
  • Discovery 29: Explore JSON Objects and Scripts in Python:
    Explore JSON objects and scripts in Python.
    Task 1: Work with JSON Objects in Python
  • Data Models:
    Describe data models.
  • Model Driven Programmability Stack:
    Describe model-driven programmability stack.
  • Describe YANG:
    Describe the function and operation of Yang as one example of a full-blown tree-structured data modeling language.
  • REST:
    Describe REST.
  • NETCONF:
    Explain the NETCONF protocol stack, data stores, and concepts.
  • Explain NETCONF and YANG:
    Compare and contrast the function, operation, configuration datastores, and state data of Yang and NETCONF.
    NETCONF and YANG Side by Side
    NETCONF Protocol Operations
    NETCONF Configuration Datastores
  • Describe the RESTCONF Protocol:
    Explain the concepts, features, components, and methods of the RESTCONF protocol.
    RESTCONF Methods
    RESTCONF Example: Get Interface
    RESTCONF Example: Get Interface Description
    RESTCONF Example: Get YANG Library Version
    RESTCONF Example: Invoke RPC
  • Cisco IOS XE and IOS XR Systems Overview:
    Describe the Cisco IOS XE and IOS XR network operating systems.
  • Discovery 30: Use NETCONF Via SSH:
    Use NETCONF via SSH.
    Task 1: Use NETCONF Via SSH
    Task 2: Get the YANG Schema
  • Discovery 31: Use RESTCONF with Cisco IOS XE Software:
    Use RESTCONF with Cisco IOS XE software.
    Task 1: Use GET to Access Resources with a Browser
    Task 2: Use the Python Requests Library to Get Resources as XML and JSON
    Task 3: Use the Python Requests Library with POST, PUT, and PATCH
  • Summary Challenge:
    Form

Introducing APIs in Cisco DNA Center and vManage
Describe APIs in Cisco DNA Center and vManage.

This lesson includes these topics:

  • Application Programming Interfaces:
    Describe the function and features of northbound and southbound APIs, orchestration, configuration management, and telemetry.
  • REST API Response Codes and Results:
    Describe REST API response codes and results.
  • REST API Security:
    Describe REST API security.
  • API in DNA-Center:
    Describe APIs in the Cisco DNA Center.
  • REST API in vManage:
    Perform REST API operations on a vManage web server.
  • Summary Challenge:
    Form