Cisco CCNP ENCOR (350-401): 1 Architecture, Virtualization, and Infrastructure

Cisco CCNP ENCOR (350-401): 1 Architecture, Virtualization, and Infrastructure
Cisco CCNP ENCOR (350-401): 1 Architecture, Virtualization, and Infrastructure
English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 9h 53m | 1.76 GB

Implementing Cisco Enterprise Network Core Technologies v1.0 (ENCOR 350-401) is a 120-minute professional-level exam associated with the CCNP and CCIE Enterprise Infrastructure certifications. The exam tests a candidate’s knowledge of implementing core enterprise network technologies. This course helps candidates to prepare for the first three domains of this exam: Architecture, Virtualization, and Infrastructure. Instructors Kevin Wallace and Charles Judd show how to design enterprise architecture, including planning for all the necessary services and capacity. They also cover the various types of virtualization, from virtual machines and switches to entire virtual networks, and review the infrastructure technologies you typically see in enterprise networks, such as MSTP and RSTP, IPv4 and IPV6 routing, WLANs, Dynamic NAT, and more.

Topics include:

  • Enterprise architecture
  • Comparing Tier 2 and Tier 3 designs
  • Capacity planning
  • SD-WAN implementation
  • Process switching
  • Device virtualization
  • Virtual machines and switches
  • Virtual networks
  • Layer 2 infrastructure technologies
  • MSTP and RSTP configuration
  • OSPF configuration
  • Routing IPv4 and IPv6 with BGP
  • Wireless configuration
  • NAT and PAT configuration
  • Securing NTP
Table of Contents

1 Welcome to ENCOR, part 1
2 Using course resources
3 Enterprise architecture
4 Enterprise network design considerations
5 Tier 2 versus Tier 3 designs
6 On-premise versus cloud designs
7 Fabric Capacity planning
8 Redundant design
9 First hop redundancy protocols (FHRPs)
10 Stateful switchover (SSO)
11 Wireless LAN deployment options
12 Location services
13 Software-defined WAN (SD-WAN)
14 Overview of SD-WAN technology
15 SD-WAN implementation
16 Software-Defined Access (SD-Access)
17 Overview of SD-Access technology
18 SD-Access implementation
19 Quality of Service (QoS)
20 Review of QoS mechanisms
21 Applying QoS policies
22 Wireless QoS
23 Switching mechanisms
24 Process switching
25 Cisco Express Forwarding (CEF)
26 The CAM versus the TCAM
27 The FIB versus the RIB
28 Chapter one summary
29 Virtualization technologies
30 Device virtualization
31 Hypervisor type 1 and 2
32 Virtual machines
33 Virtual switches
34 Data path virtualization
35 Virtual Routing and Forwarding (VRF)
36 The need to combine GRE and IPsec tunneling
37 Configuring GRE over IPsec tunnels
38 Network virtualization
39 Location ID Separation Protocol (LISP)
40 Virtual Extensible LAN (VXLAN)
41 Chapter two summary
42 Infrastructure technologies
43 Layer 2 infrastructure technologies
44 Review of IEEE 802.1Q trunking
45 Troubleshooting 802.1Q trunks
46 VLAN Trunking Protocol (VTP) theory
47 VTP configuration
48 Review of EtherChannel operation
49 Troubleshooting EtherChannels
50 Multiple Spanning Tree Protocol (MSTP) theory
51 MSTP configuration
52 Review of Rapid Spanning Tree Protocol (RSTP)
53 RSTP configuration
54 OSPF
55 OSPF compared to EIGRP
56 Review of OSPF neighbor formation
57 Review of OSPF network types
58 Multi-area OSPFv2 configuration
59 OSPF route filtering
60 OSPF route summarization
61 OSPFv3 traditional configuration
62 OSPFv3 address families configuration
63 BGP
64 Fundamental BGP concepts
65 BGP path selection criteria
66 Routing IPv4 with BGP, part 1
67 Routing IPv4 with BGP, part 2
68 Routing IPv6 with BGP over an IPv4 session configuration
69 Routing IPv6 with BGP over an IPv6 session configuration
70 Wireless technologies
71 Wireless communication theory
72 Access Point Modes
73 Antenna types
74 Access Point operation
75 Layer 2 versus Layer 3 roaming
76 WLAN troubleshooting
77 Network services
78 Review of Network Address Translation (NAT)
79 Static NAT configuration
80 Dynamic NAT configuration
81 Port Address Translation (PAT) configuration
82 Review of Network Time Protocol (NTP)
83 NTP security
84 HSRP configuration
85 VRRP configuration
86 Multicast operation
87 Chapter three summary