Learn the latest skills

Learn the latest skills

CCIE End to End Course

Go at Your Own Pace

Go at Your Own Pace

Extensive Detailed Bootcamp Sessions.

Learn From Industry Experts

Learn From Industry Experts

Ample Amount Of Industry Experience.

Why Choose Us?

Our training services include a wide range of certification programs from Cisco, Fortinet and CyberSecurity. We offer more courses, and in more locations than any other company. Businesses and individuals can choose from the course offerings, delivered by experts, and offered in convenient locations around the world.

Live Sessions

Five days a week session delivery, which includes both in-depth theory based knowledge and practical hands on labs.

Bootcamp

Bootcamp level training on demand. Detailed boot-camp sessions for long hours to deliver what is important.

Lab Practice

Sessions for lab so that you don't miss any hands on experience. you can practice what you've learned.

Discussions

Classroom discussions, problem solving discussions , question quiz. so that we make sure no one is left behind.

Nitiz Sharma

Nitiz Sharma

Founder & CEO

Over 14 Years of experience in Cisco Network Technology. More than 8 years of proficiency in CISCO Data Centre and Security network Implementation, installation, configuration, support, Training and maintaining Cisco Products and Technologies. Strong hands on experience on Cisco Devices like Cisco ACI, Nexus, UCS, ASA, NGFW Firepower, ISE, WSA, VPN, Stealthwatch, Umbrella, Threat Grid, AMP.

Students Success Stories

Our Recent Students CCIE Success with Mr. Nitiz Sharma

Cleared CCIE
Nitiz Sharma - CCIE Passed out

Essa Elshafie CCIE #53069

Cleared CCIE
Nitiz Sharma - CCIE Passed out

Satish Karate #CCIE

Cleared CCIE
Nitiz Sharma - CCIE Passed out

Mohammad Kazim Abrar CCIE #67928

Cleared CCIE
Nitiz Sharma - CCIE Passed out

Krish Peshavaria CCIE #67914

Cleared CCIE
Cleared CCIE
Nitiz Sharma - CCIE Passed out

Amit Kumar CCIE #67744

Cleared CCIE
Nitiz Sharma - CCIE Passed out

Mrunal Meshram CCIE #61827

Cleared CCIE
Nitiz Sharma - CCIE Passed out

Selvam Nagappan #CCIE

Cleared CCIE
Nitiz Sharma - CCIE Passed out

Aabarnam Samiappan CCIE #67742

Cleared CCIE
Nitiz Sharma - CCIE Passed out

Marah CCIE #67286

Cleared CCIE
Nitiz Sharma - CCIE Passed out

Reham Alamaaitah CCIE #67296

Cleared CCIE
Nitiz Sharma - CCIE Passed out

Mohammad Yasser CCIE #67051

Cleared CCIE
Nitiz Sharma - CCIE Passed out

Malek Abbadi CCIE #66947

Nitiz Sharma - CCIE Passed out

Mohammad Kazim Abrar CCIE
#67928

Nitiz Sharma - CCIE Passed out

Amit Kumar
CCIE #67744

Nitiz Sharma - CCIE Passed out

Selvam Nagappan #CCIE

Nitiz Sharma - CCIE Passed out

Aabarnam Samiyappan
CCIE #67742

Student

Mohammed Idrees Siddiqua CCIE #66983

Student

Ali AlKatheeri #CCIE

Student

Mohammad Yasser CCIE #67051

Student

Malek Abbadi CCIE #66947

Nitiz Sharma - CCIE Passed out

Marah CCIE
#67286

Nitiz Sharma - CCIE Passed out

Reham Alamaaitah
CCIE #67296

Nitiz Sharma's Training povides 100% Suppport to Clear Security Certification , along with the industry kowledge. Get Feedback from any of our students and take decision.

Become a Cisco Certified Engineer

Instructor-led Online | Classroom Training
Industry Expert Trainer | 24*7 Virtual Lab Access
Course Videos & Content access on Web | Study Materials
Practical industrial exposure | 100% job assistance
Weekends/Weekdays Classes | Fast track & Regular Classes

Register Now For Demo Classes.

    Choose Your Program Below to See How We Can Help

    Our training programs can bring you a super exciting experience of learning through online! You never face any negative experience while enjoying your classes virtually by sitting in your comfort zone. Our flexible learning initiatives will help you to learn better and quicker than the traditional ways of learning skills.

    Get Started Now
    Shape Image

    On-Demand Training

    Choose the training you want from, watch videos of instructor-led content anywhere.

    Read More
    Shape Image

    Get Hands-On

    Our quizzes, labs, projects, and exercises help reinforce your knowledge.

    Read More
    Shape Image

    Learning Paths

    Organized training helps guide you through the most relevant topics for certification.

    Read More
    Shape Image

    Access to All Courses & Updates

    We update courses and learning materials to the platform regularly so you're always up-to-date.

    Read More
    Shape Image

    CCIE Security Certification

    CCIE Security Certification is for individuals who have skills to implement and maintain extensive Network Security Solutions using industry best practices. Aspirants for the CCIE Security certification who are trained by Nitiz Sharma typically go on to have successful professions that are growth-oriented. Students at Nitiz Sharma Simplified Learningare prepared by highly qualified instructors who are available around-the-clock and have access to Cisco hardware devices.

    Cisco ASA

    Cisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form factors – standalone appliances, blades, and virtual appliances – for any distributed network environment. ASA Software also integrates with other critical security technologies to deliver comprehensive solutions that meet continuously evolving security needs. 

    Know More

    Cisco ASALabs

    Lab 1 – To and Through Firewall
    Lab 2 – ACL
    Lab 3 – NAT
    Lab 4 – Context
    Lab 5 – Active/Standby
    Lab 6 – Active/Active
    Lab 7 -Cluster
    Lab 8 – PBR

    Know More

    Cisco VPN

    Always-on protection for your business Threats can occur through a variety of attack vectors. You need secure connectivity and always-on protection for your endpoints. Deploy Cisco endpoint security clients on Mac, PC, Linux, or mobile devices to give your employees protection on wired, wireless, or VPN. 

    know More

    Cisco VPN Labs

    Lab 9 – Site to Site VPN Crypto Map
    Lab 10 – Gre
    Lab 11 – Gre Over IPSec -Tunnel M
    Lab 12 – Gre Over IPSec – Transport
    Lab 13 – SVTI
    Lab 14 – DMVPN
    Lab 15 – PKI -Site to Site
    Lab 16 – Web/SSL VPN
    Lab 17 – Anyconnect VPN
    Lab 18 – To and Through ASA VPN
    Lab 19 – Flex VPN

    Know More

    Cisco ISE

    The Cisco Identity Services Engine (ISE) offers a networkbased approach for adaptable, trusted access everywhere, based on context. It gives you intelligent, integrated protection through intent-based policy and compliance solutions. And it is all delivered with streamlined, centralized management that lets you scale securely in today’s market. 

    Know More

    Cisco ISE Labs

    Lab 20 – ISE Installation
    Lab 21 – ISE License
    Lab 22 – Repository/RBAC
    Lab 23 – Wired Dot1x with AD
    Lab 24 – Wired MAB
    Lab 25 – RA-VPN Authc/Authz
    Lab 26 – Guest Auth/Authz
    Lab 27 – TrustSec Lab
    Lab 28 – Device Administration
    Lab 29 – Posturing
    Lab 30 – Profiling
    Lab 31 – MFA Duo Authc – Portal

    Read More

    Our Courses

    ASA

     Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form factors – standalone appliances, blades, and virtual appliances – for any distributed network environment. ASA Software also integrates with other critical security technologies to deliver comprehensive solutions that meet continuously evolving security needs. 

    VPN

    Always-on protection for your business Threats can occur through a variety of attack vectors. You need secure connectivity and always-on protection for your endpoints. Deploy Cisco endpoint security clients on Mac, PC, Linux, or mobile devices to give your employees protection on wired, wireless, or VPN. 

    ISE

    The Identity Services Engine (ISE) offers a networkbased approach for adaptable, trusted access everywhere, based on context. It gives you intelligent, integrated protection through intent-based policy and compliance solutions. And it is all delivered with streamlined, centralized management that lets you scale securely in today’s market.  

    NGFW

    A Next-Generation Firewall (NGFW) is a network security device that provides capabilities beyond a traditional, stateful firewall. While a traditional firewall typically provides stateful inspection of incoming and outgoing network traffic, a next-generation firewall includes additional features like application awareness and control, integrated intrusion prevention, and cloud-delivered threat intelligence. 

    WSA

    Advanced threats can hide even on legitimate websites. Users may inadvertently put your organisation at risk by clicking where they shouldn’t. Cisco Secure Web Appliance protects your organisation by automatically blocking risky sites and testing unknown sites before allowing users to click on them. Using TLS 1.3 and high-performance capabilities, Cisco Secure Web Appliance keeps your users safe.

    Stealth Watch / ESA

    Outsmart emerging threats in your digital business with industry-leading machine learning and behavioral modeling provided by Secure Network Analytics (formerly Stealthwatch). Know who is on the network and what they are doing using telemetry from your network infrastructure. Detect advanced threats and respond to them quickly. Protect critical data with smarter network segmentation. And do it all with an agentless solution that grows with your business.

    CCIE Bootcamp

    Bootcamp is basically the demonstration/explanation of the Mock Lab and letting the aspirant know what will be the “DO” and “Dont’s” of the Lab. The Bootcamp will be conducted for two weeks

    Switching

    1.1.a Switch administration

    • 1.1.a i Managing MAC address table
    • 1.1.a ii Errdisable recovery
    • 1.1.a iii L2 MTU

    1.1.b Layer 2 protocols

    • 1.1.b i CDP, LLDP
    • 1.1.b ii UDLD

    1.1.c VLAN technologies

    • 1.1.c i Access ports
    • 1.1.c ii Trunk ports (802.1Q)
    • 1.1.c iii Native VLAN
    • 1.1.c iv Manual VLAN pruning
    • 1.1.c v VLAN database
    • 1.1.c vi Normal range and extended range VLANs
    • 1.1.c vii Voice VLAN
    • 1.1.c viii VTP

    1.1.d EtherChannel

    • 1.1.d i LACP, static
    • 1.1.d ii Layer 2, Layer 3
    • 1.1.d iii Load balancing
    • 1.1.d iv EtherChannel Misconfiguration Guard

    1.1.e Spanning- Tree Protocol

    • 1.1.e i PVST+, Rapid PVST+, MST
    • 1.1.e ii Switch priority, port priority, path cost, STP timers
    • 1.1.e iii PortFast, BPDU Guard, BPDU Filter
    • 1.1.e iv Loop Guard, Root Guard

    Routing

    1.2 Routing Concepts

    • 1.2.a Administrative distance
    • 1.2.b VRF-lite
    • 1.2.c Static routing
    • 1.2.d Policy Based Routing
    • 1.2.e VRF aware routing with any routing protocol
    • 1.2.f Route filtering with any routing protocol
    • 1.2.g Manual summarization with any routing protocol
    • 1.2.h Redistribution between any pair of routing protocols
    • 1.2.i Routing protocol authentication
    • 1.2.j Bidirectional Forwarding Detection

    1.3 EIGRP

    • 1.3.a Adjacencies
    • 1.3.b Best path selection
    • 1.3.b i RD, FD, FC, successor, feasible successor
    • 1.3.b ii Classic Metrics and Wide Metrics
    • 1.3.c Operations
    • 1.3.c i General operations
    • 1.3.c ii Topology table
    • 1.3.c iii Packet types
    • 1.3.c iv Stuck In Active
    • 1.3.c v Graceful shutdown
    • 1.3.d EIGRP load-balancing
    • 1.3.d i Equal-cost
    • 1.3.d ii Unequal-cost
    • 1.3.d iii Add-path
    • 1.3.e EIGRP Named Mode
    • 1.3.f Optimization, convergence and scalability
    • 1.3.f i Fast convergence requirements
    • 1.3.f ii Query propagation boundaries
    • 1.3.f iii IP FRR (single hop)
    • 1.3.f iv Leak-map with summary routes
    • 1.3.f v EIGRP stub with leak map

    1.4 OSPF (v2 and v3)

    • 1.4.a Adjacencies
    • 1.4.b Network types, area types
    • 1.4.c Path preference
    • 1.4.d Operations
    • 1.4.d i General operations
    • 1.4.d ii Graceful shutdown
    • 1.4.d iii GTSM (Generic TTL Security Mechanism)
    • 1.4.e Optimization, convergence and scalability
    • 1.4.e i Metrics
    • 1.4.e ii LSA throttling, SPF tuning, fast hello
    • 1.4.e iii LSA propagation control (area types)

    • 1.4.e iv Stub router
    • 1.4.e v Loop-free alternate
    • 1.4.e vi Prefix suppression

    1.5 BGP

    • 1.5.a IBGP and EBGP peer relationships
    • 1.5.a i Peer-group/update-group, template
    • 1.5.a ii Active, passive
    • 1.5.a iii Timers
    • 1.5.a iv Dynamic neighbors
    • 1.5.a v 4-bytes AS numbers
    • 1.5.a vi Private AS
    • 1.5.b Path selection
    • 1.5.b i Attributes
    • 1.5.b ii Best path selection algorithm
    • 1.5.b iii Load-balancing
    • 1.5.c Routing policies
    • 1.5.c i Attribute manipulation
    • 1.5.c ii Conditional advertisement
    • 1.5.c iii Outbound Route Filtering
    • 1.5.c iv Standard and extended communities
    • 1.5.c v Multi-homing
    • 1.5.d AS path manipulations
    • 1.5.d i local-AS, allowas-in, remove-private-as
    • 1.5.d ii Prepend
    • 1.5.d iii Regexp
    • 1.5.e Convergence and scalability
    • 1.5.e i Route reflector
    • 1.5.e ii Aggregation, as-set
    • 1.5.f Other BGP features
    • 1.5.f i Multipath, add-path
    • 1.5.f ii Soft reconfiguration, Route Refresh

    1.6 Multicast

      • 1.6.a Layer 2 multicast
      • 1.6.a i IGMPv2, IGMPv3
      • 1.6.a ii IGMP Snooping, PIM Snooping
      • 1.6.a iii IGMP Querier
      • 1.6.a iv IGMP Filter
      • 1.6.a v MLD
      • 1.6.b Reverse path forwarding check
      • 1.6.c PIM
      • 1.6.c i Sparse Mode
      • 1.6.c ii Static RP, BSR, AutoRP
      • 1.6.c iii Group to RP Mapping
      • 1.6.c iv Bidirectional PIM
      • 1.6.c v Source-Specific Multicast
      • 1.6.c vi Multicast boundary, RP announcement filter
      • 1.6.c vii PIMv6 Anycast RP
      • 1.6.c viii IPv4 Anycast RP using MSDP
      • 1.6.c ix Multicast multipath

      VPN

      3.1 MPLS

      • 3.1.a Operations
      • 3.1.a i Label stack, LSR, LSP
      • 3.1.a ii LDP
      • 3.1.a iii MPLS ping, MPLS traceroute

      3.1.b L3VPN

      • 3.1.b i PE-CE routing
      • 3.1.b ii MP-BGP VPNv4/VPNv6
      • 3.1.b iii Extranet (route leaking)

          SD – WAN

          2.2 Cisco SD-WAN

          • 2.2.a Design a Cisco SD-WAN solution
          • 2.2.a i Orchestration plane (vBond, NAT)
          • 2.2.a ii Management plane (vManage)
          • 2.2.a iii Control plane (vSmart, OMP)
          • 2.2.a iv Data plane (vEdge/cEdge)

          2.2.b  WAN edge deployment

          • 2.2.b i Onboarding new edge routers

          • 2.2.b ii Orchestration with zero-touch provisioning/Plug-And-Play
          • 2.2.b iii OMP
          • 2.2.b iv TLOC
          • 2.2.c Configuration templates
          • 2.2.d Localized policies
          • 2.2.e Centralized policies

          SD – Access

          2.1 Cisco SD Access

          2.1.a Design a Cisco SD Access solution

          • 2.1.a i Underlay network (IS-IS, manual/PnP)
          • 2.1.a ii Overlay fabric design (LISP, VXLAN, Cisco TrustSec)
          • 2.1.a iii Fabric domains (single-site and multi-site using SD-WAN transit)

          2.1.b Cisco SD Access deployment

          • 2.1.b i Cisco DNA Center device discovery and device management
          • 2.1.b ii Add fabric node devices to an existing fabric
          • 2.1.b iii Host onboarding (wired endpoints only)
          • 2.1.b iv Fabric border handoff

          2.1.c Segmentation

          • 2.1.c i Macro-level segmentation using VNs
          • 2.1.c ii Micro-level segmentation using SGTs (using Cisco ISE)

          2.1.d Assurance

          • 2.1.d i Network and client health (360)
          • 2.1.d ii Monitoring and troubleshooting

            1.1 Layer 2 technologies

            • 1.1.a Link Aggregation
            • 1.1.a i vPC
            • 1.1.a ii PortChannel
            • 1.1.b Tagging/Trunking
            • 1.1.c Static Path binding
            • 1.1.d Spanning Tree Protocol
            • 1.1.d i PVST
            • 1.1.d ii MST

            1.2 Routing Protocols and features

            • 1.2.a OSPF (v2 and v3)
            • 1.2.a i Authentication
            • 1.2.a ii Adjacencies
            • 1.2.a iii Network types and Area
            • Types
            • 1.2.a iv LSA Types
            • 1.2.a v Route
            • Aggregation/Summarization
            • 1.2.a vi Route Redistribution
            • 1.2.b ISIS
            • 1.2.b i Adjacencies
            • 1.2.b.i.1. Single area, single topology
              • 1.2.b ii Network types, Levels and Router
              • types
              • 1.2.b.ii.1. NSAP addressing
              • 1.2.b.ii.2. Point-to-point, broadcast
              • 1.2.c BGP
              • 1.2.c i Path Selection
              • 1.2.c ii External and Internal Peering
              • 1.2.c iii Route reflectors and Route Server
              • 1.2.c iv Peer Templates
              • 1.2.c v Multi-Hop EBGP
              • 1.2.c vi Route Aggregation/Summarization1.2.c vii Route Redistribution
              • 1.2.d BFD
              • 1.2.e FHRP

              1.3 Multicast protocols

              • 1.3.a PIM
              • 1.3.a i Sparse Mode
              • 1.3.a ii BiDir
              • 1.3.a iii Static RP, BSR, AutoRP, PhantomRP1.3.a iv IPv4 PIM Anycast
              • 1.3.a v IPv4 Anycast RP using MSDP
              • 1.3.b IGMP
              • 1.3.b i IGMPv2, IGMPv3
              • 1.3.b ii IGMP Snooping
              • 1.3.b iii IGMP Querier

              Data center fabric infrastructure

              2.1 Physical fabric components

              • 2.1.a Fabric Discovery
              • 2.1.b Controllers/Network
                Managers
              • 2.1.c Switches

              2.2 Fabric policies

              • 2.2.a Access Policies
              • 2.2.b Multi Tenancy
              • 2.2.c Monitoring Policies

              2.3 Tenant Policies

              • 2.3.a Application profiles and EPGs
              • 2.3.b Networking
              • 2.3.c Security

              2.4 Fabric Monitoring

              • 2.4.a Faults
              • 2.4.b Events
              • 2.4.c Health indicators
              • 2.4.d Audit Logs

              2.5 Virtual Networking

              • 2.5.a vSphere VDS

              Data center fabric Connectivity

              3.1 VRF lite

              3.2 L3Out

              • 3.2.a OSPF
              • 3.2.a i Authentication
              • 3.2.a ii Adjacencies
              • 3.2.a iii Network types and Area

              Types

              • 3.2.a iv Route Redistribution
              • 3.2.b BGP
              • 3.2.b i AS manipulation
              • 3.2.b ii External and Internal

              Peering

              • 3.2.b iii Route reflectors
              • 3.2.b iv Route Redistribution
              • 3.2.c Transit Routing

              3.3 Inter Fabric connectivity

              • 3.3.a Multi-Pod
              • 3.3.b Multi-Site
              • 3.3.c Virtual POD
              • 3.3.d remote Leaf

              3.4 Overlays

              • 3.4.a VXLAN EVPN

              Data Center Compute

              4.1 Compute Resources

              • 4.1.a UCSM Policies, Profiles and
                Templates
              • 4.1.b Hyperflex

              4.2 Compute Connectivity

              • 4.2.a SAN/LAN uplinks
              • 4.2.b Rack server integration
              • 4.2.c Port Modes

              Data Center Storage Protocols and Features

              5.1 FC and FCoE

              • 5.1.a Zoning
              • 5.1.b NPV/NPIV
              • 5.1.c Trunking
              • 5.1.d Portchannel
              • 5.1.e Load Balancing

              5.2 iSCSI

              • 5.2.a Authentication
              • 5.2.b Multipathing

              5.3 RoCE v2 over IP Networks

              6.1 Security features

              • 6.1.a ACL’s
              • 6.1.b First Hop Security
              • 6.1.c Port security
              • 6.1.d Private VLANs
              • 6.1.e Contracts

              6.2 RBAC

              • 6.2.a Radius
              • 6.2.b TACACS+
              • 6.2.c LDAP
              • 6.2.d AAA

              6.3 Network Services Insertion and
              Redirection

              • 6.3.a Policy Based Routing
              • 6.3.b Policy Based Redirection
              • 6.3.c Inter VRF communication
              • 6.3.d Route Targets
              • 6.3.e Prefix Lists

              6.4 Services

              • 6.4.a Flow/Telemetry Export
              • 6.4.b SPAN
              • 6.4.c SNMP
              • 6.4.d Syslog
              • 6.4.e DHCP
              • 6.4.f NTP/PTP

              6.5 Traffic management

              • 6.5.a Queueing
              • 6.5.b Policing
              • 6.5.c Classification/Marking
              • 6.5.d Scheduling
              • 6.5.e CoPP

              Data Center Automation and
              Orchestration using tools

              7.1 Data center tasks using scripts
              (Python and Ansible) 

              • 7.1.a Create, Read, Update, Delete
                using RESTful APIs
                7.1.b Deploy and modify
                configurations
                7.1.c Statistics, Data Collection

              7.2 Data Center Automation and
              Orchestration using tools

              • 7.2.a DCNM
              • 7.2.b UCSD
              • 7.2.b i Tasks
              • 7.2.b ii Workflows
              • 7.2.b iii Catalog
              • 7.2.c Intersight
              • 7.2.d CloudCenter Suite
              • 7.2.d i Applications
              • 7.2.d ii Deployments
              • 7.2.d iii Action Orchest

              Radio Frequency and Standards

              • 1.1 IEEE 802.11 standards and protocols
              • 1.2 RF Design / Site survey
                1.2.a Define the tasks/goals for a preliminary site survey
                1.2.b Conduct the site survey
                1.2.c Determine AP quantity, placement and antenna type
              • 1.3 Indoor and outdoor RF deployments
                1.3.a Coverage
                1.3.b Throughput
                1.3.c Voice
                1.3.d Location
                1.3.e High Density / Very High Density
              • 1.4 RF operational models
                1.4.a Radio resource management (Auto-RF, manual, hybrid, Flexible Radio
                Assignment, TPC and DCA, CHD)
                1.4.b Channel use (Co-channel, radar, non-WiFi interference, Dynamic
                Bandwidth Selection)
                1.4.c Power level, overlap
                1.4.d RF profiles
                1.4.e Data rates
                1.4.f RX-SOP
                1.4.g CleanAir and EDRRM
                1.4.h Air Time Fairness (ATF)

              Enterprise Wired Campus

              • 2.1 Layer 2 technologies to support wireless deployments
                2.1.a VLANs
                2.1.b STP
                2.1.c Etherchannel
                2.1.d CDP, LLDP
              • 2.2 Data/Control plane technologies to support a SD-Access wireless deployment
                2.2.a VXLAN and LISP
                2.2.b VRFs
              • 2.3 AP powering options

              • 2.4 IPv4 and IPv6 connectivity
                2.4.a Subnetting
                2.4.b Static and inter-VLAN routing

              • 2.5 Multicast on the switching infrastructure
                2.5.a PIM
                2.5.b Basic IGMP (including IGMP snooping)
                2.5.c MLD
              • 2.6 QoS on the switching infrastructure
                2.6.a MQC
                2.6.b MLS QoS
              • 2.7 Services to support a wireless deployment
                2.7.a DNS
                2.7.b DHCPv4 / DHCPv6
                2.7.c NTP, SNTP
                2.7.d SYSLOG
                2.7.e SNMP

              Enterprise Wireless Network

              • 3.1 WLC interfaces and ports
              • 3.2 Lightweight APs
                3.2.a AP modes
                3.2.b AP Logging
                3.2.c AP CLI troubleshooting
                3.2.d AP level configuration settings
                3.2.e WLC discovery and AP join process
                3.2.f AP join profile
              • 3.3 High availability, redundancy, and resilience
                3.3.a SSO
                3.3.b N+1, N+N
                3.3.c Patching and rolling upgrades for IOS-XE
                3.3.d ISSU
              • 3.4 Wireless segmentation with profiles and groups
                3.4.a RF profiles
                3.4.b AP groups
                3.4.c Flex groups
                3.4.d Site tag
                3.4.e RF tag
                3.4.f Policy tag
                3.5 FlexConnect and Office Extend
                3.6 All controller deployment models
                3.7 Mesh
                3.8 WGB on IOS and on COS APs

              • 3.9 Controller Mobility
                3.9.a L2/L3 roaming
                3.9.b Multicast optimization
                3.9.c Mobility group scaling
                3.9.d Inter-OS controller mobility
                3.9.e Mobility anchoring
                3.9.f Mobility encryption

              Wireless Security and Identity Management

              • 4.1 Secure management access and control plane
                4.1.a Device administration with TACACS+/RADIUS
                4.1.b CPU ACLs
                4.1.c Management via wireless and dynamic interface
                4.1.d Password policies
                4.1.e AP authorization

              • 4.2 Identity management
                4.2.a Basic PKI for dot1X and WebAuth
                4.2.b Internal and external identity sources
                4.2.c Identity PSK

              • 4.3 Wireless security and Network access policies
                4.3.a Client authentication and authorization
                4.3.b Client profiling and provisioning
                4.3.c RADIUS attributes
                4.3.d CoA
                4.3.e ACLs
                4.3.f L2/L3 security
                4.3.g Certificates
                4.3.h Local policies
              • 4.4 Guest management
                4.4.a Local web authentication
                4.4.b Central web authentication
                4.4.c Basic sponsor policy
              • 4.5 Access Point switchport authentication
                4.5.a MAB
                4.5.b 802.1X
                4.5.c NEAT
                4.5.d Switchport macros
              • 4.6 TrustSec for SD-Access Wireless
                4.6.a SGTs
                4.6.b SGACLs

              • 4.7 Intrusion detection and prevention features
                4.7.a Rogue policies
                4.7.b MFP
                4.7.c Standards and custom signatures
                4.7.d Client exclusion policies
                4.7.e Switchport tracing

              Wireless business applications and services

              • 5.1 QoS policies
                5.1.a QoS profiles
                5.1.b EDCA
                5.1.c WMM
                5.1.d Bi-Directional Rate Limitting
                5.1.e Admission control
                5.1.f QoS maps
                5.1.g FastLane
              • 5.2 AVC and netflow

              • 5.3 Client roaming optimization
                5.3.a Band Select
                5.3.b Load Balancing
                5.3.c 802.11r and Adaptive Fast Transition
                5.3.d 802.11k/v

              • 5.4 Wireless Multicast
                5.4.a Multicast modes in the controllers
                5.4.b Multicast snooping
                5.4.c Multicast direct
                5.4.d Mulitcast VLAN
              • 5.5 mDNS
                5.5.a mDNS proxy
                5.5.b Service discovery (both classic deployment and Wide Area Bonjour)
                5.5.c Service filtering

              Automation, Analytics, and Assurance

              • 6.1 Prime Infrastructure
                6.1.a Basic operations
                6.1.a i Create and deploy templates
                6.1.a ii Operate maps
                6.1.a iii Import infrastructure devices
                6.1.a iv Audits
                6.1.a v Client troubleshooting
                6.1.a vi Notification receivers
                6.1.a vii Reports
                6.1.a viii Monitoring policies
                6.1.a ix Prime Infrastructure jobs
                6.1.b WLAN Security management
                6.1.b i Configure rogue management
                6.1.b ii Manage alarms and events
              • 6.2 Cisco CMX/DNA Spaces
                6.2.a Management access
                6.2.b Network services
                6.2.b i Analytics & Metrics
                6.2.b ii Location
                6.2.b iii Profiles
                6.2.b iv Engage
                6.2.c Operational Insights
                6.2.d API calls using python scripts
              • 6.3 Cisco DNA Center
                6.3.a Wireless Automation
                6.3.a i Day 0 – Provisioning
                6.3.a ii SWIM
                6.3.a iii Application policies
                6.3.a iv Security policies
                6.3.a v Operate Maps
                6.3.b Assurance
                6.3.b i Network health and WLC/AP 360
                6.3.b ii Client health and client 360
                6.3.b iii Application experience
                6.3.b iv Sensors
                6.3.b v iPCAP and on demand captures
                6.3.b vi Network telemetry
                6.3.c SD Access
                6.3.c i Fabric enabled wireless
                6.3.c ii SDA policy and segmentatioN
              Go at Your Own Pace

              The World’s Top Network Security Courses

              As you work through each Learning Path, you can keep track of your progress and be able pick up exactly where you left off. You'll always have a clear picture of what you've accomplished.

              Student Reviews

              Our Partners

              Frequently Asked Questions

              • How are live sessions carried out?

                Live classes are carried out over Zoom Meetings tool.The Zoom ID is shared once the learner enrols in the course and furthermore the course receives included to the learner portal.

              • Are all classes live? What if I overlook a session?

                You don't need to be concerned if you overlook the sessions.The recorded videos of the sessions will be uploaded online, to the portal within 24 hours of the live sessions and all recorded videos will be available to the learners.

              • Why do you not have classroom training accessible?

                Most of our learners are working professionals who are intelligent on acquiring via online mode.This mode of acquiring facilitates bendy timings, without hindering an individual’s daily work life also.

              Contact Details

              Get in Touch

              You’d like more information on our training or interested in the course , please contact us at any time.

              Ready to Get Started?

              Your email address will not be published. Required fields are marked *

                Summary
                Author Rating
                1star1star1star1star1star
                Aggregate Rating
                5 based on 1 votes