CCNP Training Course in Jaipur

Certification

Industry-oriented certification Digital Marketing training course to furnish your career to kick-start/grow at MNCs/Non-MNCs Organization & corporate

Experienced Faculty

Professional expert Sr. Digital Marketing Institute With 15+ Years of working experience will provide you industrial level training.

Placement Assistance

Receive placement assistance after completion of 70% training, E-lite team will arrange interviews till you’ll get the placement.

LAB Facility

You can attain the practical training session to get the indutrial exposure & prepare for the corporate level challanges.

Workshop Sessions

You’ll attain knowledge on bases of real-time scenarios, live projects & best case study to complete E-lite workshop.

Admin Support

E-lite’s 7 days working admin team co-ordinates you for the fresh batch schedule/re-scheduling classes/arrange doubt classes.

CCNP Training Programme Details

Course Duration:90-130 HRS with Highly Skilled Corporate Trainers
CCNP Training for 4 Modules – Weekdays / Weekend

E-lite Institute Jaipur – CCNP Certification Training Delivery Method:

  • Web / Desktop Base.
  • Instructor-Led Classroom Sessions.
  • Presentations/Demonstration/Practicals of concepts.
  • Handouts/Assignments/Real-time Exposure to work on Clients.

CCNP Training Programme Modules

CCNP Training Course

<h3>Implement an EIGRP based solution, given a network design and a set of requirements</h3> <ul> <li>Determine network resources needed for implementing EIGRP on a network</li> <li>Create an EIGRP implementation plan</li> <li>Create an EIGRP verification plan</li> <li>Configure EIGRP routing</li> <li>Verify EIGRP solution was implemented properly using show and debug commands</li> <li>Document results of EIGRP implementation and verification</li> </ul> <h3>Implement a multi -area OSPF Network, given a network design and a set of requirements</h3> <ul> <li>Determine network resources needed for implementing OSPF on a network</li> <li>Create an OSPF implementation plan</li> <li>Create an OSPF verification plan</li> <li>Configure OSPF routing</li> <li>Verify OSPF solution was implemented properly using show and debug commands</li> <li>Document results of OSPF implementation and verification plan</li> </ul> <h3>Implement an eBGP based solution, given a network design and a set of requirements</h3> <ul> <li>Determine network resources needed for implementing eBGP on a network</li> <li>Create an eBGP implementation plan</li> <li>Create an eBGP verification plan</li> <li>Configure eBGP routing</li> <li>Verify eBGP solution was implemented properly using show and debug commands</li> <li>Document results of eBGP implementation and verification plan</li> </ul> <h3>Implement an IPv6 based solution, given a network design and a set of requirements</h3> <ul> <li>Determine network resources needed for implementing IPv6 on a network</li> <li>Create an IPv6 implementation plan</li> <li>Create an IPv6 verification plan</li> <li>Configure IPv6 routing</li> <li>Configure IPv6 interoperation with Ipv4</li> <li>Verify IPv6 solution was implemented properly using show and debug commands</li> <li>Document results of IPv6 implementation and verification plan</li> </ul> <p>Implement an IPv4 or IPv6 based redistribution solution, given a network design and a set of requirements</p> <ul> <li>Create a redistribution implementation plan based upon the results of the redistribution analysis</li> <li>Create a redistribution verification plan</li> <li>Configure a redistribution solution</li> <li>Verify that a redistribution was implemented</li> <li>Document results of a redistribution implementation and verification plan</li> <li>Identify the differences between implementing an IPv4 and IPv6 redistribution solution</li> </ul> <p>Implement Layer 3 Path Control Solution</p> <ul> <li>Create a Layer 3 path control implementation plan based upon the results of the redistribution analysis</li> <li>Create a Layer 3 path control verification plan</li> <li>Configure Layer 3 path control</li> <li>Verify that a Layer 3 path control was implemented</li> <li>Document results of a Layer 3 path control implementation and verification plan</li> <li>Implement basic teleworker and branch services</li> <li>Describe broadband technologies</li> <li>Configure basic broadband connections</li> <li>Describe basic VPN technologies</li> <li>Configure GRE</li> <li>Describe branch access technologies</li> </ul>
<h3>Implement VLAN based solution, given a network design and a set of requirements</h3> <ul> <li>Determine network resources needed for implementing a VLAN based solution on a network</li> <li>Create a VLAN based implementation plan</li> <li>Create a VLAN based verification plan</li> <li>Configure switch -to -switch connectivity for the VLAN based solution</li> <li>Configure loop prevention for the VLAN based solution</li> <li>Configure Access Ports for the VLAN based solution</li> <li>Erify the VLAN based solution was implemented properly using show and debug commands</li> <li>Document results of VLAN implementation and verification</li> </ul> <h3>Implement a Security Extension of a Layer 2 solution, given a network design and a set of requirements</h3> <ul> <li>Determine network resources needed for implementing a Security solution</li> <li>Create a implementation plan for the Security solution</li> <li>Create a verification plan for the Security solution</li> <li>Configure port security features</li> <li>Configure general switch security features</li> <li>Configure private VLANs Configure VACL and PACL</li> <li>Verify the Security based solution was implemented properly using show and debug commands</li> <li>Document results of Security implementation and verification</li> </ul> <p>Implement Switch based Layer 3 services, given a network design and a set of requirements</p> <ul> <li>Determine network resources needed for implementing a Switch based Layer 3 solution</li> <li>Create an implementation plan for the Switch based Layer 3 solution</li> <li>Create a verification plan for the Switch based Layer 3 solution</li> <li>Configure routing interfaces Configure Layer 3 Security</li> <li>Verify the Switch based Layer 3 solution was implemented properly using show and debug commands</li> <li>Document results of Switch based Layer 3 implementation and verification</li> </ul> <p>Prepare infrastructure to support advanced services</p> <ul> <li>Implement a Wireless Extension of a Layer 2 solution</li> <li>Implement a VolP support solution</li> <li>Implement video support solution</li> </ul> <p>Implement High Availability, given a network design and a set of requirements</p> <ul> <li>Determine network resources needed for implementing High Availability on a network</li> <li>Create a High Availability implementation plan</li> <li>Create a High Availability verification plan</li> <li>Implement first hop redundancy protocols</li> <li>Implement switch supervisor redundancy</li> <li>Verify High Availability solution was implemented properly using show and debug commands</li> <li>Document results of High Availability implementation and verification</li> </ul>
<h3>Maintain and monitor network performance</h3> <ul> <li>Develop a plan to monitor and manage a network</li> <li>Perform network monitoring using IOS tools</li> <li>Perform routine IOS device maintenance</li> <li>Isolate sub -optimal internetwork operation at the correctly defined OSI Model layer</li> </ul> <h3>Troubleshoot Multi-Protocol system networks</h3> <ul> <li>Troubleshoot EIGRP</li> <li>Troubleshoot OSPF</li> <li>Troubleshoot eBGP</li> <li>Troubleshoot routing redistribution solution</li> <li>Troubleshoot a DHCP client and server solution</li> <li>Troubleshoot NAT</li> <li>Troubleshoot first hop redundancy protocols</li> <li>Troubleshoot IPv6 routing</li> <li>Troubleshoot IPv6 and IPv4 interoperability</li> <li>Troubleshoot switch -to -switch connectivity for the VLAN based solution</li> <li>Troubleshoot loop prevention for the VLAN based solution</li> <li>Troubleshoot Access Ports for the VLAN based solution</li> <li>Troubleshoot private VLANS</li> <li>Troubleshoot port security</li> <li>Troubleshoot general switch security</li> <li>Troubleshoot VACL and PACL</li> <li>Troubleshoot switch virtual interfaces (SVIs)</li> <li>Troubleshoot switch supervisor redundancy</li> <li>Troubleshoot switch support of advanced services (i.e., Wireless, VOIP and Video)</li> <li>Troubleshoot a VolP support solution</li> <li>Troubleshoot a video support solution</li> <li>Troubleshoot Layer 3 Security</li> <li>Troubleshoot issues related to ACLs used to secure access to Cisco routers</li> <li>Troubleshoot configuration issues related to accessing the AAA server for authentication purposes</li> <li>Troubleshoot security issues related to 105 services (i.e.,finger, NTP, HTTP, FTP, RCP etc.)</li> </ul>
<ul> <li>Deploy and Maintain Server Images</li> <li>Configure and Troubleshoot DNS</li> <li>Maintain Active Directory Domain Services (AD DS).</li> <li>Manage User and Service Accounts</li> <li>Implement a Group Policy Infrastructure</li> <li>Manage User Desktops with Group Policy</li> <li>Configure and Troubleshoot Remote Access</li> <li>Install, Configure and Troubleshoot Network Policy Server (NPS) role</li> <li>Optimize File Services</li> <li>Configure Encryption and Advanced Auditing</li> <li>Monitor Windows Server 2012</li> </ul> <h3>Configuring Advanced Windows Server 2012 Services</h3> <ul> <li>Implement advanced network services.</li> <li>Implement advanced file services.</li> <li>Implement Dynamic Access Control.</li> <li>Implement distributed Active Directory Domain Services (AD DS) deployments.</li> <li>Implement AD DS sites and replication.</li> <li>Implement Active Directory Certification Services (AD CS).</li> <li>Implement Active Directory Rights Management Services (AD RMS).</li> <li>Implement Active Directory Federation Services (AD FS).</li> </ul> <p>Cloud Computing</p> <ul> <li>Introduction to Cloud Computing</li> <li>Introduction to Cloud Storage Service</li> <li>Virtualization Concepts</li> </ul> <p>Storage</p> <ul> <li>Ethical Hacking</li> <li>What is Hacking? An Introduction</li> <li>Potential Security Threats To Your Computer Systems</li> <li>ethical hacking tools and skills</li> <li>How to hack using Social Engineering</li> <li>How to make your data safe using Cryptography</li> <li>Common hacking terminologies</li> <li>What is cybercrime?</li> <li>Types of cybercrime</li> </ul>
<ul> <li>Introduction to Cloud Computing</li> <li>Introduction to Cloud Storage Service</li> <li>Virtualization Concepts</li> </ul>
<ul> <li>Ethical Hacking</li> <li>What is Hacking? An Introduction</li> <li>Potential Security Threats To Your Computer Systems</li> <li>ethical hacking tools and skills</li> <li>How to hack using Social Engineering</li> <li>How to make your data safe using Cryptography</li> <li>Common hacking terminologies</li> <li>What is cybercrime?</li> <li>Types of cybercrime</li> </ul>

Find the CCNP course details. Classes and Course can be designed/customize as per request

Duration of Module

CCNP Course Module Course Duration
(CCNP) 90 (Hours)
CCNP | Linux+Win.+Cloud Computing+Ethical Hacking 130 (Hours)

Batch Timings

CCNP Course Schedule CCNP Course Timing
Monday to Friday 8:00 AM – 10:00 AM
Monday to Friday 10:00 AM – 12:00 PM
Monday to Friday 2:00 PM – 4:00 PM
Monday to Friday 4:00 PM – 6:00 PM
Saturday/Sunday 8:00 | 12:00 | 2:00 | 4:00
Sunday 8:00 AM – 10:00 AM
Sunday 10:00 AM – 12:00 PM
Sunday 2:00 PM – 4:00 PM
Sunday 4:00 PM – 6:00 PM