CCNP Training Course in Jaipur
Industry-oriented certification Digital Marketing training course to furnish your career to kick-start/grow at MNCs/Non-MNCs Organization & corporate
Professional expert Sr. Digital Marketing Institute With 15+ Years of working experience will provide you industrial level training.
You can attain the practical training session to get the indutrial exposure & prepare for the corporate level challanges.
You’ll attain knowledge on bases of real-time scenarios, live projects & best case study to complete E-lite workshop.
CCNP Training Programme Details
Course Duration:90-130 HRS with Highly Skilled Corporate Trainers
CCNP Training for 4 Modules – Weekdays / Weekend
E-lite Institute Jaipur – CCNP Certification Training Delivery Method:
- Web / Desktop Base.
- Instructor-Led Classroom Sessions.
- Presentations/Demonstration/Practicals of concepts.
- Handouts/Assignments/Real-time Exposure to work on Clients.
CCNP Training Programme Modules
CCNP Training Course
<h3>Implement an EIGRP based solution, given a network design and a set of requirements</h3>
<ul>
<li>Determine network resources needed for implementing EIGRP on a network</li>
<li>Create an EIGRP implementation plan</li>
<li>Create an EIGRP verification plan</li>
<li>Configure EIGRP routing</li>
<li>Verify EIGRP solution was implemented properly using show and debug commands</li>
<li>Document results of EIGRP implementation and verification</li>
</ul>
<h3>Implement a multi -area OSPF Network, given a network design and a set of requirements</h3>
<ul>
<li>Determine network resources needed for implementing OSPF on a network</li>
<li>Create an OSPF implementation plan</li>
<li>Create an OSPF verification plan</li>
<li>Configure OSPF routing</li>
<li>Verify OSPF solution was implemented properly using show and debug commands</li>
<li>Document results of OSPF implementation and verification plan</li>
</ul>
<h3>Implement an eBGP based solution, given a network design and a set of requirements</h3>
<ul>
<li>Determine network resources needed for implementing eBGP on a network</li>
<li>Create an eBGP implementation plan</li>
<li>Create an eBGP verification plan</li>
<li>Configure eBGP routing</li>
<li>Verify eBGP solution was implemented properly using show and debug commands</li>
<li>Document results of eBGP implementation and verification plan</li>
</ul>
<h3>Implement an IPv6 based solution, given a network design and a set of requirements</h3>
<ul>
<li>Determine network resources needed for implementing IPv6 on a network</li>
<li>Create an IPv6 implementation plan</li>
<li>Create an IPv6 verification plan</li>
<li>Configure IPv6 routing</li>
<li>Configure IPv6 interoperation with Ipv4</li>
<li>Verify IPv6 solution was implemented properly using show and debug commands</li>
<li>Document results of IPv6 implementation and verification plan</li>
</ul>
<p>Implement an IPv4 or IPv6 based redistribution solution, given a network design and a set of requirements</p>
<ul>
<li>Create a redistribution implementation plan based upon the results of the redistribution analysis</li>
<li>Create a redistribution verification plan</li>
<li>Configure a redistribution solution</li>
<li>Verify that a redistribution was implemented</li>
<li>Document results of a redistribution implementation and verification plan</li>
<li>Identify the differences between implementing an IPv4 and IPv6 redistribution solution</li>
</ul>
<p>Implement Layer 3 Path Control Solution</p>
<ul>
<li>Create a Layer 3 path control implementation plan based upon the results of the redistribution analysis</li>
<li>Create a Layer 3 path control verification plan</li>
<li>Configure Layer 3 path control</li>
<li>Verify that a Layer 3 path control was implemented</li>
<li>Document results of a Layer 3 path control implementation and verification plan</li>
<li>Implement basic teleworker and branch services</li>
<li>Describe broadband technologies</li>
<li>Configure basic broadband connections</li>
<li>Describe basic VPN technologies</li>
<li>Configure GRE</li>
<li>Describe branch access technologies</li>
</ul>
<h3>Implement VLAN based solution, given a network design and a set of requirements</h3>
<ul>
<li>Determine network resources needed for implementing a VLAN based solution on a network</li>
<li>Create a VLAN based implementation plan</li>
<li>Create a VLAN based verification plan</li>
<li>Configure switch -to -switch connectivity for the VLAN based solution</li>
<li>Configure loop prevention for the VLAN based solution</li>
<li>Configure Access Ports for the VLAN based solution</li>
<li>Erify the VLAN based solution was implemented properly using show and debug commands</li>
<li>Document results of VLAN implementation and verification</li>
</ul>
<h3>Implement a Security Extension of a Layer 2 solution, given a network design and a set of requirements</h3>
<ul>
<li>Determine network resources needed for implementing a Security solution</li>
<li>Create a implementation plan for the Security solution</li>
<li>Create a verification plan for the Security solution</li>
<li>Configure port security features</li>
<li>Configure general switch security features</li>
<li>Configure private VLANs Configure VACL and PACL</li>
<li>Verify the Security based solution was implemented properly using show and debug commands</li>
<li>Document results of Security implementation and verification</li>
</ul>
<p>Implement Switch based Layer 3 services, given a network design and a set of requirements</p>
<ul>
<li>Determine network resources needed for implementing a Switch based Layer 3 solution</li>
<li>Create an implementation plan for the Switch based Layer 3 solution</li>
<li>Create a verification plan for the Switch based Layer 3 solution</li>
<li>Configure routing interfaces Configure Layer 3 Security</li>
<li>Verify the Switch based Layer 3 solution was implemented properly using show and debug commands</li>
<li>Document results of Switch based Layer 3 implementation and verification</li>
</ul>
<p>Prepare infrastructure to support advanced services</p>
<ul>
<li>Implement a Wireless Extension of a Layer 2 solution</li>
<li>Implement a VolP support solution</li>
<li>Implement video support solution</li>
</ul>
<p>Implement High Availability, given a network design and a set of requirements</p>
<ul>
<li>Determine network resources needed for implementing High Availability on a network</li>
<li>Create a High Availability implementation plan</li>
<li>Create a High Availability verification plan</li>
<li>Implement first hop redundancy protocols</li>
<li>Implement switch supervisor redundancy</li>
<li>Verify High Availability solution was implemented properly using show and debug commands</li>
<li>Document results of High Availability implementation and verification</li>
</ul>
<h3>Maintain and monitor network performance</h3>
<ul>
<li>Develop a plan to monitor and manage a network</li>
<li>Perform network monitoring using IOS tools</li>
<li>Perform routine IOS device maintenance</li>
<li>Isolate sub -optimal internetwork operation at the correctly defined OSI Model layer</li>
</ul>
<h3>Troubleshoot Multi-Protocol system networks</h3>
<ul>
<li>Troubleshoot EIGRP</li>
<li>Troubleshoot OSPF</li>
<li>Troubleshoot eBGP</li>
<li>Troubleshoot routing redistribution solution</li>
<li>Troubleshoot a DHCP client and server solution</li>
<li>Troubleshoot NAT</li>
<li>Troubleshoot first hop redundancy protocols</li>
<li>Troubleshoot IPv6 routing</li>
<li>Troubleshoot IPv6 and IPv4 interoperability</li>
<li>Troubleshoot switch -to -switch connectivity for the VLAN based solution</li>
<li>Troubleshoot loop prevention for the VLAN based solution</li>
<li>Troubleshoot Access Ports for the VLAN based solution</li>
<li>Troubleshoot private VLANS</li>
<li>Troubleshoot port security</li>
<li>Troubleshoot general switch security</li>
<li>Troubleshoot VACL and PACL</li>
<li>Troubleshoot switch virtual interfaces (SVIs)</li>
<li>Troubleshoot switch supervisor redundancy</li>
<li>Troubleshoot switch support of advanced services (i.e., Wireless, VOIP and Video)</li>
<li>Troubleshoot a VolP support solution</li>
<li>Troubleshoot a video support solution</li>
<li>Troubleshoot Layer 3 Security</li>
<li>Troubleshoot issues related to ACLs used to secure access to Cisco routers</li>
<li>Troubleshoot configuration issues related to accessing the AAA server for authentication purposes</li>
<li>Troubleshoot security issues related to 105 services (i.e.,finger, NTP, HTTP, FTP, RCP etc.)</li>
</ul>
<ul>
<li>Deploy and Maintain Server Images</li>
<li>Configure and Troubleshoot DNS</li>
<li>Maintain Active Directory Domain Services (AD DS).</li>
<li>Manage User and Service Accounts</li>
<li>Implement a Group Policy Infrastructure</li>
<li>Manage User Desktops with Group Policy</li>
<li>Configure and Troubleshoot Remote Access</li>
<li>Install, Configure and Troubleshoot Network Policy Server (NPS) role</li>
<li>Optimize File Services</li>
<li>Configure Encryption and Advanced Auditing</li>
<li>Monitor Windows Server 2012</li>
</ul>
<h3>Configuring Advanced Windows Server 2012 Services</h3>
<ul>
<li>Implement advanced network services.</li>
<li>Implement advanced file services.</li>
<li>Implement Dynamic Access Control.</li>
<li>Implement distributed Active Directory Domain Services (AD DS) deployments.</li>
<li>Implement AD DS sites and replication.</li>
<li>Implement Active Directory Certification Services (AD CS).</li>
<li>Implement Active Directory Rights Management Services (AD RMS).</li>
<li>Implement Active Directory Federation Services (AD FS).</li>
</ul>
<p>Cloud Computing</p>
<ul>
<li>Introduction to Cloud Computing</li>
<li>Introduction to Cloud Storage Service</li>
<li>Virtualization Concepts</li>
</ul>
<p>Storage</p>
<ul>
<li>Ethical Hacking</li>
<li>What is Hacking? An Introduction</li>
<li>Potential Security Threats To Your Computer Systems</li>
<li>ethical hacking tools and skills</li>
<li>How to hack using Social Engineering</li>
<li>How to make your data safe using Cryptography</li>
<li>Common hacking terminologies</li>
<li>What is cybercrime?</li>
<li>Types of cybercrime</li>
</ul>
<ul>
<li>Introduction to Cloud Computing</li>
<li>Introduction to Cloud Storage Service</li>
<li>Virtualization Concepts</li>
</ul>
<ul>
<li>Ethical Hacking</li>
<li>What is Hacking? An Introduction</li>
<li>Potential Security Threats To Your Computer Systems</li>
<li>ethical hacking tools and skills</li>
<li>How to hack using Social Engineering</li>
<li>How to make your data safe using Cryptography</li>
<li>Common hacking terminologies</li>
<li>What is cybercrime?</li>
<li>Types of cybercrime</li>
</ul>
Find the CCNP course details. Classes and Course can be designed/customize as per request
Duration of Module
CCNP Course Module | Course Duration |
---|---|
(CCNP) | 90 (Hours) |
CCNP | Linux+Win.+Cloud Computing+Ethical Hacking | 130 (Hours) |
Batch Timings
CCNP Course Schedule | CCNP Course Timing |
---|---|
Monday to Friday | 8:00 AM – 10:00 AM |
Monday to Friday | 10:00 AM – 12:00 PM |
Monday to Friday | 2:00 PM – 4:00 PM |
Monday to Friday | 4:00 PM – 6:00 PM |
Saturday/Sunday | 8:00 | 12:00 | 2:00 | 4:00 |
Sunday | 8:00 AM – 10:00 AM |
Sunday | 10:00 AM – 12:00 PM |
Sunday | 2:00 PM – 4:00 PM |
Sunday | 4:00 PM – 6:00 PM |