Tutorialspoint

April Learning Carnival is here, Use code FEST10 for an extra 10% off

CCNP CCIE Enterprise: ENCOR 350-401 Training Part-2/2

person icon Ahmad Ali

4.2

CCNP CCIE Enterprise: ENCOR 350-401 Training Part-2/2

Learn CCNP, CCIE Enterprise ENCORE with Step-by-Step Lab Workbook

updated on icon Updated on Apr, 2024

language icon Language - English

person icon Ahmad Ali

category icon IT & Software,Network & Security,CCNP Enterprise

Lectures -74

Duration -27.5 hours

4.2

price-loader

30-days Money-Back Guarantee

Training 5 or more people ?

Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.

Course Description

The CCNP Enterprise ENCOR 350-401 exam is designed to assess your knowledge and skills related to implementing core enterprise network technologies. It includes dual stack (IPv4 and IPv6) architecture, virtualization, infrastructure, network assurance, security, and automation.

This online video course is the second part of a two-part series that will help you prepare for the CCNP Enterprise ENCOR 350-401 exam.

CCNP CCIE Enterprise: ENCOR 350-401 Training Part-2/2 Overview

Implementing Cisco Enterprise Network Core Technologies v1.0 (ENCOR 350-401) is associated with the CCNP and CCIE Enterprise Certifications. The course, Implementing Cisco Enterprise Network Core Technologies, helps candidates prepare for this exam.

The curriculum takes you through the following:

1.1 Explain the different design principles used in an enterprise network

  • 1.1.a Enterprise network design such as Tier 2, Tier 3

  • 1.1.b High availability techniques such as redundancy, FHRP

1.2 Analyze design principles of a WLAN deployment

  • 1.2.a Wireless deployment models (centralized, distributed, controller-less, controller-based, cloud, remote branch)

  • 1.2.b Location services in a WLAN design

1.3 Differentiate between on-premises and cloud infrastructure deployments

1.4 Explain the working principles of the Cisco SD-WAN solution

  • 1.4.a SD-WAN control and data plane elements

  • 1.4.b Traditional WAN and SD-WAN solutions

1.5 Explain the working principles of the Cisco SD-Access solution

  • 1.5.a SD-Access control and data plane elements

  • 1.5.b Traditional campus interoperating with SD-Access

1.6 Describe concepts of wired and wireless QoS

  • 1.6.a QoS components

  • 1.6.b QoS policy

2.1 Describe device virtualization technologies

  • 2.1.a Hypervisor type 1 and 2

  • 2.1.b Virtual machine

  • 2.1.c Virtual switching

2.2 Configure and verify data path virtualization technologies

  • 2.2.a VRF

  • 2.2.b GRE and IPsec tunneling

2.3 Describe network virtualization concepts

  • 2.3.a LISP

  • 2.3.b VXLAN

3.1 Wireless

  • 3.3.a Describe Layer 1 concepts, such as RF power, RSSI, SNR, interference noise, band and channels, and wireless client device capabilities

  • 3.3.b Describe AP modes and antenna types

  • 3.3.c Describe access point discovery and join process (discovery algorithms, WLC selection process)

  • 3.3.d Describe the main principles and use cases for Layer 2 and Layer 3 roaming

  • 3.3.e Troubleshoot WLAN configuration and wireless client connectivity issues

3.2 IP Services

  • 3.4.a Describe Network Time Protocol (NTP)

  • 3.4.b Configure and verify NAT/PAT

  • 3.4.c Configure first-hop redundancy protocols, such as HSRP and VRRP

  • 3.4.d Describe multicast protocols, such as PIM and IGMP v2/v3

4.1 Diagnose network problems using tools such as debugs, conditional debugs, traceroute, ping, SNMP, and Syslog

4.2 Configure and verify device monitoring using syslog for remote logging

4.3 Configure and verify NetFlow and Flexible NetFlow

4.4 Configure and verify SPAN/RSPAN/ERSPAN

4.5 Configure and verify IP SLA

4.6 Describe Cisco DNA Center workflows to apply network configuration, monitoring, and management

4.7 Configure and verify NETCONF and RESTCONF

6.1 Interpret basic Python components and scripts

6.2 Construct a valid JSON-encoded file

6.3 Describe the high-level principles and benefits of a data modeling language, such as YANG

6.4 Describe APIs for Cisco DNA Center and vManage

6.5 Interpret REST API response codes and results in payload using Cisco DNA Center and RESTCONF

6.6 Construct an EEM applet to automate configuration, troubleshooting, or data collection

6.7 Compare agent vs. agentless orchestration tools, such as Chef, Puppet, Ansible, and SaltStack

Who this course is for:

  • Network administrators, Network support technicians, Help desk technicians

  • Enterprise network engineers, System Engineers, System administrators

Goals

What will you learn in this course:

  • You will be ready to pass ENCOR exams and get great hands-on experience with our detailed labs.
  • Anyone who wants to prepare for the CCNP Enterprise certification exams.
  • Anyone who wants to learn routing at a professional level.
  • Anyone who wants to prepare for the CCNP exam
  • Anyone who wants to prepare for the CCIE Written exam

Prerequisites

What are the prerequisites for this course?

  • CCNA Routing & Switching Knowledge CCNA 200-125 or CCNA 200-301
  • General understanding of network fundamentals
  • General knowledge of how to manage network devices.
  • Basic knowledge of how to implement LANs and network automation.
  • To practice, you must install GNS3, EVE NG, or Packet Tracer applications on your computer.
CCNP CCIE Enterprise: ENCOR 350-401 Training Part-2/2

Curriculum

Check out the detailed breakdown of what’s inside the course

CCNP Enterprise ENCORE 350-401
74 Lectures
  • play icon Lecture-69:Introduction and Concept of Border Gateway Protocol (BGP). 22:27 22:27
  • play icon Lecture-70:Border Gateway Protocol (BGP) Introduction to AS Number. 43:54 43:54
  • play icon Lecture-71:Border Gateway Protocol (BGP) Flavors IBGP and EBGP. 24:30 24:30
  • play icon Lecture-72:Border Gateway Protocol (BGP) Three Different Tables. 12:09 12:09
  • play icon Lecture-73:Border Gateway Protocol (BGP) Active and Passive. 22:38 22:38
  • play icon Lecture-74:Border Gateway Protocol (BGP) Six Neighbor States. 33:36 33:36
  • play icon Lecture-75:Border Gateway Protocol (BGP) Four Message Types. 17:44 17:44
  • play icon Lecture-76:Border Gateway Protocol (BGP) Multihop & Update-Source. 17:53 17:53
  • play icon Lecture-77:Border Gateway Protocol (BGP) Keepalive & Hold-Down Timers. 28:08 28:08
  • play icon Lecture-78:Border Gateway Protocol (BGP) Next-Hope-Self Command. 19:45 19:45
  • play icon Lecture-79:Border Gateway Protocol (BGP) Synchronization Command. 38:18 38:18
  • play icon Lecture-80:Border Gateway Protocol (BGP) Attributes Theory. 23:47 23:47
  • play icon Lecture-81:Border Gateway Protocol (BGP) Best Path Selection Theory. 50:28 50:28
  • play icon Lecture-82:Border Gateway Protocol (BGP) Best Path Selection Lab. 01:00:03 01:00:03
  • play icon Lecture-83:Introduction and Concept of Network Address Translation. 22:01 22:01
  • play icon Lecture-84:Configure and Verify Network Address Translation & PAT. 33:07 33:07
  • play icon Lecture-85:Introduction and Concept of Debug and Conditional Debug. 21:32 21:32
  • play icon Lecture-86:Introduction and Concept of Ping and Traceroute Command. 19:39 19:39
  • play icon Lecture-87:Configure and Verify SNMP Version 2 and SNMP Version 3. 31:54 31:54
  • play icon Lecture-88:Configure and Verify Syslog (Logging) in Cisco Router. 31:16 31:16
  • play icon Lecture-89:Introduction and Concept of Network Time Protocol (NTP). 12:14 12:14
  • play icon Lecture-90:Configure and Verify Network Time Protocol and Security. 55:11 55:11
  • play icon Lecture-91:Configure and Verify IP SLA (Service Level Agreement). 29:56 29:56
  • play icon Lecture-92:Interpret Basic Python Scripts Network Automation Lab. 28:26 28:26
  • play icon Lecture-93:Introduction to Application Programming Interface API. 06:44 06:44
  • play icon Lecture-94:NETCONF Application Programming Interface Theory & Lab. 29:17 29:17
  • play icon Lecture-95:RESTCONF Application Programming Interface Theory & Lab. 12:06 12:06
  • play icon Lecture-96:Introduction and Concept of Software Defined Networking. 15:08 15:08
  • play icon Lecture-97:Introduction to North Bound API and South Bound API. 04:46 04:46
  • play icon Lecture-98:Introduction & Concept of Cisco DNA Center (Cisco DNAC). 14:25 14:25
  • play icon Lecture-99:Introduction to JSON (JavaScript Object Notation) and Lab. 33:17 33:17
  • play icon Lecture-100:Introduction and Concept of Data Modeling Language, YANG. 13:06 13:06
  • play icon Lecture-101:Compare Agent,Agentless,Chef,Puppet,Ansible and SaltStack. 27:40 27:40
  • play icon Lecture-102:Configure and Verify EEM Applet to Automate Configuration. 26:09 26:09
  • play icon Lecture-103:Introduction and Concept of Cisco NetFlow Theory. 25:41 25:41
  • play icon Lecture-104:Configure and Verify Cisco NetFlow and Top-Talkers Lab. 31:15 31:15
  • play icon Lecture-105:Configure and Verify Lines and password protection. 33:25 33:25
  • play icon Lecture-106:Introduction, Theory and Concept of AAA Server. 14:59 14:59
  • play icon Lecture-107:Configure and Verify Device Administration Lab. 41:19 41:19
  • play icon Lecture-108:Configure and Verify Control Plane Theory and Lab. 28:45 28:45
  • play icon Lecture-109:Components of Network Security Design Threat Defense. 13:33 13:33
  • play icon Lecture-110:Components of Network Security Design Endpoint Security. 05:34 05:34
  • play icon Lecture-111:Introduction to Firewall Technologies and Types. 20:39 20:39
  • play icon Lecture-112:Introduction, Theory and Concept of TrustSec, MACsec. 04:08 04:08
  • play icon Lecture-113:Introduction and Concept of 802.1X (Dot1x) & Components. 13:53 13:53
  • play icon Lecture-114:Introduction to Media Access Control Authentication Bypass. 07:03 07:03
  • play icon Lecture-115:Introduction to Central Web Authentication (CWA). 07:00 07:00
  • play icon Lecture-116:Introduction, Theory and Concept of Access Control List ACL. 14:39 14:39
  • play icon Lecture-117:Configure and Verify Standard Access Control List ACL Lab. 28:21 28:21
  • play icon Lecture-118:Configure and Verify Extended Access Control List ACL Lab. 22:25 22:25
  • play icon Lecture-119:Configure and Verify Named Access Control List ACL Lab. 11:57 11:57
  • play icon Lecture-120:Configure & Verify Time-Based Access Control List ACL Lab. 11:08 11:08
  • play icon Lecture-121:Configure & Verify Infrastructure Access Control List Lab. 11:49 11:49
  • play icon Lecture-122:Describe Device Virtualization Technologies Hypervisor,VM. 26:08 26:08
  • play icon Lecture-123:Introduction and Concept of Generic Routing Encapsulation. 08:29 08:29
  • play icon Lecture-124:Configure and Verify Generic Routing Encapsulation GRE. 23:40 23:40
  • play icon Lecture-125:Configure and Verify Cisco VRF Lite Theory and Lab. 33:09 33:09
  • play icon Lecture-126:Introduction, Theory and Concept of VXLAN and LISP Protocol. 26:33 26:33
  • play icon Lecture-127:Differentiate Between On-Premises and Cloud Infrastructure. 23:26 23:26
  • play icon Lecture-128:Describe Multicast Protocols, Such as PIM and IGMP v2/v3. 31:31 31:31
  • play icon Lecture-130:Introduction, Theory and Concept of Quality of Service QoS. 53:25 53:25
  • play icon Lecture-131:Configure and Verify Quality of Service QoS Shaping Lab. 26:05 26:05
  • play icon Lecture-132:Configure and Verify Quality of Service QoS Policing Lab. 10:54 10:54
  • play icon Lecture-133:Configure and Verify Quality of Service Classification Lab. 16:55 16:55
  • play icon Lecture-134:Configure and Verify Quality of Service QoS Marking Lab. 06:24 06:24
  • play icon Lecture-135:Introduction and Concept of 2 Teir and 3 Teir Architectures. 14:03 14:03
  • play icon Lecture-136:Introduction and Concept of SDN, SD-WAN and SD-Access. 15:32 15:32
  • play icon Lecture-137:Introduction and Concept of Wireless Basic & Terminologies. 22:59 22:59
  • play icon Lecture-138:Introduction and Concept of Wireless Deployment Models. 08:10 08:10
  • play icon Lecture-139:Introduction and Concept of AP, AP Categories and AP Modes. 17:22 17:22
  • play icon Lecture-141:Introduction and Concept of Antennas and Types of Antennas. 06:17 06:17
  • play icon Lecture-142:Introduction and Concept of WLC & First Time Configuration. 24:23 24:23
  • play icon Lecture-143:Configure and Verify Wireless Lab in Cisco Packet Tracer. 22:23 22:23
  • play icon Lecture-144:Introduction and Concept of Wireless Security Features. 06:24 06:24

Instructor Details

Ahmad Ali

Ahmad Ali

Cyber Security Consultant & Cisco Certified Instructor

I am Cyber Security Consultant and Cisco Certified Trainer with several years of experience. Teaching part time for more than 10 years’ providing classroom, on-site and online training on various network, security topics and Certifications like CCNA R&S,  CCNA, CCNA Security, CCNP R&S, CCNP Security, VPN, Firewalls etc. My utmost desire as an instructor is to bring my field experience into classroom in order to give my students' a feel of real-world hands-on.

Certifications:

CCIE Routing and Switching

Cisco Certified Specialist - Web Content Security Certificate

Cisco Certified Specialist - Security Identity Management Implementation Certificate

Cisco Certified Specialist - Security Core Certificate

Cisco Certified Specialist - Network Security VPN Implementation

Cisco Certified Specialist - Network Security Firepower Certificate

Cisco Certified Specialist - Enterprise Core Certificate

Cisco Certified Specialist - Enterprise Advanced Infrastructure Implementation Certificate

Cisco Certified Network Professional CCNP (Routing & Switching)

Cisco Certified Network Associate CCNA (Routing & Switching)

Cisco Certified Network Professional CCNP (Security)

Cisco Certified Network Associate CCNA (Security)

Cisco Certified Academy Instructor CCAI

Microsoft Certified Solutions Associate MCSA Server 2012

Microsoft Certified Solutions Associate MCSA Server 2008

Microsoft Certified IT Professional MCITP Server 2008

Microsoft Certified Technology Specialist MCTS Windows 7

Microsoft Certified Technology Specialist MCTS  2008

Microsoft Technology Associate MTA

EC-Council Certified Secure Computer User CSCU

Palo Alto Networks Certified Network Security Engineer (PCNSE)

Palo Alto Accredited Configuration Engineer (ACE)

EC-Council Certified, Certified Ethical Hacker (CEH)

Fortinet NSE1, NSE2, NSE3 , NSE4 and NSE7

F5 Certified BIG-IP Administrator

Course Certificate

Use your certificate to make a career change or to advance in your current career.

sample Tutorialspoint certificate

Our students work
with the Best

Related Video Courses

View More

Annual Membership

Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses

Subscribe now
Annual Membership

Online Certifications

Master prominent technologies at full length and become a valued certified professional.

Explore Now
Online Certifications

Talk to us

1800-202-0515