Docstoc

Cisco- Expert

Document Sample
Cisco- Expert Powered By Docstoc
					                                                CISCO –

Course: CCNA Voice
Duration: 40 hours

Describe the components of the Cisco Unified Communications Architecture
        Describe the function of the infrastructure in a UC environment
        Describe the function of endpoints in a UC environment
        Describe the function of the call processing agent in a UC environment
        Describe the function of messaging in a UC environment
        Describe the function of auto attendants and IVRs in a UC environment
        Describe the function of contact center in a UC environment
        Describe the applications available in the UC environment, including Mobility, Presence, and
Telepresence
        Describe how the Unified Communications components work together to create the Cisco
Unified Communications Architecture

Describe PSTN components and technologies
        Describe the services provided by the PSTN
        Describe time division and statistical multiplexing
        Describe supervisory, informational, and address signalling
        Describe numbering plans
        Describe analog circuits
        Describe digital voice circuits
        Describe PBX, trunk lines, key-systems, and tie lines

Describe VoIP components and technologies
        Describe the process of voice packetization
        Describe RTP and RTCP
        Describe the function of and differences between codecs
        Describe H.323, MGCP, SIP, and SCCP signalling protocols

Describe and configure gateways, voice ports, and dial peers to connect to the PSTN and service
provider networks
        Describe the function and application of a dial plan
        Describe the function and application of voice Gateways
        Describe the function and application of voice ports in a Gateway
        Describe the function and operation of call-legs
        Describe and configure voice dial peers
        Describe the differences between PSTN and Internet Telephony Service Provider circuits

Describe and configure a Cisco network to support VoIP
        Describe the purpose of VLANs in a VoIP environment
        Describe the environmental considerations to support VoIP
        Configure switched infrastructure to support voice and data VLANs
        Describe the purpose and operation of PoE
          Identify the factors that impact voice quality
          Describe how QoS addresses voice quality issues
          Identify where QoS is deployed in the UC infrastructure

Implement UC500 using Cisco Configuration Assistant
          Describe the function and operation of Cisco Configuration Assistant
          Configure UC500 device parameters
          Configure UC500 network parameters
          Configure UC500 dial plan and voicemail parameters
          Configure UC500 SIP trunk parameters
          Configure UC500 voice system features
          Configure UC500 user parameters

Implement Cisco Unified Communications Manager Express to support endpoints using CLI
        Describe the appropriate software components needed to support endpoints
        Describe the requirements and correct settings for DHCP, NTP, and TFTP
        Configure DHCP, NTP and TFTP
        Describe the differences between key system and PBX mode
        Describe the differences between the different types of ephones and ephone-dns
        Configure Cisco Unified Communications Manager Express endpoints
        Configure call-transfer per design specifications
        Configure voice productivity features, including hunt groups, call park, call pickup, paging
groups, and paging/intercom
        Configure Music on Hold

Implement voicemail features using Cisco Unity Express
        Describe the Cisco Unity Express hardware platforms
        Configure the foundational elements required for Cisco Unified Communications Manager
Express to support Cisco Unity Express
        Describe the features available in Cisco Unity Express
        Configure AutoAttendant services using Cisco Unity Express
        Configure basic voicemail features using Cisco Unity Express

Perform basic maintenance and operations tasks to support the VoIP solution
          Describe basic troubleshooting methods for Cisco Unified Communications Manager Express
          Explain basic troubleshooting methods for Cisco Unity Express
          Explain basic maintenance and troubleshooting methods for UC500

---------------------------------------------------------------------------------------

Course: CCNA Security
Duration: 40 hours

Describe the security threats facing modern network infrastructures
          Describe and list mitigation methods for common network attacks
          Describe and list mitigation methods for Worm, Virus, and Trojan Horse attacks
          Describe the Cisco Self Defending Network architecture

Secure Cisco routers
       Secure Cisco routers using the SDM Security Audit feature
       Use the One-Step Lockdown feature in SDM to secure a Cisco router
       Secure administrative access to Cisco routers by setting strong encrypted passwords, exec
timeout, login failure rate and using IOS login enhancements
       Secure administrative access to Cisco routers by configuring multiple privilege levels
       Secure administrative access to Cisco routers by configuring role based CLI
       Secure the Cisco IOS image and configuration file

Implement AAA on Cisco routers using local router database and external ACS
          Explain the functions and importance of AAA
          Describe the features of TACACS+ and RADIUS AAA protocols
          Configure AAA authentication
          Configure AAA authorization
          Configure AAA accounting

Mitigate threats to Cisco routers and networks using ACLs
          Explain the functionality of standard, extended, and named IP ACLs used by routers to filter
packets
       Configure and verify IP ACLs to mitigate given threats (filter IP traffic destined for Telnet, SNMP,
and DDoS attacks) in a network using CLI
       Configure IP ACLs to prevent IP address spoofing using CLI
       Discuss the caveats to be considered when building ACLs

Implement secure network management and reporting
          Use CLI and SDM to configure SSH on Cisco routers to enable secured management access
          Use CLI and SDM to configure Cisco routers to send Syslog messages to a Syslog server

Mitigate common Layer 2 attacks
          Describe how to prevent layer 2 attacks by configuring basic Catalyst switch security features

Implement the Cisco IOS firewall feature set using SDM
          Describe the operational strengths and weaknesses of the different firewall technologies
          Explain stateful firewall operations and the function of the state table
          Implement Zone Based Firewall using SDM

Implement the Cisco IOS IPS feature set using SDM
          Define network based vs. host based intrusion detection and prevention
          Explain IPS technologies, attack responses, and monitoring options
          Enable and verify Cisco IOS IPS operations using SDM

Implement site-to-site VPNs on Cisco Routers using SDM
          Explain the different methods used in cryptography
          Explain IKE protocol functionality and phases
          Describe the building blocks of IPSec and the security functions it provides
          Configure and verify an IPSec site-to-site VPN with pre-shared key authentication using SDM




------------------------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------

Course : CCNA Wireless
Duration : 40 hours


Describe WLAN fundamentals
        Describe basics of spread spectrum technology (modulation, DSS, OFDM, MIMO, Channels reuse
and overlap, Rate-shifting, CSMA/CA)
        Describe the impact of various wireless technologies (Bluetooth, WiMAX, ZigBee, cordless
phone)
        Describe wireless regulatory bodies, standards and certifications (FCC, ETSI, 802.11a/b/g/n, WiFi
Alliance)
        Describe WLAN RF principles (antenna types, RF gain/loss, EIRP, refraction, reflection, ETC)
        Describe networking technologies used in wireless (SSID --> WLAN_ID --> Interface -- >VLAN,
802.1q trunking)
        Describe wireless topologies (IBSS, BSS, ESS, Point-to-Point, Point-to-Multipoint, basic Mesh,
bridging)
        Describe 802.11 authentication and encryption methods (Open, Shared, 802.1X, EAP, TKIP, AES)
        Describe frame types (associated/unassociated, management, control, data)

Install a basic Cisco wireless LAN
        Describe the basics of the Cisco Unified Wireless Network architecture (Split MAC, LWAPP,
stand-alone AP versus controller-based AP, specific hardware examples)
        Describe the Cisco Mobility Express Wireless architecture (Smart Business Communication
System -- SBCS, Cisco Config Agent -- CCA, 526WLC, 521AP - stand-alone and controller-based)
        Describe the modes of controller-based AP deployment (local, monitor, HREAP, sniffer, rogue
detector, bridge)
        Describe controller-based AP discovery and association (OTAP, DHCP, DNS, Master-Controller,
Primary-Secondary-Tertiary, n+1 redundancy)
        Describe roaming (Layer 2 and Layer 3, intra-controller and inter-controller, mobility groups)
        Configure a WLAN controller and access points WLC: ports, interfaces, WLANs, NTP, CLI and
Web UI, CLI wizard, LAG AP: Channel, Power
        Configure the basics of a stand-alone access point (no lab) (Express setup, basic security)
        Describe RRM

Install Wireless Clients
          Describe client OS WLAN configuration (Windows, Apple, and Linux.)
          Install Cisco ADU
          Describe basic CSSC
          Describe CCX versions 1 through 5

Implement basic WLAN Security
        Describe the general framework of wireless security and security components (authentication,
encryption, MFP, IPS)
        Describe and configure authentication methods (Guest, PSK, 802.1X, WPA/WPA2 with EAP- TLS,
EAP-FAST, PEAP, LEAP)
        Describe and configure encryption methods (WPA/WPA2 with TKIP, AES)
        Describe and configure the different sources of authentication (PSK, EAP-local or -external,
Radius)
Operate basic WCS
       Describe key features of WCS and Navigator (versions and licensing)
       Install/upgrade WCS and configure basic administration parameters (ports, O/S version, strong
passwords, service vs. application)
       Configure controllers and APs (using the Configuration tab not templates)
       Configure and use maps in the WCS (add campus, building, floor, maps, position AP)
       Use the WCS monitor tab and alarm summary to verify the WLAN operations

Conduct basic WLAN Maintenance and Troubleshooting
         Identify basic WLAN troubleshooting methods for controllers, access points, and clients
methodologies
         Describe basic RF deployment considerations related to site survey design of data or VoWLAN
applications, Common RF interference sources such as devices, building material, AP location Basic RF
site survey design related to channel reuse, signal strength, cell overlap
         Describe the use of WLC show, debug and logging
         Describe the use of the WCS client troubleshooting tool
         Transfer WLC config and O/S using maintenance tools and commands
         Describe and differentiate WLC WLAN management access methods (console port, CLI, telnet,
ssh, http, https, wired versus wireless management)




---------------------------------------------------------------------------------------
CCIE
Duration : 300 Hours
   I.     General Networking Theory
           A.    General Routing Concepts
                   1.    Link State and Distance Vector Protocols
                   2.    Split Horizon
                   3.    Summarization
                   4.    Classful and a Classless routing protocol
                   5.    Routing decision criteria
           B.    Routing Information Base (RIB) and Routing Protocols Interaction
                   1.    Administrative Distance
                   2.    Routing Table
                   3.    RIB and Forwarding Information Base interaction
            C.   Redistribution
                   1.    Redistribution between routing
                   2.    Troubleshooting routing loop



II.    Bridging and LAN Switching
         A.    Spanning Tree Protocol (STP)
                 1.   802.1d
                 2.   802.1w
                 3.   802.1s
                 4.   Loopguard
                 5.   Rootguard
                 6.   Bridge Protocol Data Unit (BPDU) Guard
                 7.   Storm Control
                 8.   Rapid Spanning Tree Protocol (RSTP)
                 9.   Unicast flooding
                10.   STP port roles, failure propagation and loopguard operation
         B.    LAN Switching
                 1.   Trunks
                 2.   VLAN Trunking Protocol (VTP) administrative functions
         C.    Ethernet
                 1.   Speed
                 2.   Duplex
                 3.   Ethernet
                 4.   Fast Ethernet
                 5.   Gigabit Ethernet



III.   IP
            A.   Addressing
                   1.    Subnetting
                   2.    Hot Standby Routing Protocol (HSRP)
                   3.    Gateway Load Balancing Protocol (GLBP)
                   4.    Virtual Router Redundancy Protocol (VRRP)
                   5.    Network Address Translation (NAT)
            B.   Services
                   1.    Network Time Protocol (NTP)
                   2.    Dynamic Host Control Protocol (DHCP)
                   3.    Web Cache Communication Protocol (WCCP)
            C.   Network Management
                   1.    Logging and Syslog
IV.   IP Routing
        A.    OSPF
                1.    Standard OSPF area
                2.    Stub area
                3.    Totally stub area
                4.    Not-so-stubby-area (NSSA)
                5.    Totally NSSA
                6.    Link State Advertisement (LSA) types
                7.    Adjacency on a point-to-point and on a multi-access (broadcast)
                8.    OSPF graceful restart
                9.    Troubleshooting failing adjacency formation to fail
               10.    Troubleshooting of external route installation in the RIB
        B.    BGP
                1.    Protocol on which BGP peers communicate
                2.    Next Hop
                3.    Peering
                4.    Troubleshooting of BGP route that will not install in the routing table
        C.    EIGRP
                1.   Best path
                2.   Loop free paths
                3.   EIGRP operations when alternate loop free paths are available and when it is
                     not available
               4.    EIGRP queries
               5.    Manual summarization
               6.    Auto-summarization
               7.    EIGRP Stubs
               8.    Troubleshooting of EIGRP neighbor adjacencies
       D.    Policy Routing
               1.    Concept of policy routing



V.    QoS
       A.    Modular QoS command-line (MQC) applied to:
              1.   Network-Based Application Recognition (NBAR)
              2.   Class-based weighted fair queueing (CBWFQ) / Modified Deficit Round Robin
                   (MDRR)
              3.   Policing
              4.   Shaping
              5.   Marking
              6.   Random Early Detection (RED)



VI.   WAN
       A.    Frame Relay
               1.   Local Management Interface (LMI)
               2.   Traffic Shaping
                  3.    HUB and Spoke routers
                  4.    Dynamic Multipoint VPN (DMVPN)
                  5.    DE



VII.    IP Multicast
          A.    Internet Group Management Protocol (IGMP) v2
          B.    Group addresses
          C.    Shared Trees
          D.    Source Trees
          E.    Protocol Independent Multicast (PIM) Mechanic
           F.   PIM Sparse Mode
          G.    Auto-RP
          H.    Anycast RP



VIII.   Security
          A.    Extended IP access lists
          B.    Unicast Reverse Path Forwarding (uRPF)
          C.    IP Source Guard
          D.    Context Based Access Control (CBAC)



 IX.    MPLS (New)
         A.    Label Switching Router (LSR)
         B.    Label Switched Path (LSP)
         C.    Route Descriptor
         D.    Label Format
         E.    Label imposition/disposition
         F.    Label Distribution



  X.    IPv6 (New)
          A.    IPv6 Addressing and types
          B.    IPv6 Neighbor Discovery
          C.    Basic IPv6 functionality protocols
          D.    IPv6 Multicast and related Multicast protocols
          E.    Tunneling Techniques
          F.    OSPFv3
          G.    EIGRPv6
------------------------------------------------------------------------------------------

VPN/ASA/IPS on Cisco ASA5510
60 HOURS

Configure Security Appliances for secured network connectivity
          Configure and verify network and interface settings using ASDM and CLI
          Configure and verify NAT globals, statics, NAT exemption, and Identity NAT using ASDM
          Configure and verify access-lists with or without object groups using ASDM

Configure and verify routing and switching on Security Appliances
          Describe the routing capabilities of the Security Appliance
          Use ASDM to configure VLANs on a Security Appliance interface
          Use ASDM to configure the passive RIP routing functionality of the Security Appliance

Configure and verify Authentication, Authorization, & Accounting services for Security Appliances
          Configure ACS for Security Appliance support
          Use ASDM to configure the Security Appliance AAA features
          Configure and verify Auth-Proxy (cut-through proxy) using ASDM

Configure and verify Layer 3 & 4 protocol inspection, Modular Policy Framework, and threat detection
for Security Appliances
          Configure and verify Layer 3 and Layer 4 protocol inspection using ASDM
          Configure and verify Modular Policy Framework using ASDM
          Use ASDM to configure and verify threat detection

Configure and verify secure connectivity using VPNs
          Configure and verify remote access VPNs using ASDM
          Configure and verify IPsec VPN clients with preshared keys using ASDM
          Configure and verify site-to-site VPNs with preshared keys using ASDM
          Verify IKE and IPsec using ASDM and CLI
          Configure and verify clientless SSL VPN using ASDM

Configure and verify active/standby and active/active failover features on Security Appliances
          Configure and verify active/standby failover using ASDM
          Configure and verify active/active failover using ASDM
          Configure and verify redundant Interface using ASDM

Configure transparent firewall and virtual firewall features on a Security Appliance
          Explain the purpose of virtual & transparent firewalls
          Configure and verify the transparent firewall feature of the Security Appliance using CLI
          Configure and verify the virtual firewall feature of the Security Appliance using ASDM
Monitor and manage installed Security Appliances
          Update, backup, and restore configurations and software images using ASDM and CLI
          Install and verify Licensing using ASDM
          Configure and verify Console and SSH/Telnet access
          Configure and utilize Logging using ASDM



---------------------------------------------------------------------------------------


Course: CIPT
Duration: 60 hours



Perform an installation and initial set up of a Cisco Unified Communications Manager cluster
       Describe administrative access to Cisco Unified Communications Manager
       Describe Cisco Unified Communications Manager cluster architecture
       Describe Cisco Unified Communications Manager redundancy designs
       Describe the requirements for Cisco Unified Communications Manager use of DHCP, TFTP, DNS,
and NTP
       Determine the services necessary to support a Cisco Unified Communications Manager
deployment and activate the appropriate services
       Perform an install and upgrade on Cisco Unified Communications Manager

Describe and configure Cisco Unified Communications Manager to support on-cluster calling
          Configure a Cisco Unified Communications Manager group
          Configure users, user groups, and roles
          Configure Cisco Unified Communications Manager to support Cisco SCCP & SIP Phones
          Configure Cisco Unified Communications Manager to support 3rd party SIP phones
          Describe how to harden an IP phone
          Configure LDAP integration
          Configure Cisco Unified Communications Manager profiles and device pools
          Configure Cisco Unified Communications Manager templates
          Configure a Cisco switch to support IP phones
          Use Cisco Unified Communications Manager BAT to manage phones and users
          Describe the function of TAPS

Describe and configure a route plan for Cisco Unified Communications Manager to support off-net
calling
          Describe Cisco Unified Communications Manager digit analysis
          Implement an MGCP Gateway
          Configure route patterns and route filters
          Configure route lists and route groups
          Implement toll-fraud prevention
          Configure digit manipulation
          Describe the functions and usage of CSS and partitions
          Implement calling privileges
          Implement call coverage

Describe and configure Cisco Unified Communications Manager media resources
       Describe media resources
       Configure MeetMe conferencing, hardware conferencing resources, and software conferencing
resources
       Configure MoH
       Configure MRGs and MRGLs

Configure the Cisco Unified Communications Manager to support features and applications
          Configure IP phone services
          Enable user web page access
          Integrate Cisco Unified Communications Manager with Unity and UnityConnection
          Configure Call Park, Privacy, Barge, Call Pickup, and Intercom
          Implement Presence



---------------------------------------------------------------------------------------

Course: GWGK
Duration: 60 hours

Explain the function and interoperation of voice & video Gateways within an IP Communications
network
          Identify and describe the appropriate gateway signaling protocol to meet requirements
          Identify and describe the appropriate digital line protocol to meet requirements
          Identify and describe the appropriate analog line protocol to meet requirements
          Describe the appropriate implementation of drop and insert multiplexing
          Describe DSP functionality
          Describe the different methods of provides fax and modem support

Describe the function and interoperation of Gatekeepers within an IP Communications network
          Describe the function of Gatekeepers
          Describe the interoperation of a Gatekeeper and a Cisco Unified CallManager
          Describe the Gatekeeper Transaction Message Protocol and how it is used
          Describe Dynamic Zone Prefix Registration with a Gatekeeper
          Describe Gatekeeper clustering

Implement a Gatekeeper
          Implement and Configure Gatekeeper to provide call admission control
          Implement and Configure Gatekeeper to provide dial-plan resolution
          Configure a Directory Gatekeeper to provide scalability
          Implement and Configure redundancy between Gatekeeper devices
          Implement and Configure Gatekeeper clustering
          Configure a Gateway to register with a Gatekeeper
       Configure a Cisco Unified CallManager to register with a Gatekeeper
       Verify and troubleshoot Gatekeeper implementations

Implement a Gateway
       Configure and verify PRI connectivity
       Configure and verify BRI connectivity
       Configure and verify CAS connectivity
       Configure and verify Analog connectivity
       Implement SRST to provide High Availability
       Implement media resources on a Gateway
       Implement fax and modem support on a Gateway
       Configure a Gateway to provide DTMF support
       Configure a Gateway to be usable by a Cisco Unified CallManager

Implement a dial-plan
       Describe the components of a dial-plan
       Configure digit manipulation
       Implement call routing
       Implement COR
       Describe how the Gateway matches dial-peers
       Verify and troubleshoot dial-plan implementations

Implement call applications on a Gateway
       Describe how to obtain call applications
       Configure call applications on a Gateway
       Verify and troubleshoot call application implementations

Implement an IP-to-IP Gateway
       Describe the IP-to-IP Gateway features and functionality
       Configure Gatekeeper to support an IP-to-IP Gateway
       Configure IP-to-IP Gateway to provide security
       Configure IP-to-IP Gateway to provide protocol and media interworking
       Configure IP-to-IP Gateway to provide call admission control
       Verify and troubleshoot IP-to-IP Gateway implementations

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:55
posted:6/12/2010
language:English
pages:12