We may earn an affiliate commission when you visit our partners.
Arash Deljoo

The CCNP/ This course is ideal for individuals looking to deepen their knowledge of core Cisco technologies and prepare for both CCNP (Cisco Certified Network Professional) and CCIE (Cisco Certified Internetwork Expert) certifications.

Read more

The CCNP/ This course is ideal for individuals looking to deepen their knowledge of core Cisco technologies and prepare for both CCNP (Cisco Certified Network Professional) and CCIE (Cisco Certified Internetwork Expert) certifications.

The ENCOR 300-415 exam focuses on the implementation, configuration, and management of various Cisco networking technologies that are foundational to modern enterprise networks. Topics include routing and switching, security, automation, and advanced network services, providing a robust foundation for professionals who want to optimize and manage the network infrastructure of large-scale organizations.

In today’s fast-evolving network environments, companies demand professionals who can design and manage complex, scalable, and secure networks. This course covers the essentials and provides practical, hands-on experience with critical technologies, such as SD-WAN, VPNs, QoS, and network security. You'll also gain expertise in advanced routing protocols, including

Completing the CCNP/ It is tailored to ensure that professionals can implement cutting-edge solutions and troubleshoot network challenges effectively, enabling organizations to thrive in the digital age.

By mastering the skills taught in this course, you will be well-positioned to advance your career and take on high-impact roles in enterprise networking. Take the next step towards becoming a network leader and earn the credibility and opportunities that come with CCNP and CCIE certification.

Enroll now

What's inside

Learning objectives

  • Packet forwarding
  • Spanning tree protocol
  • Advanced stp tuning
  • Multiple spanning tree protocol
  • Vlan trunks and etherchannel bundles
  • Ip routing essentials
  • Eigrp
  • Ospfv2
  • Advanced ospf
  • Ospfv3
  • Bgp
  • Advanced bgp
  • Multicast
  • Qos
  • Ip services
  • Overlay tunnels
  • Wireless signals and modulation
  • Wireless infrastructure
  • Understanding wireless roaming and location services
  • Authenticating wireless clients
  • Troubleshooting wireless connectivity
  • Enterprise network architecture
  • Fabric technologies
  • Network assurance
  • Secure network access control
  • Network device access control and infrastructure security
  • Virtualization
  • Foundational network programmability concepts
  • Introduction to automation tools
  • Show more
  • Show less

Syllabus

Packet Forwarding

1- Transmission Control Protocol/Internet Protocol (TCP/IP) Model Introduction

2- Open Systems Interconnection (OSI) Model Introduction

3- media access control (MAC) Introduction

4- Collision Domains Introduction

5- Carrier Sense Multiple Access/Collision Detect (CSMA/CD) Introduction

6- Collision Domains on a Hub Versus a Switch Introduction

7- Switch Unicast and Broadcast Traffic Patterns Introduction

8- Known and Unknown Unicast Frame Introduction

Read more

1- Virtual LANs Introduction

2- Virtual LANs Configuration

3- Virtual LANs Verification

4- Access Ports Introduction

5- Access Ports Configuration

6- Access Ports Verification

7- Trunk Ports Introduction

8- Trunk Ports Configuration

9- Trunk Ports Verification

10- IEEE802.1Q Protocol Introduction

11- Tag protocol identifier (TPID) Introduction

12- Priority code point (PCP) Introduction

13- Drop elgible indicator (DEI) Introduction

14- VLAN identifier (VLAN ID) Introduction

1- Native VLANs Introduction

2- Native VLANs Configuration

3- Native VLANs Verification

4- Allowed VLANs Introduction

5- Allowed VLANs Configuration

6- Allowed VLANs Verification

7- Layer 2 Diagnostic Commands Introduction

8- MAC Address Table Verification Commands

9- Switch Port Status Verification Commands

10- Interface Status Verification Commands

1- Layer 3 Forwarding Introduction

2- Local Network Forwarding Introduction

3- Address Resolution Protocol (ARP) Introduction

4- Packet Routing Introduction

5- IP Address Assignment Introduction

6- IPv6 Address Assignment Introduction

7- Routed Subinterfaces Introduction

8- Switched Virtual Interfaces [SVI] Introduction

9- Routed Switch Ports Introduction

10- Verification of IP Addresses Introduction

11- Verification of IPv6 Addresses Introduction

Network Device Communication Quiz

1- Forwarding Architectures Introduction

2- Process switching Introduction

3- Fast switching Introduction

4- Cisco Express Forwarding [CEF] Introduction

5- Application-Specific Integrated Circuits (ASICs) Introduction

6- Network Processing Units (NPUs) Introduction

7- Ternary Content Addressable Memory [TCAM] Introduction

8- Content Addressable Memory [CAM] Introduction

9- Centralized Forwarding Introduction

10- Distributed Forwarding Introduction

11- Software CEF Introduction

12- Hardware CEF Introduction


1- Stateful Switchover [SSO] Introduction

2- Checkpointing Introduction

3- Nonstop forwarding (NSF) Introduction

4- Nonstop routing (NSR) Introduction

5- SDM Templates Introduction

6- Switching Database Manager (SDM) Introduction

7- Switching Database Manager (SDM) Configuration

8- Switching Database Manager (SDM) Verification


Forwarding Architectures Quiz
Spanning Tree Protocol (STP)

1- The Need to Spanning Tree Protocol [STP] Introduction

2- The STP Root Bridge Introduction

3- The STP Root Port Role Introduction

4- The STP Designated Port Role Introduction

5- The STP Bridge ID Introduction

6- STP Bridge Priority Configuration

7- The STP Bandwidth/Cost Introduction

8- The Importance of STP Root Bridge in Active Topology

1- The STP Tie Breakers Introductions

2- The STP Tie Breakers for Root Port Election Introductions

3- The STP Tie Breakers for Designated Port Election Introductions

4- The STP Alternate Port Introduction

5- The STP Backup Port Introduction

6- The Per VLAN STP Plus [PVST+] Introduction

7- The Per VLAN STP Plus [PVST+] Configuration

8- The Per VLAN STP Plus [PVST+] Verification

1- The STP Real Scenario Introductions

2- Modifying the Root Bridge Election Introductions

3- The STP Primary Root Bridge Introductions

4- The STP Primary Root Bridge Configuration

5- The STP Secondary Root Bridge Introductions

6- The STP Secondary Root Bridge Configuration

7- The STP Bridge Protocol Data Unit [BPDU] Fields Introduction

8- The STP Standards and Models Introduction

9- The STP Modes Configuration

1- The Traditional Spanning Tree Protocol Review

2- The Rapid Spanning Tree Protocol [RSTP] Introduction

3- The Rapid Spanning Tree Protocol [RSTP] Configuration

4- The Rapid Spanning Tree Protocol [RSTP] Verification

5- The RSTP Synchronization Introduction

6- The RSTP Roles Introduction

7- The RSTP States Introduction

8- The RSTP Link Types Introduction

9- Comparing STP and RSTP 

STP Fundamentals & RSTP Quiz

1- The STP Convergence Introduction

2- The STP Listening State Introduction

3- The STP Learning  State Introduction

4- The STP Topology Change Notification [TCN] Introduction

5- The STP Direct Topology Change Introduction

6- The STP InDirect Topology Change Introduction

7- The STP Insignificant Topology Change Introduction

8- The STP Hello Timer Introduction

9- The STP Forward Delay Timer Introduction

10- The STP Max Age Timer Introduction

11- The STP Portfast Feature Introduction

12- The STP Portfast Feature Configuration

13- The STP Portfast Feature Verification

14- The STP Portfast Introduction

15- The STP Portfast Configuration

16- The STP Portfast Verification

17- The STP BPDU-Guard Introduction

18- The STP BPDU-Guard Configuration

19- The STP BPDU-Guard Verification

20- The Interface Err-Disabled Status Introduction

21- The STP Interface Cost Configuration

22- The STP Interface Cost Verification

23- The STP Interface Priority Configuration

24- The STP Interface Priority Verification

25- Recommendation for Root Bridge Place in STP

1- STP Topology Tuning Introduction

2- Root Bridge Placement Introduction

3- Modifying STP Root Port and Blocked Switch Port Locations Introduction

4- Modifying STP Port Cost Introduction

5- Modifying STP Port Priority Introduction

6- Spanning-tree vlan vlan-id priority priority Command Introduction , Configuration , Verification

7- spanning-tree vlan vlan-id root {primary | secondary} [diameter diameter] Command Introduction , Configuration , Verification

8- spanning tree [vlan vlan-id] cost cost Introduction , Configuration , Verification

9- spanning-tree [vlan vlan-id] port-priority priority Introduction , Configuration , Verification

10- show spanning-tree [vlan vlan-id] detail Introduction , Verification

1- STP Protection Mechanisms Introduction

2- STP Root Guard Introduction

3- STP Root Guard Configuration

4- STP Root Guard Verification

5- STP Loop Guard Introduction

6- STP Loop Guard Configuration

7- STP Loop Guard Verification

8- Unidirectional Link Detection (UDLD) Introduction

9- Unidirectional Link Detection (UDLD) Configuration

10- Unidirectional Link Detection (UDLD) Verification

11- BPDU Filter Introduction

12- BPDU Filter Configuration

13- BPDU Filter Verification

14- STP Portfast Introduction

15- STP Portfast Configuration

16- STP Portfast Verification

Advanced STP Tuning & Protection Quiz

1- Multiple Spanning Tree Protocol Introduction

2- MST Instances (MSTIs) Introduction

3- MST Configuration Introduction

4- MST Verification Introduction

5- MST Tuning Introduction

6- Common MST Misconfigurations Introduction

7- VLAN Assignment to the IST Introduction

8- VLAN Assignment to the IST Configuration

9- Trunk Link Pruning Introduction

10- MST Region Boundary Introduction

11- PVST simulation mechanism Introduction

12- PVST simulation mechanism Configuration

13- PVST simulation check Introduction

14- PVST simulation check Configuration

Multiple Spanning Tree Protocol (MST) Quiz
Dynamic Trunking Protocol (DTP)

1- Dynamic Trunking Protocol [DTP] Introduction

2- Dynamic Trunking Protocol [DTP] Configuration

3- Dynamic Trunking Protocol [DTP] Verification

4- DTP Administrative Mode Introduction

5- DTP Operational    Mode Introduction

6- DTP Administrative Encapsulation Mode Introduction

7- DTP Operational    Encapsulation Mode Introduction

Dynamic Trunking Protocol (DTP) Quiz
VLAN Trunking Protocol (VTP)

1- VLAN Trunking Protocol [VTP] Introduction

2- VLAN Trunking Protocol [VTP] Domain Introduction

3- VLAN Trunking Protocol [VTP] Modes [ Server | Client | Transparent | off ] Introduction

4- VLAN Trunking Protocol [VTP] Versions [ 1,2,3 ] Introduction

5- VLAN Trunking Protocol [VTP] Configuration Revision Number Introduction

6- VLAN Trunking Protocol [VTP] Message Types [ Summary | Subset | Client Request ] Introduction

7- VLAN Trunking Protocol [VTP] Domain Configuration

8- VLAN Trunking Protocol [VTP] Modes Configuration

9- VLAN Trunking Protocol [VTP] Versions Configuration

10- VLAN Trunking Protocol [VTP] Verification Introduction

VLAN Trunking Protocol Quiz
EtherChannel

1- The Need to EtherChannel Introduction

2- The EtherChannel Requirement Introduction

3- The EtherChannel Configuration Methods Introduction

4- The Etherchannel Configuration with Manual Method

5- The Etherchannel Configuration with PAgP

6- The Etherchannel Configuration with LACP

7- The EtherChannel Verification 

8- The EtherChannel Load-Balancing Introduction

9- The L3 EtherChannel Introduction

10- The L3 EtherChannel Configuration

11- The L3 EtherChannel Verification

EtherChannel Quiz
IP Routing Essentials

1- Routing Table Introduction

2- Routing Table Fields Introduction

3- Routing Table Verification Command Introduction

4- Static Route Configuration with Outgoing Interface

5- Static Route Configuration with Next Hop IP Address

6- Static Route Configuration with Outgoing Interface and Next Hop IP Address

7- ARP Proxy Feature Introduction

8- Compare three Method of Static Route Configuration

9- The ICMP Destination Host Unreachable Introduction

10- The Usage of "do" in CLI Introduction

1- Static Route Advantages Introduction

2- Static Route DisAdvantages Introduction

3- Static default Route Introduction

4- Static default Route Configuration

5- Static default Route Verification

6- Static default Route Usage in Internet Connectivity

7- Load Sharing Configuration with Static Route

8- Fault Tolerance Configuration with Static Route

9- Static Host Route Configuration

10- Administrative Distance [AD] Introduction

11- Floating Static Route Introduction

12- Routing Table Verification

1- IPv6 Connected Route Introduction

2- IPv6 Local     Route Introduction

3- IPv6 Static    Route Introduction

4- IPv6 Static    Route Configuration with Outgoing Interface

5- IPv6 Static    Route Configuration with Outgoing Interface and Global Unicast Address Next-Hop

6- IPv6 Static    Route Configuration with Outgoing Interface and Link Local Address Next-Hop

7- IPv6 Static    Route Configuration with Global Unicast Address Next-Hop

8- IPv6 Connected Route Verification

9- IPv6 Local     Route Verification

10-IPv6 Static    Route Verification

11-IPv6 Static Default Route Introduction

12-IPv6 Static Default Route Configuration

13-IPv6 Static Default Route Verification

14- IP Static Discard route Introduction

15- IP Static Discard route Configuration

16- IP Static Discard route Verification

1- Dynamic Routing Protocol Introduction

2- Routed Protocol / Routable Protocol Introduction

3- Autonomous System [AS] Introduction

4- Interior Gateway Protocols [IGP] Introduction

5- Exterior Gateway Protocols [EGP] Introduction

6- IGP vs. EGP Introduction

7- IGP Routing Protocol Categories

8- Metric Calculation in IGPs Introduction

9- Distance Vector Algorithm Introduction

10- Link State Algorithm Introduction

11- Path Vector Vector Algorithm Introduction

1- Routing Table Basics

2- ICMP Echo Request , ICMP Echo Reply , ICMP Destination Host Unreachable

3- Static Route Configuration with Outgoing Interface

4- Static Route Configuration with Next Hop IP Address

5- Static Route Configuration with Outgoing Interface and Next Hop IP Address

6- Static Route Verification

7- VRF Lite Routing Concept

8- VRF Lite Routing Configuration with Static Routing

9- VRF Lite Routing Verification

10- VRF Lite using Subinterfaces concept

11- VRF Lite using Subinterfaces configuration

12- VRF Lite using Subinterfaces verification

13- VRF Lite using Subinterfaces capture

14- Compare Physical Network and Virtual Network with eachother

15- VRF Lite Configuration for Dual Stack Concept

16- VRF Lite Configuration for Dual Stack with VRF Defnition Command

17- VRF Lite for Dual Stack verification

Enhanced Interior Gateway Routing Protocol (EIGRP)

1- Enhanced Interior Gateway Routing Protocol [EIGRP] Introduction

2- EIGRP Neighborship Process Introduction

3- EIGRP Path Exchange Introduction

4- EIGRP Topology Table Introduction

5- EIGRP Process Introduction

6- EIGRP Classic Configuration Introduction

7- EIGRP Named   Configuration Introduction

8- EIGRP Classic Configuration Example

9- EIGRP Named   Configuration Example

10- EIGRP Classic Configuration Verification

11- EIGRP Named   Configuration Verification

12- EIGRP Router-ID Introdution

13- EIGRP Router-ID Configuration

1- EIGRP Multicast Address Introduction

2- EIGRP Messages Introduction

3- EIGRP Hello Message Introduction

4- EIGRP Passive Interface Introduction

5- EIGRP Passive Interface Configuration in Classic Mode

6- EIGRP Passive Interface Configuration in Named   Mode

7- EIGRP Neighborship Conditions Introduction

8- EIGRP Authentication Introduction

9- Key Chain Introduction

10- EIGRP Authentication Configuration in Classic Mode

11- EIGRP Authentication Configuration in Named   Mode

12- EIGRP K Values Introduction

13- EIGRP K Values Configuration in Classic Mode

14- EIGRP K Values Configuration in Named   Mode

15- EIGRP Hello Interval Introduction

16- EIGRP Hold  Time Introduction

17- EIGRP Hello Interval Configuration in Classic Mode

18- EIGRP Hello Interval Configuration in Named   Mode

19- EIGRP Hold Time Configuration in Classic Mode

20- EIGRP Hold Time Configuration in Named   Mode

1- Interface Bandwidth   Introduction

2- Interface Delay       Introduction

3- Interface Load        Introduction

4- Interface Reliability Introduction

5- Interface MTU         Introduction

6- EIGRP Update          Introduction

7- EIGRP Update Metric Parammeters Introduction

8- EIGRP Update Non-Metric Parammeters Introduction

9- EIGRP Classic Path Metric Calculation Introduction

10- EIGRP Classic Path Metric Calculation Calculation

11- EIGRP Classic Path Metric Calculation Shortcomings

12- EIGRP Wide    Path Metric Calculation Introduction

13- EIGRP Wide    Path Metric Calculation Calculation

14- EIGRP Wide Metric Metric Backward Compatibility Introduction

1- EIGRP Successor Path [S] Introduction

2- EIGRP Feasible Successor [FS] Introduction

3- EIGRP Feasible Distance [FD] Introduction

4- EIGRP Reported Distance [RD] Introduction

5- EIGRP Feasibility Condition Introduction

6- EIGRP Query/Reply Mechanism Introduction

7- EIGRP SIA-Query/SIA Reply Introduction

8- EIGRP Active Timer Introduction

9- EIGRP Active Timer Configuration in Traditional Configuration

10- EIGRP Active Timer Configuration in Named Configuration

11- EIGRP Passive / Active Path Introduction

12- EIGRP Stuck in Active [SIA] Introduction

1- EIGRP Load Balancing Introduction

2- EIGRP Equal Cost Multi Path [ECMP] Introduction

3- EIGRP Equal Cost Multi Path [ECMP] Classic Configuration

4- EIGRP Equal Cost Multi Path [ECMP] Named Configuration

5- EIGRP Equal Cost Multi Path [ECMP] Verification

6- EIGRP Unequal Cost Load Balancing [UCLB] Introduction

7- EIGRP Variance Multiplier Introduction

8- EIGRP Unequal Cost Load Balancing [UCLB] Classic Configuration

9- EIGRP Unequal Cost Load Balancing [UCLB] Named Configuration

10- EIGRP Unequal Cost Load Balancing [UCLB] Verification

1- Route Summarization Introduction

2- EIGRP Route Summarization Introduction

3- EIGRP Interface Specific Summarization Introduction

4- EIGRP Summarization Metric Introduction

5- EIGRP Interface Specific Summarization Classic Configuration

6- EIGRP Summary Metric Classic Configuration

7- EIGRP Interface Specific Summarization Named Configuration

8- EIGRP Summary Metric Named Configuration

9- EIGRP Summary Route (Discard Route) Introduction

10- EIGRP Automatic Summarization Introduction

11- EIGRP Automatic Summarization Classic Configuration

12- EIGRP Automatic Summarization Named   Configuration


Open Shortest Path First (OSPF)

1- Open Shortest Path First [OSPF] Introduction

2- Open Shortest Path First [OSPF] Fundamentals

3- OSPF Internal Router Introduction

4- OSPF Area Border Router (ABR) Introduction

5- OSPF Backbone Router Introduction

6- OSPF Autonomous System Boundary Router (ASBR) Introduction

7- OSPF Considerations Introduction

8- OSPF Area Fundamentals

9- OSPF Area's Advantages Introduction

10- Link State (LS) Algorithm Introduction

1- OSPF Traditional (Network Command) Introduction

2- OSPF Traditional (Network Command) Configuration

3- OSPF Traditional (Network Command) Verification

4- OSPF Interface Specific (Explicit Command) Introduction

5- OSPF Interface Specific (Explicit Command) Configuration

6- OSPF Interface Specific (Explicit Command) Verification

7- OSPF Router-ID Introduction

8- OSPF Router-ID Configuration

9- OSPF Router-ID Verification

10- OSPF Passive-Interface Introduction

11- OSPF Passive-Interface Configuration

12- OSPF Passive-Interface Verification

13- OSPF Cost Introduction

1- OSPF Neighborship Introduction

2- OSPF Multicast Address Introduction

3- OSPF Hello Packet Introduction

4- OSPF Neighborship Requirement Introduction

5- OSPF Neighborship Router-ID Requirement

6- OSPF Neighborship Subnet Number Requirement

7- OSPF Neighborship MTU Requirement

8- OSPF Neighborship Area-ID Requirement

9- OSPF Hello Timer Introduction

10- OSPF Dead Timer Introduction

11- OSPF Hello Timer Configuration

12- OSPF Dead Timer Configuration

13- OSPF Neighborship Hello Timer Requirement

14- OSPF Neighborship Dead Timer Requirement

15- OSPF Authentication Types Introduction

16- OSPF Plain Text Authentication Configuration

17- OSPF Message Digest Authentication Configuration

1- OSPF Finite State Machine [FSM] Introduction

2- OSPF States Introduction

3- OSPF Down State Introduction

4- OSPF Init State Introduction

5- OSPF 2-Way State Introduction

6- OSPF Exstart State Introduction

7- OSPF Exchange State Introduction

8- OSPF Loading State Introduction

9- OSPF Full State Introduction

10- OSPF Attempt State Introduction

11- OSPF Static Neighborship Introduction

12- OSPF Static Neighborship Configuration

13- OSPF Static Neighborship Verification

14- OSPF Database Description [DBD] Introduction

15- OSPF Link State Request [LSR] Introduction

16- OSPF Link State Update [LSU] Introduction

17- OSPF Link State Acknowledgement [LSAck] Introduction

1- OSPF Designated Router [DR] Introduction

2- OSPF Backup Designated Router [BDR] Introduction

3- OSPF DRother Introduction

4- OSPF Priority Introduction

5- OSPF DR/BDR Selection Rules Introduction

6- OSPF DR/BDR Configuration

7- OSPF DR/BDR Verification

1- OSPF LSA Types Introduction

2- OSPF LSA Type-1 ( Router LSA ) Introduction

3- OSPF LSA Type-1 Contents Introduction

4- OSPF Stub Link Introduction

5- OSPF Single Area with Stub Links Configuration

6- OSPF LSA Type-1 Verification

7- OSPF LSA Age Introduction

8- OSPF LSA Sequence Number Introduction

9- OSPF LSA Refresh Time Introduction

1- OSPF LSA Type-1 Transit Link Introduction

2- OSPF LSA Type-2 ( Network LSA ) Introduction

3- OSPF LSA Type-2 Contents Introduction

4- OSPF LSA Type-2 Verification

5- OSPF Single Area with Stub and Transit Link Configuration

1- OSPF LSA Type-3 ( Summary LSA ) Introduction

2- OSPF LSA Type-3 Contents Introduction

3- OSPF LSA Type-3 Verification

4- OSPF LSA Type-3 LSA ID Introduction

1- OSPF Special Rule About Intra-Area and Inter-Area Routes Introduction

2- OSPF Special Rule About Intra-Area and Inter-Area Routes Configuration

3- OSPF Special Rule About Intra-Area and Inter-Area Routes Verification

4- Comparing OSPF Intra Area , Inter Area , External Type 2 , External Type 1

1- OSPF Default Route Advertisement Introduction

2- OSPF Default Information Originate Command Introduction

3- OSPF Default Information Originate Metric Command Introduction

4- OSPF Default Information Originate Metric-Type Command Introduction

5- OSPF Default Information Originate Always Command Introduction

6- OSPF Default Information Originate Route-Map Introduction

7- OSPF Default Route Advertisement with Single Edge Configuration

8- OSPF Default Route Advertisement with single Edge Verification

9- OSPF Default Route Advertisement with Multiple Edge Configuration

10- OSPF Default Route Advertisement with Multiple Edge Verification

1- OSPF Automatic Cost Introduction

2- OSPF Automatic Cost Reference Bandwidth Configuration

3- OSPF Automatic Cost Reference Bandwidth Verification

4- OSPF Manual Cost Introduction

5- OSPF Manual Cost Configuration

6- OSPF Manual Cost Verification

7- OSPF Path Selection Rules Introduction

8- OSPF Intra-Area Routes vs Inter-Area Routes Introduction

9- OSPF Intra-Area Routes vs Inter-Area Routes Verification

10- OSPF Inter-Area Routes vs Inter-Area Routes Introduction

11- OSPF Inter-Area Routes vs Inter-Area Routes Verification

12- OSPF Equal Cost Multi Path [ECMP] Introduction

13- OSPF Equal Cost Multi Path [ECMP] Configuration

14- OSPF Equal Cost Multi Path [ECMP] Verification

1- OSPF Summarization Introduction

2- OSPF Inter-Area Summarization Introduction

3- OSPF Inter-Area Summarization Configuration

4- OSPF Inter-Area Summarization Verification

5- OSPF Inter-Area Discard Route Introduction

6- OSPF Filtering with Inter-Area Summarization Command

1- OSPF Network Type Introduction

2- OSPF Point-to-Point Network Type Introduction

3- OSPF Point-to-Point Network Type Configuration

4- OSPF Broadcast Network Type Introduction

5- OSPF Broadcast Network Type Configuration

6- OSPF Non-Broadcast Network Type Introduction

7- OSPF Non-Broadcast Network Type Configuration

8- OSPF Point-to-Multipoint Network Type Introduction

9- OSPF Point-to-Multipoint Network Type Configuration

10- OSPF Point-to-Multipoint Non-Broadcast Network Type Introduction

11- OSPF Point-to-Multipoint Non-Broadcast Network Type Configuration

12- OSPF Loopback Network Type Introduction

13- OSPF Loopback Network Type Configuration

1- OSPF Filtering with Summarization Introduction

2- OSPF Filtering with Summarization Configuration

3- OSPF Filtering with Summarization Verification

4- OSPF Area Filtering Introduction

5- OSPF Area Filtering Configuration with IP Prefix List

6- OSPF Area Filtering Verification

7- Local OSPF Filtering Introduction

8- Local OSPF Filtering Configuration with Access Control List

9- Local OSPF Filtering Configuration with IP Prefix List

10- Local OSPF Filtering Configuration with Route Map

11- Local OSPF Filtering Verification

1- OSPFv3 Fundamentals Introduction

2- OSPFv3 Basic Configuration Command Introduction

3- OSPFv3 Verification Commands Introduction

4- OSPFv3 Example Configuration

5- OSPFv3 Example Verification

6- OSPFv3 Passive Interface Introduction and Configuration

7- OSPFv3 Summarization Introduction and Configuration

8- OSPFv3 Network Type Introduction and Configuration

9- OSPFv3 Link-Local Forwarding Introduction and Configuration

10- OSPFv3 Packet Types Introduction

1- OSPFv3 LSAs Introduction

2- OSPFv3 LSA Type-1 [ Router LSA ] Introduction

3- OSPFv3 LSA Type-2 [ Network LSA ] Introduction

4- OSPFv3 LSA Type-3 [ Inter-Area-Prefix LSA ] Introduction

5- OSPFv3 LSA Type-4 [ Inter-Area-Router LSA ] Introduction

6- OSPFv3 LSA Type-5 [ AS-External LSA ] Introduction

7- OSPFv3 LSA Type-6 [ Group-Membership LSA ] Introduction

8- OSPFv3 LSA Type-7 [ Type-7 LSA ] Introduction

9- OSPFv3 LSA Type-8 [ Link LSA ] Introduction

10- OSPFv3 LSA Type-9 [ Intra-Area-Prefix LSA ] Introduction

11- OSPFv3 LSA Flooding Scope Introduction

12- OSPFv3 LSA Type Code Introduction [ U / S2 / S1 / Function ]

13- OSPFv4 Option bits Introduction [ v6 / E / R / DC / MC / N ]

1- OSPFv3 Address Family Configuration Introduction

2- OSPFv3 Address Family Configuration

3- OSPFv3 Address Family Verification

4- OSPFv3 Address Family Show Command Introduction

Border Gateway Protocol (BGP)

1- Border Gateway Protocol [BGP] Introduction

2- Path Vector Protocol Introduction

3- BGP Update Message Introduction

4- BGP Path Attribute [PA] Introduction

5- BGP AS-Path PA Introduction

6- BGP AS-Path Best Path Selection Introduction

7- BGP AS-Path Loop Prevention Introduction

8- BGP Messages Introduction

9- TCP 3-Way Handshake Introduction

10- BGP Traditional Configuration

11- BGP Traditional Verification

12- BGP Address Family Configuration

13- BGP Address Family Verification

14- BGP Router-ID Introduction

15- BGP Router-ID Configuration

16- BGP Router-ID Verification

1- BGP Timers Introduction

2- BGP Keep Alive Introduction

3- BGP Keep Alive Interval Introduction

4- BGP Hold Time Introduction

5- BGP Keep Alive Configuration

6- BGP Keep Alive Verification

7- BGP Hold Time Configuration

8- BGP Hold Time Verification

9- BGP Neighborship Over Multiple Links Introduction

10- BGP Neighborship Over Multiple Links Configuration

11- BGP Neighborship Over Multiple Links Verification

12- BGP Finite State Machine [FSM] Introduction

13- BGP States Introudction

14- BGP IDLE , Connect , Active , OpenSent , OpenConfirm , Established State

1- BGP Table Introduction

2- BGP Update Introduction

3- BGP Methods for Injecting Routes into BGP Table Introduction

4- Injecting Routes into BGP Table with Network Command Introduction

5- Injecting Routes into BGP Table with Network Command Configuration

6- Injecting Routes into BGP Table with Network Command Verification

7- The Effect of Auto Summary Command to Network Statement

8- Injecting Routes into BGP Table with Redistribution Command Introduction

9- Injecting Routes into BGP Table with Redistribution Command Configuration

10- Injecting Routes into BGP Table with Redistribution Command Verification

11- The Effect of Auto Summary Command to Redistribution

1- BGP Summarization Introduction

2- Benefits of BGP Summarization Introduction

3- BGP Aggregation Command Introduction

4- BGP Aggregation Command with Summary-only Introduction

5- BGP Aggregation Command with AS-SET Introduction

6- BGP Aggreagtion Configuration

7- BGP Aggregation Command with Summary-only Configuration

8- BGP Aggregation Command with AS-SET Configuration

9- BGP AS-Path Segments Introduction

10- BGP Aggregator Attribute Introduction

11- BGP Atomic Aggregator Introduction

12- BGP Discard Route Introduction

1- Multi Protocol BGP [MP-BGP] Introduction

2- MP-BGP for IPv6 Configuration over IPv6 TCP Session Introduction

3- MP-BGP for IPv6 Configuration over IPv6 TCP Session Configuration

4- MP-BGP for IPv6 Configuration over IPv6 TCP Session Verification

5- MP-BGP for IPv6 Configuration over IPv4 TCP Session Introduction

6- MP-BGP for IPv6 Configuration over IPv4 TCP Session Configuration

7- MP-BGP for IPv6 Configuration over IPv4 TCP Session Verification

8- MP-BGP IPv6 Summarization Introduction

9- MP-BGP IPv6 Summarization Configuration

10- MP-BGP IPv6 Summarization Verification

11- BGP MP-REACH_NLRI Path Attribute Introduction

12- BGP MP-UNREACH_NLRI Path Attribute Introduction

1- Access Control List [ACL] Introduction

2- Access Control List [ACL] Process Introduction

3- Standard Numbered Access Control List [ACL] Introduction 

4- Standard Named Access Control List [ACL] Introduction

5- Extended Numbered Access Control List [ACL] Introduction

6- Extended Named Access Control List [ACL] Introduction

7- Standard Access Control List [ACL] Configuration

8- Extended Access Control List [ACL] Configuration

9- Standard Access Control List [ACL] for IGP Introduction

10- Standard Access Control List [ACL] for IGP Configuration

11- Standard Access Control List [ACL] for BGP Introduction

12- Standard Access Control List [ACL] for BGP Configuration

13- Extended Access Control List [ACL] for IGP Introduction

14- Extended Access Control List [ACL] for IGP Configuration

15- Extended Access Control List [ACL] for BGP Introduction

16- Extended Access Control List [ACL] for BGP Configuration

1- IP Prefix List Introduction

2- IP Prefix List Process Introduction

3- IP Prefix List High Order Bit Pattern Introduction 

4- IP Prefix List High Order Bit Count Introduction

5- IPv6 Prefix List Introduction

6- IP Prefix List Configuration

7- IP Prefix List Verification

8- IPv6 Prefix List Configuration

9- IPv6 Prefix List Verification

1- Route-Map Introduction

2- Route-Map Components Introduction

3- Route-Map Processing Order Introduction 

4- Route-Map Match Conditions Introduction

5- Route-Map Optional Actions Introduction

6- Route-Map Multiple Match Conditions [Boolean OR] Introduction

7- Route-Map Multiple Match Conditions [Boolean OR] Configuration

8- Route-Map Multiple Match Conditions [Boolean AND] Introduction

9- Route-Map Multiple Match Conditions [Boolean AND] Configuration

10- Route-Map Continue Introduction

11- Route-Map Continue Configuration

1- BGP Filtering Introduction

2- BGP Filtering with ACL Configuration

3- BGP Loc-RIB Table Introduction

4- BGP Adj-RIB-In Table Introduction

5- BGP Adj-RIB-Out Table Introduction

6- BGP Soft Reconfiguration Inbound Introudction

7- BGP Filtering with ACL Verification

8- BGP Filtering with IP Prefix Configuration

9- BGP Filtering with IP Prefix Verification

10- BGP Filtering with Route-Map Configuration

11- BGP Filtering with Route-Map Verification

12- BGP Filtering with AS-Path ACL Configuration

13- BGP Filtering with AS-Path ACL Verification

14- BGP Regular Expression [REGEXP] Introduction

1- BGP Clear(Reset) Introduction

2- BGP Hard Clear Introduction

3- BGP Hard Clear Configuration

4- BGP Hard Clear Verification

5- BGP Outbound Soft Clear Introduction

6- BGP Outbound Soft Clear Configuration

7- BGP Outbound Soft Clear Verification

8- BGP Inbound Soft Clear Introduction

9- BGP Inbound Soft Clear Configuration

10- BGP Inbound Soft Clear Verification

1- BGP Community Introduction

2- BGP Community Configuration with Route-Map

3- BGP Community Advertisement Configuration

4- BGP Community New Format Presentation

5- BGP Community Replace Configuration

6- BGP Community Append  Configuration

7- BGP Stundard Number Community List Configuration

8- BGP Stundard Named  Community List Configuration

9- BGP Expanded Number Community List Configuration

10- BGP Expanded Named  Community List Configuration

11- BGP Well-Known Community Introduction

12- BGP Internet Well-Known Community Introduction

13- BGP Internet Well-Known Community Configuration

14- BGP No-Advertise Well-Known Community Introduction

15- BGP No-Advertise Well-Known Community Configuration

16- BGP No-Export Well-Known Community Introduction

17- BGP No-Export Well-Known Community Configuration

18- BGP Local-As Well-Known Community Introduction

19- BGP Local-As Well-Known Community Configuration

1- BGP Path Selection Using the Longest Match Introduction

2- BGP Path Selection Using the Longest Match Configuration

3- BGP Path Selection Using the Longest Match Verification

4- BGP Path Selection Using the Longest Match Limitation

1- BGP Best Path Selection Rules

2- BGP Next Hop Reachability Requirement Introduction

3- BGP Weight Attribute introduction

4- BGP Weight Attribute Configuration per neighbor

5- BGP Weight Attribute Configuration per route

6- BGP Weight Attribute for Locally Injected Routes

7- BGP Weight Attribute Verification


1- BGP Best Path Selection RulesIntroduction

2- BGP Local Preference Introduction

3- BGP Local Preference Configuration Globally

4- BGP Local Preference Configuration per route

5- BGP Local Preference Verification

6- Routing Table Manager [RTM] Introduction

7- BGP RIB-Failure Introduction

8- BGP RIB-Failure Verification

1- BGP Best Path Selection Rules Introduction

2- BGP Preference of Locally Injected Path Introduction

3- BGP Preference of Locally Injected Path Verification


1- BGP Best Path Selection Rules Introduction

2- BGP Accumulated Interior Gateway Protocol (AIGP) Introduction

3- BGP Accumulated Interior Gateway Protocol (AIGP) Usage

4- BGP Accumulated Interior Gateway Protocol (AIGP) Configuration

5- BGP Accumulated Interior Gateway Protocol (AIGP) Verification


1- BGP Best Path Selection Rules Introduction

2- BGP AS-Path Introduction

3- BGP Best Path Selection with AS-Path Introduction

4- BGP Best Path Selection with AS-Path Verification

5- BGP AS-Path Prepending Introduction

6- BGP AS-Path Prepending Configuration

7- BGP AS-Path Prepending Verification

1- BGP Best Path Selection Rules Introduction

2- BGP Origin-Code Introduction

3- BGP Best Path Selection with Origin-Code Introduction

4- BGP Best Path Selection with Origin-Code Verification

5- BGP Policy Configuration with Origin Code

1- BGP Best Path Selection Rules Introduction

2- BGP Multi Exit Discriminator [MED] Introduction

3- BGP Multi Exit Discriminator [MED] Default Behavior Introduction

4- BGP Multi Exit Discriminator [MED] Default Behavior Verification

5- BGP Multi Exit Discriminator [MED] Inbound Policy Introduction

6- BGP Multi Exit Discriminator [MED] Inbound Policy Configuration

7- BGP Multi Exit Discriminator [MED] Inbound Policy Verification

1- BGP Best Path Selection Rules Introduction

2- BGP Best Path Selection about Prefer eBGP to iBGP Path Introduction

3- BGP Best Path Selection about Prefer eBGP to iBGP Path Configuration

4- BGP Best Path Selection about Prefer eBGP to iBGP Path Verification

1- BGP Best Path Selection Rules Introduction

2- BGP Best Path Selection about Lowest IGP Metric to Next-Hop Introduction

3- BGP Best Path Selection about Lowest IGP Metric to Next-Hop Configuration

4- BGP Best Path Selection about Lowest IGP Metric to Next-Hop Verification

1- BGP Best Path Selection Rules Introduction

2- BGP Best Path Selection about Prefer Oldest eBGP Path Introduction

3- BGP Best Path Selection about Prefer Oldest eBGP Path Configuration

4- BGP Best Path Selection about Prefer Oldest eBGP Path Verification

1- BGP Best Path Selection Rules Introduction

2- BGP Best Path Selection about Lower BGP Router ID  Introduction

3- BGP Best Path Selection about Lower BGP Router ID  Configuration

4- BGP Best Path Selection about Lower BGP Router ID  Verification

1- BGP Best Path Selection Rules Introduction

2- BGP Best Path Selection about Lowest Neighbor IP Address  Introduction

3- BGP Best Path Selection about Lowest Neighbor IP Address  Configuration

4- BGP Best Path Selection about Lowest Neighbor IP Address  Verification

1- BGP Path Attributes Types Introduction

2- BGP Well-Known Attributes Introduction

3- BGP Optional Attributes Introduction

4- BGP Well-Known Manadatory Introduction

5- BGP Well-Known Discretionary Introduction

6- BGP Optional Transitive Introduction

7- BGP Optional Non-Transitive Introduction


1- 16-bits Autonomous-System (AS) Introduction

2- 32-bits Autonomous-System (AS) Introduction

3- Public AS Number Introduction

4- Private AS Number Introduction

5- Documentation AS Number Introduction

6- BGP Remove Private AS Number Introduction

7- BGP Remove Private AS Number Configuration

8- BGP Remove Private AS Number Verification


1- BGP Multihoming Introduction

2- Resiliency in Service Providers Introduction

3- Internet Transit Routing Introduction

4- Branch Transit Routing Introduction

5- Deterministic Routing During Failover Introduction

6- Nondeterministic Routing During Failover Introduction

Policy Based Routing (PBR)

1- What is the Policy Based Routing or PBR

2- Relation between a PBR and Routing-Table

3- PBR Configuration with ACL as a Match Conditioner

4- PBR Configuration with outgoing Interface  as a Set Conditioner

5- PBR Configuration with Next Hop IP Address as a Set Conditioner

6- PBR Verification with Show and Debug Commands

1- What is the Policy Based Routing or PBR

2- Relation between a PBR and Routing-Table

3- PBR Configuration with Packet Length as a Match Conditioner

4- PBR Configuration with outgoing Interface  as a Set Conditioner

5- PBR Configuration with Next Hop IP Address as a Set Conditioner

6- PBR Verification with Show and Debug Commands

IP Multicast

1- Multicast Fundamentals Introduction

2- Transmission methods Introduction

3- Unicast Transmission methods Introduction

4- Multicast Transmission methods Introduction

5- Broadcast Transmission methods Introduction

6- Multicast Addressing Introduction

7- Well-Known Reserved Multicast Addresses Introduction

8- IP Multicast Addresses Assigned by IANA Introduction

9- Local network control block (224.0.0/24) Introduction

10- Internetwork control block (224.0.1.0/24) Introduction

11- Source Specific Multicast (SSM) block (232.0.0.0/8) Introduction

12- GLOP block (233.0.0.0/8) Introduction

13- Administratively scoped block (239.0.0.0/8) Introduction

14- Layer 2 Multicast Addresses Introduction


1- Internet Group Management Protocol [IGMP] v1 Introduction

2- Internet Group Management Protocol [IGMP] v1 Message Format Introduction

3- Internet Group Management Protocol [IGMP] v1 Message Types  Introduction

4- Internet Group Management Protocol [IGMP] v1 Configuration

5- Internet Group Management Protocol [IGMP] v2 Introduction

6- Internet Group Management Protocol [IGMP] v2 Message Format Introduction

7- Internet Group Management Protocol [IGMP] v2 Message Types  Introduction

8- Internet Group Management Protocol [IGMP] v2 Configuration

9- Internet Group Management Protocol [IGMP] v3 Introduction

10- Internet Group Management Protocol [IGMP] v3 Message Format Introduction

11- Internet Group Management Protocol [IGMP] v3 Message Types  Introduction

12- Internet Group Management Protocol [IGMP] v3 Configuration

13- Internet Group Management Protocol [IGMP] Snooping Introduction

1- Protocol Independent Multicast [PIM] Introduction

2- PIM Distribution Trees - Source Tree Introduction

3- PIM Distribution Trees - Shortest Path Tree(SPT) Introduction

4- Reverse Path Forwarding (RPF) Introduction

5- Reverse Path Forwarding (RPF) Interface Introduction

6- Reverse Path Forwarding (RPF) Neighbor Introduction

7- Multicast Routing Information Base (MRIB) Introduction

8- Multicast Forwarding Information Base (MFIB) Introduction

9- Multicast state (S,G) Introduction

10- Incoming interface (IIF) Introduction

11- Outgoing interface List (OIL) Introduction

12- Last-hop router (LHR) Introduction

13- First-hop router (FHR) Introduction

14- PIM operating modes Introduction

15- PIM Dense Mode Introduction

16- PIM-DM Flood and Prune Operation Introduction

17- PIM Dense Mode Configuration

18- PIM Dense Mode Verification

1- Protocol Independent Multicast [PIM] Introduction

2- PIM Distribution Trees - Shared Tree Introduction

3- PIM Distribution Trees - RP trees (RPT) Introduction

4- PIM Sparse Mode Introduction

5- PIM Sparse Mode Configuration

6- PIM Sparse Mode Verification

7- PIM Sparse Mode Source Registration Introduction

8- PIM Register Message Introduction

9- PIM Register Stop Message Introduction

10- PIM Join Message Introduction

11- PIM Prune Message Introduction

12- PIM Sparse Mode PIM SPT Switchover  Introduction

13- PIM Sparse Mode Reverse Path Forwarding [RPF] Introduction

1- PIM Sparse Mode Introduction

2- PIM Shared and Source Path Trees Introduction

3- PIM Sparse Mode Shared Tree Join Introduction

4- PIM Sparse Mode Source Registration Introduction

5- PIM Sparse Mode PIM SPT Switchover Introduction

6- PIM Designated Router Introduction

7- PIM Designated Router Configuration

8- PIM Designated Router Verification

9- PIM Forwarder Router Introduction

10- PIM Forwarder Router Configuration

11- PIM Forwarder Router Verification

12- PIM Assert Mechanism Introduction

1- Rendezvous Points Introduction

2- Static RP Introduction

3- Static RP Configuration

4- Static RP Verification

5- Cisco Auto-RP Introduction

6- Cisco Auto-RP Candidate RPs Introduction

7- Cisco Auto-RP Mapping Agent Introduction

8- Cisco Auto-RP Configuration

9- Cisco Auto-RP Verification

10- PIM Bootstrap Router Introduction

11- PIM Bootstrap Router Candidate RPs Introduction

12- PIM Bootstrap Router BSR Introduction

13- PIM Bootstrap Router Configuration

14- PIM Bootstrap Router Verification

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Covers a wide range of topics relevant to modern enterprise networks, including routing, switching, security, automation, and advanced network services, which are essential for CCNP/CCIE certifications
Provides practical, hands-on experience with critical technologies like SD-WAN, VPNs, QoS, and network security, enabling learners to implement cutting-edge solutions and troubleshoot network challenges effectively
Explores advanced routing protocols, including EIGRP, OSPFv2/v3, and BGP, which are crucial for designing and managing complex, scalable, and secure networks in enterprise environments
Includes topics such as spanning tree protocol, VLAN trunking, and EtherChannel bundles, which are foundational for understanding and configuring modern network infrastructure
Features a detailed exploration of BGP path selection rules, including attributes like weight, local preference, and AS-path, which are essential for advanced network design and troubleshooting

Save this course

Save Complete Teaching of ENCOR 350-401 by Arash Deljoo to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Complete Teaching of ENCOR 350-401 by Arash Deljoo with these activities:
Review TCP/IP and OSI Models
Reinforce foundational knowledge of the TCP/IP and OSI models to better understand packet forwarding and network communication concepts covered in the course.
Browse courses on TCP/IP Model
Show steps
  • Study the layers of the TCP/IP model.
  • Study the layers of the OSI model.
  • Compare and contrast the two models.
Review: Interconnections, Second Edition
Solidify understanding of fundamental networking concepts by reviewing a classic text on network interconnections.
Show steps
  • Read the chapters on bridging and switching.
  • Read the chapters on routing protocols.
  • Take notes on key concepts and protocols.
Configure basic VLANs and Trunks
Practice configuring VLANs and trunk ports on Cisco switches to reinforce understanding of network segmentation and inter-VLAN communication.
Show steps
  • Set up a lab environment with Cisco switches.
  • Configure VLANs on each switch.
  • Configure trunk ports between switches.
  • Verify VLAN and trunk configurations.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Follow Advanced OSPF Configuration Tutorials
Enhance OSPF skills by following advanced configuration tutorials, focusing on topics like OSPFv3, area filtering, and summarization.
Show steps
  • Find tutorials on advanced OSPF topics.
  • Follow the tutorials step-by-step.
  • Implement the configurations in a lab environment.
  • Document the configurations and results.
Document a Network Troubleshooting Scenario
Document a real or simulated network troubleshooting scenario, including the problem, troubleshooting steps, and resolution, to improve problem-solving skills.
Show steps
  • Choose a network troubleshooting scenario.
  • Document the initial problem and symptoms.
  • Describe the troubleshooting steps taken.
  • Explain the root cause and resolution.
Design and Implement a Redundant Network
Apply knowledge of STP, routing protocols, and EtherChannel to design and implement a resilient network topology with redundancy and failover capabilities.
Show steps
  • Design a network topology with redundant links.
  • Configure STP to prevent loops.
  • Configure a routing protocol for path selection.
  • Implement EtherChannel for link aggregation.
  • Test failover scenarios.
Review: BGP (Networking Technologies)
Deepen understanding of BGP by reviewing a dedicated text on the protocol.
View Melania on Amazon
Show steps
  • Read the chapters on BGP path selection.
  • Read the chapters on BGP policy configuration.
  • Read the chapters on BGP multihoming.
  • Take notes on key concepts and configurations.

Career center

Learners who complete Complete Teaching of ENCOR 350-401 by Arash Deljoo will develop knowledge and skills that may be useful to these careers:
Network Engineer
A Network Engineer designs, implements, and manages an organization's network infrastructure. This role requires a deep understanding of routing and switching protocols, network security, and automation, all of which are covered in the course. This course helps build a foundation for troubleshooting complex network issues. The practical hands-on experience with technologies such as SD-WAN, VPNs, and QoS detailed in the course curriculum are particularly relevant to the daily tasks of a network engineer. This course may be useful to anyone seeking to enter this field.
Network Administrator
A Network Administrator is responsible for the day-to-day maintenance and operation of a network. This involves monitoring network performance, configuring network devices, and resolving network issues. This course is highly relevant, as it provides a deep dive into crucial networking concepts and practical configuration skills. The detailed modules on routing, switching, and network services in this course will help to prepare a network administrator for managing the technologies used in modern enterprise networks. This course may be useful to anyone seeking to enter this field.
Systems Engineer
A Systems Engineer focuses on the overall design, integration, and management of complex systems, often including the network infrastructure. This role benefits greatly from a solid knowledge of networking, security, and automation concepts which are covered in this course. A systems engineer would leverage the hands-on experience with critical technologies provided by the course to help design and deploy effective solutions. This course may be useful to anyone seeking to enter this field.
Solutions Architect
A Solutions Architect designs and plans IT solutions to meet specific business needs, requiring a broad understanding of many technologies, including networking. The comprehensive coverage of network technologies, routing protocols, and security provided by the course is perfect for a solutions architect. The course's practical focus on network design and configuration helps a solutions architect develop robust, scalable network solutions. This course may be useful to anyone seeking to enter this field.
IT Manager
An IT manager oversees the planning, implementation, and maintenance of an organization's information technology systems, including networking infrastructure. A strong understanding of network operations and technologies, which this course provides, is vital for an IT manager. Specifically, the course's hands-on approach to network management can assist them in making informed decisions about their network and teams. This course may be useful to anyone seeking to enter this field.
Cybersecurity Analyst
A Cybersecurity Analyst safeguards an organization’s network and systems from threats. Understanding network protocols and security measures is key, and this course has modules on network security, access control, and VPNs. The course's coverage of network security and access control mechanisms directly helps a cybersecurity analyst understand network vulnerabilities. This course may be useful to anyone seeking to enter this field.
Cloud Network Engineer
A Cloud Network Engineer designs and manages cloud-based network infrastructure. This role needs a solid foundation in network fundamentals, which is exactly what this course offers by covering routing, switching, and network services. The course also covers modern technologies like SD-WAN and VPNs, which are directly applicable to cloud networking. This course may be useful to anyone seeking to enter this field.
Network Consultant
A Network Consultant advises organizations on how to improve their network infrastructure. This requires a thorough understanding of network technologies, which is a core focus of this course. The course provides a comprehensive overview of network design, configuration, and troubleshooting, enabling a network consultant to offer effective solutions. This course may be useful to anyone seeking to enter this field.
Technical Support Engineer
A Technical Support Engineer is responsible for assisting clients with technical issues regarding hardware and software, which can include networking problems. This course, with its hands-on labs and detailed explanations of network protocols, will greatly aid a technical support engineer. The understanding of routing, switching, and other network services taught in the course helps in effective troubleshooting and issue resolution. This course may be useful to anyone seeking to enter this field.
Telecommunications Specialist
A Telecommunications Specialist installs, maintains, and optimizes an organization's communication systems, often including network infrastructure. This course covers many crucial networking concepts and practical configuration skills, which is beneficial for a telecommunications specialist. The modules on routing, switching, and network services directly enhance the ability to manage modern communication networks. This course may be useful to anyone seeking to enter this field.
IT Support Specialist
An IT Support Specialist provides technical help to users, often involving network connectivity and troubleshooting. This course provides a solid understanding of networking fundamentals, like how data travels through a network, which is useful for an IT support specialist. This course covers various aspects of routing, switching, and network security, which can help an IT support specialist resolve network issues more effectively. This course may be useful to anyone seeking to enter this field.
Field Service Technician
A Field Service Technician installs and repairs equipment at client sites, and this could include networking hardware. The knowledge of network technologies, configurations, and troubleshooting, as taught in this course, would help a field service technician handle a variety of on-site network issues. The course's practical approach to solving issues with various technologies makes this course suitable for a someone in this role. This course may be useful to anyone seeking to enter this field.
Network Operations Center Technician
A Network Operations Center Technician monitors network infrastructure, responds to alerts, and troubleshoots issues. This role is greatly enhanced by the in-depth knowledge of network technologies, detailed in this course. The practical skills in configuring and troubleshooting network devices, covered in the course, are directly applicable to the responsibilities of a network operations center technician. This course may be useful to anyone seeking to enter this field.
Data Center Technician
A Data Center Technician is responsible for the physical maintenance and monitoring of data center equipment, including networking devices. This course provides a solid understanding of the network technologies these technicians often encounter. An understanding the course provides on routing, switching, and security can make them more effective and efficient in their role. This course may be useful to anyone seeking to enter this field.
Computer Systems Analyst
A Computer Systems Analyst studies an organization's existing computer systems and procedures and designs solutions to help it operate more efficiently, including network infrastructure. The course covers a wide range of technologies that a computer systems analyst should have comprehensive knowledge of, including routing, switching, and network security. A computer systems analyst will find that this course provides a solid practical foundation for designing and improving networks. This course may be useful to anyone seeking to enter this field.

Reading list

We've selected two books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Complete Teaching of ENCOR 350-401 by Arash Deljoo.
Provides a comprehensive understanding of the underlying principles of network bridging, routing, and switching. It valuable resource for understanding the fundamentals of network design and protocols. It is particularly useful for gaining a deeper understanding of the Spanning Tree Protocol (STP) and routing protocols like OSPF and BGP. This book is often used as a reference by network engineers and architects.
Provides an in-depth look at the Border Gateway Protocol (BGP), covering its architecture, configuration, and troubleshooting. It valuable resource for network engineers who need to understand and manage BGP in complex network environments. It is particularly useful for understanding BGP path selection, policy configuration, and multihoming scenarios. This book is often used as a reference by network architects and service providers.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2025 OpenCourser