CCNP
(ENCOR 350 - 701)
Join us for the Best CCNP (ENCOR 350-701) Training
Table Of Content
0
0
0
0
0
0
0
0
0
1 16
Our Shining Stars
0
Resources
9
Admission Process
8
13
Our Team
7
12
All Courses
6
06-11
Course Outline
5
05
Why CCNP?
4
04
Roadmap of Job Placements
3
03
Our USP’s
2
02
Overview
1
Certification Information 17
15
14
NS3Edu is a networking training institute located in Delhi, NCR. The highest selection ratio of students has made our
institute the best networking certification center in Gurgaon. We offer training in CCNA, CCNP, CCIE, Cisco SD-WAN,
Cisco Nexus, Cisco ISE, Cisco DNAC, and Cisco ACI. As per market demand, we have launched Fortinet, ISO 27000,
ISO 27005 and Lean Six Sigma White, Yellow & Green Belt Certification Training. Our Learn and Earn Diploma courses
are worth mentioning, it provides employment opportunities to students while learning. The biggest asset we have is
our team of certified trainers and advanced Cisco training labs. Furthermore, we offer students the opportunity to
practice on real OEM devices from multiple vendors. Our training curriculum is designed to create a learning ambience
that prepares the aspirants to compete, excel, and retain their winning edge.
To empower our candidate with in- depth knowledge of networking fundamentals along with real time industry
experience.
Our mission is to bring a transformative revolution to the IT Networking industry and make job seekersemployable.
Create 100% employable opportunities for students by making them industry-ready.
24x7 Lab Access
Cisco Certified Trainers
Online/Offline
Classroom Mode
Advanced Lab
Smart
Classrooms
Real-Time troubleshooting
on multi-vendor OEM devices
Q&A Preparation
& Assessment
Recorded Sessions
Employability
Enhancement
Programme
Lifetime Membership
Dedicated team
for easy placement
Industry Demand
Customised Courses
03| Our USP’s
04| Roadmap of Job Placement
Why CCNP?
Prestigious course that demonstrates expert-level knowledge and skills in networking technologies
and solutions.
Advance knowledge and skills in networking technologies and solutions, including routing,
switching, security, and wireless.
CCNP Professionals are highly regarded by employers, particularly in senior-level network
engineering and architecture positions.
Understand the design, deployment, management, and troubleshooting of complex network
solutions in a safe and controlled environment.
Validate your expert-level networking knowledge and skills in organizations around the world.
Gain advanced knowledge and skills in networking technologies and solutions to enhance your
professional development.
05| Why CCNP?
Course Outline
Weekend (Week 1)
Day Topic
Security Concepts
1 1.1. Explain common threats against on-premises and cloud environments
(1) On-premises: viruses, trojans, DoS/DDoS attacks, phishing, rootkits, man-
in-the middle attacks, SQL injection, cross-site scripting, malware
(2) Cloud: data breaches, insecure APIs, DoS/DDoS, compromised credentials
2 1.2. Compare common security vulnerabilities such as software bugs, weak
and/or hardcoded passwords, SQL injection, missing encryption, buffer overflow,
path traversal, cross-site scripting/forgery
3 1.3. Describe functions of the cryptography components such as hashing, encryption,
PKI, SSL, IPsec, NAT-T IPv4 for IPsec, pre-shared key and certificate based
authorization
4 1.4. Compare site-to-site VPN and remote access VPN deployment types such as sVTI,
IPsec, Cryptomap, DMVPN, FLEXVPN including high availability considerations,
and AnyConnect
Weekend (Week 2)
Day Topic
5 1.5. Describe security intelligence authoring, sharing, and consumption
6 1.6. Explain the role of the endpoint in protecting humans from phishing and
social engineering attacks
7 1.7. Explain North Bound and South Bound APIs in the SDN architecture
8 1.8. Explain DNAC APIs for network provisioning, optimization, monitoring,
and troubleshooting
9 1.9. Interpret basic Python scripts used to call Cisco Security appliances APIs
06| Course Online
Course Outline
Weekend (Week 3)
Day Topic
Network Security
11 2.1.Compare network security solutions that provide intrusion prevention and
firewall capabilities
12 2.2.Describe deployment models of network security solutions and architectures that provide
intrusion prevention and firewall capabilities
13 2.3.Describe the components, capabilities, and benefits of NetFlow and Flexible NetFlow records
14 2.4. Configure and verify network infrastructure security methods (router, switch, wireless)
1. Layer 2 methods (Network segmentation using VLANs and VRF-lite; Layer 2 and port
security; DHCP snooping; Dynamic ARP inspection; storm control; PVLANs to segregate
network traffic; and defenses against MAC, ARP, VLAN hopping, STP, and DHCP rogue
attacks
2. Device hardening of network infrastructure security devices (control plane, data plane,
management plane, and routing protocol security)
15 2.5. Implement segmentation, access control policies, AVC, URL filtering, and malware protection
Weekend (Week 4)
Day Topic
16 2.6. Implement management options for network security solutions such as
intrusion prevention and perimeter security (Single vs. multidevice manager, in-
band vs. out-of band, CDP, DNS, SCP, SFTP, and DHCP security and risks)
17 2.7. Configure AAA for device and network access (authentication and
authorization, TACACS+, RADIUS and RADIUS flows, accounting, and dACL)
18 2.8.Configure secure network management of perimeter security and infrastructure
devices (secure device management, SNMPv3, views, groups, users,
authentication, and encryption, secure logging, and NTP with authentication)
19 2.9.Configure and verify site-to-site VPN and remote access VPN
1) Site-to-site VPN utilizing Cisco routers and IOS
2) Remote access VPN using Cisco AnyConnect Secure Mobility client
3) Debug commands to view IPsec tunnel establishment and troubleshooting
07| Course Online
Weekend (Week 5)
Day Topic
Securing the Cloud
20 3.1. Identify security solutions for cloud environments
1) Public, private, hybrid, and community clouds
2) Cloud service models: SaaS, PaaS, IaaS (NIST 800-145)
21 3.2.Compare the customer vs. provider security responsibility for the different cloud
service models
1) Patch management in the cloud
2) Security assessment in the cloud
3) Cloud-delivered security solutions such as firewall, management, proxy, security intelligence,
and CASB
22 3.3.Describe the concept of DevSecOps (CI/CD pipeline, container orchestration,
and security
Weekend (Week 6)
Day Topic
26 3.4. Implement application and data security in cloud environments SDWAN use case,
device introduction, control plane
27 3.5. Identify security capabilities, deployment models, and policy management to secure
the cloud
28 3.6. Configure cloud logging and monitoring methodologies
29 3.7. Describe application and workload security concepts
08| Course Online
Weekend (Week 7)
Day Topic
Content Security
32 4.1.Implement traffic redirection and capture methods
33 4.2. Describe web proxy identity and authentication including transparent user
identification
34 4.3.Compare the components, capabilities, and benefits of local and cloud-based email
and web solutions (ESA, CES, WSA)
35 4.4. Configure and verify web and email security deployment methods to protect
on premises and remote users (inbound and outbound controls and policy
management)
Weekend (Week 8)
Day Topic
36 4.5.Configure and verify email security features such as SPAM filtering, antimalware filtering, DLP,
blacklisting, and email encryption
37 4.6.Configure and verify secure internet gateway and web security features such as blacklisting,
URL filtering, malware scanning, URL categorization, web application filtering, and TLS
decryption
38 4.7.Describe the components, capabilities, and benefits of Cisco Umbrella
39 4.8.Configure and verify web security controls on Cisco Umbrella (identities, URL content settings,
destination lists, and reporting)
Weekend (Week 9)
Day Topic
Endpoint Protection and Detection
40 5.1. Compare Endpoint Protection Platforms (EPP) and Endpoint Detection &
Response (EDR) solutions
41 5.2. Explain antimalware, retrospective security, Indication of Compromise (IOC),
antivirus, dynamic file analysis, and endpoint-sourced telemetry
42 5.3. Configure and verify outbreak control and quarantines to limit infection
43 5.4. Describe justifications for endpoint-based security
Weekend (Week 10)
Day Topic
41 5.5.Describe the value of endpoint device management and asset inventory such as MDM
42 5.6. Describe the uses and importance of a multifactor authentication (MFA) strategy
43 5.7.Describe endpoint posture assessment solutions to ensure endpoint security
44 5.8. Explain the importance of an endpoint patching strategy
10| Course Online
Weekend (Week 11)
Day Topic
Secure Network Access, Visibility, and Enforcement
45 6.1.Describe identity management and secure network access concepts such as
guest services, profiling, posture assessment and BYOD
46 6.2.Configure and verify network access device functionality such as 802.1X,
MAB, WebAuth
47 6.3.Describe network access with CoA
48 6.4.Describe the benefits of device compliance and application control
49 6.5.Explain exfiltration techniques (DNS tunneling, HTTPS, email,
FTP/SSH/SCP/SFTP, ICMP, Messenger, IRC, NTP)
Weekend (Week 11)
Day Topic
50 6.6. Describe the benefits of network telemetry
51 6.7.Describe the components, capabilities, and benefits of these security products
and solutions
1) Cisco Stealthwatch
2) Cisco Stealthwatch Cloud
3) Cisco pxGrid
4) Cisco Umbrella Investigate
5) Cisco Cognitive Threat Analytics
6) Cisco Encrypted Traffic Analytics
7) Cisco AnyConnect Network Visibility Module (NVM)
11| Course Online
12| All Courses
Founder
CCIE Security (#56833)
Trainer
CCIE Security (#60126)
Trainer
CCIE (#54008)
Trainer
CCIE, RHCE
Trainer
CCNA
PD Trainer
11| Our Team
13| Our Team
Admission Process
Reach Us Counselling
Session Demo Class
Scholarship
Exam
Student
Satisfaction
Enrollment &
Registration
Seat
Allocation
Lifetime
Support
Fee Payment
14| Admission Process
Resources
Cisco Certified
Trainers
Modules designed
as per Cisco Blueprint
Hands on
Lab Experience
Real time
troubleshooting
on multi-vendor
OEM devices
Study Material Q&A Preparation
and Assessment
Module
Recorded
Sessions
Free Career Growth
Consultation
15| Resources
16| Our Shining Stars
Pearson VUE conducts
Cisco Certification Exam.
For More Information about exam registration
17| Certification Information
-https://www.pearsonvue.com/cisco/online/instructions.pdf
Thank You
Visit our institute to learn more about our courses
and attractive offers.
We would be glad to help you.

Best CCNP (ENCOR 350 - 701) Training at NS3EDU

  • 1.
    CCNP (ENCOR 350 -701) Join us for the Best CCNP (ENCOR 350-701) Training
  • 2.
    Table Of Content 0 0 0 0 0 0 0 0 0 116 Our Shining Stars 0 Resources 9 Admission Process 8 13 Our Team 7 12 All Courses 6 06-11 Course Outline 5 05 Why CCNP? 4 04 Roadmap of Job Placements 3 03 Our USP’s 2 02 Overview 1 Certification Information 17 15 14
  • 3.
    NS3Edu is anetworking training institute located in Delhi, NCR. The highest selection ratio of students has made our institute the best networking certification center in Gurgaon. We offer training in CCNA, CCNP, CCIE, Cisco SD-WAN, Cisco Nexus, Cisco ISE, Cisco DNAC, and Cisco ACI. As per market demand, we have launched Fortinet, ISO 27000, ISO 27005 and Lean Six Sigma White, Yellow & Green Belt Certification Training. Our Learn and Earn Diploma courses are worth mentioning, it provides employment opportunities to students while learning. The biggest asset we have is our team of certified trainers and advanced Cisco training labs. Furthermore, we offer students the opportunity to practice on real OEM devices from multiple vendors. Our training curriculum is designed to create a learning ambience that prepares the aspirants to compete, excel, and retain their winning edge. To empower our candidate with in- depth knowledge of networking fundamentals along with real time industry experience. Our mission is to bring a transformative revolution to the IT Networking industry and make job seekersemployable. Create 100% employable opportunities for students by making them industry-ready.
  • 4.
    24x7 Lab Access CiscoCertified Trainers Online/Offline Classroom Mode Advanced Lab Smart Classrooms Real-Time troubleshooting on multi-vendor OEM devices Q&A Preparation & Assessment Recorded Sessions Employability Enhancement Programme Lifetime Membership Dedicated team for easy placement Industry Demand Customised Courses 03| Our USP’s
  • 5.
    04| Roadmap ofJob Placement
  • 6.
    Why CCNP? Prestigious coursethat demonstrates expert-level knowledge and skills in networking technologies and solutions. Advance knowledge and skills in networking technologies and solutions, including routing, switching, security, and wireless. CCNP Professionals are highly regarded by employers, particularly in senior-level network engineering and architecture positions. Understand the design, deployment, management, and troubleshooting of complex network solutions in a safe and controlled environment. Validate your expert-level networking knowledge and skills in organizations around the world. Gain advanced knowledge and skills in networking technologies and solutions to enhance your professional development. 05| Why CCNP?
  • 7.
    Course Outline Weekend (Week1) Day Topic Security Concepts 1 1.1. Explain common threats against on-premises and cloud environments (1) On-premises: viruses, trojans, DoS/DDoS attacks, phishing, rootkits, man- in-the middle attacks, SQL injection, cross-site scripting, malware (2) Cloud: data breaches, insecure APIs, DoS/DDoS, compromised credentials 2 1.2. Compare common security vulnerabilities such as software bugs, weak and/or hardcoded passwords, SQL injection, missing encryption, buffer overflow, path traversal, cross-site scripting/forgery 3 1.3. Describe functions of the cryptography components such as hashing, encryption, PKI, SSL, IPsec, NAT-T IPv4 for IPsec, pre-shared key and certificate based authorization 4 1.4. Compare site-to-site VPN and remote access VPN deployment types such as sVTI, IPsec, Cryptomap, DMVPN, FLEXVPN including high availability considerations, and AnyConnect Weekend (Week 2) Day Topic 5 1.5. Describe security intelligence authoring, sharing, and consumption 6 1.6. Explain the role of the endpoint in protecting humans from phishing and social engineering attacks 7 1.7. Explain North Bound and South Bound APIs in the SDN architecture 8 1.8. Explain DNAC APIs for network provisioning, optimization, monitoring, and troubleshooting 9 1.9. Interpret basic Python scripts used to call Cisco Security appliances APIs 06| Course Online
  • 8.
    Course Outline Weekend (Week3) Day Topic Network Security 11 2.1.Compare network security solutions that provide intrusion prevention and firewall capabilities 12 2.2.Describe deployment models of network security solutions and architectures that provide intrusion prevention and firewall capabilities 13 2.3.Describe the components, capabilities, and benefits of NetFlow and Flexible NetFlow records 14 2.4. Configure and verify network infrastructure security methods (router, switch, wireless) 1. Layer 2 methods (Network segmentation using VLANs and VRF-lite; Layer 2 and port security; DHCP snooping; Dynamic ARP inspection; storm control; PVLANs to segregate network traffic; and defenses against MAC, ARP, VLAN hopping, STP, and DHCP rogue attacks 2. Device hardening of network infrastructure security devices (control plane, data plane, management plane, and routing protocol security) 15 2.5. Implement segmentation, access control policies, AVC, URL filtering, and malware protection Weekend (Week 4) Day Topic 16 2.6. Implement management options for network security solutions such as intrusion prevention and perimeter security (Single vs. multidevice manager, in- band vs. out-of band, CDP, DNS, SCP, SFTP, and DHCP security and risks) 17 2.7. Configure AAA for device and network access (authentication and authorization, TACACS+, RADIUS and RADIUS flows, accounting, and dACL) 18 2.8.Configure secure network management of perimeter security and infrastructure devices (secure device management, SNMPv3, views, groups, users, authentication, and encryption, secure logging, and NTP with authentication) 19 2.9.Configure and verify site-to-site VPN and remote access VPN 1) Site-to-site VPN utilizing Cisco routers and IOS 2) Remote access VPN using Cisco AnyConnect Secure Mobility client 3) Debug commands to view IPsec tunnel establishment and troubleshooting 07| Course Online
  • 9.
    Weekend (Week 5) DayTopic Securing the Cloud 20 3.1. Identify security solutions for cloud environments 1) Public, private, hybrid, and community clouds 2) Cloud service models: SaaS, PaaS, IaaS (NIST 800-145) 21 3.2.Compare the customer vs. provider security responsibility for the different cloud service models 1) Patch management in the cloud 2) Security assessment in the cloud 3) Cloud-delivered security solutions such as firewall, management, proxy, security intelligence, and CASB 22 3.3.Describe the concept of DevSecOps (CI/CD pipeline, container orchestration, and security Weekend (Week 6) Day Topic 26 3.4. Implement application and data security in cloud environments SDWAN use case, device introduction, control plane 27 3.5. Identify security capabilities, deployment models, and policy management to secure the cloud 28 3.6. Configure cloud logging and monitoring methodologies 29 3.7. Describe application and workload security concepts 08| Course Online
  • 10.
    Weekend (Week 7) DayTopic Content Security 32 4.1.Implement traffic redirection and capture methods 33 4.2. Describe web proxy identity and authentication including transparent user identification 34 4.3.Compare the components, capabilities, and benefits of local and cloud-based email and web solutions (ESA, CES, WSA) 35 4.4. Configure and verify web and email security deployment methods to protect on premises and remote users (inbound and outbound controls and policy management) Weekend (Week 8) Day Topic 36 4.5.Configure and verify email security features such as SPAM filtering, antimalware filtering, DLP, blacklisting, and email encryption 37 4.6.Configure and verify secure internet gateway and web security features such as blacklisting, URL filtering, malware scanning, URL categorization, web application filtering, and TLS decryption 38 4.7.Describe the components, capabilities, and benefits of Cisco Umbrella 39 4.8.Configure and verify web security controls on Cisco Umbrella (identities, URL content settings, destination lists, and reporting)
  • 11.
    Weekend (Week 9) DayTopic Endpoint Protection and Detection 40 5.1. Compare Endpoint Protection Platforms (EPP) and Endpoint Detection & Response (EDR) solutions 41 5.2. Explain antimalware, retrospective security, Indication of Compromise (IOC), antivirus, dynamic file analysis, and endpoint-sourced telemetry 42 5.3. Configure and verify outbreak control and quarantines to limit infection 43 5.4. Describe justifications for endpoint-based security Weekend (Week 10) Day Topic 41 5.5.Describe the value of endpoint device management and asset inventory such as MDM 42 5.6. Describe the uses and importance of a multifactor authentication (MFA) strategy 43 5.7.Describe endpoint posture assessment solutions to ensure endpoint security 44 5.8. Explain the importance of an endpoint patching strategy 10| Course Online
  • 12.
    Weekend (Week 11) DayTopic Secure Network Access, Visibility, and Enforcement 45 6.1.Describe identity management and secure network access concepts such as guest services, profiling, posture assessment and BYOD 46 6.2.Configure and verify network access device functionality such as 802.1X, MAB, WebAuth 47 6.3.Describe network access with CoA 48 6.4.Describe the benefits of device compliance and application control 49 6.5.Explain exfiltration techniques (DNS tunneling, HTTPS, email, FTP/SSH/SCP/SFTP, ICMP, Messenger, IRC, NTP) Weekend (Week 11) Day Topic 50 6.6. Describe the benefits of network telemetry 51 6.7.Describe the components, capabilities, and benefits of these security products and solutions 1) Cisco Stealthwatch 2) Cisco Stealthwatch Cloud 3) Cisco pxGrid 4) Cisco Umbrella Investigate 5) Cisco Cognitive Threat Analytics 6) Cisco Encrypted Traffic Analytics 7) Cisco AnyConnect Network Visibility Module (NVM) 11| Course Online
  • 13.
  • 14.
    Founder CCIE Security (#56833) Trainer CCIESecurity (#60126) Trainer CCIE (#54008) Trainer CCIE, RHCE Trainer CCNA PD Trainer 11| Our Team 13| Our Team
  • 15.
    Admission Process Reach UsCounselling Session Demo Class Scholarship Exam Student Satisfaction Enrollment & Registration Seat Allocation Lifetime Support Fee Payment 14| Admission Process
  • 16.
    Resources Cisco Certified Trainers Modules designed asper Cisco Blueprint Hands on Lab Experience Real time troubleshooting on multi-vendor OEM devices Study Material Q&A Preparation and Assessment Module Recorded Sessions Free Career Growth Consultation 15| Resources
  • 17.
  • 18.
    Pearson VUE conducts CiscoCertification Exam. For More Information about exam registration 17| Certification Information -https://www.pearsonvue.com/cisco/online/instructions.pdf
  • 19.
    Thank You Visit ourinstitute to learn more about our courses and attractive offers. We would be glad to help you.