Routing Protocols EIGRP , OSPF , BGP , Best path selection , Load
balancing
FHRP , HSRP , VRRP , GLBP and SSO , Static and dynamic Ether
Channels
Authentication and authorization using AAA , SSH , HTTP, ACLs ,
CoPP
Network access control with 802.1X, MAB, and Web AUTH
Cisco DNA Center , NETCONF , RESTCONF , REST API security
Interpret basic Python components and scripts , JSON, YAML,
YANG , APIs
QoS policy ,Process and CEF switching , MAC table and TCAM, FIB
vs. RIB ,
Design principles used in an enterprise network , Tier 1 , Tier 2 ,
Tier 3 and Fabric Capacity planning
Cisco SD-WAN solution , SD-WAN control and data planes
elements, vManage, vBond, vSmart ,WAN Edge
SD-Access control and data planes elements , Traditional campus
interoperating with SD-Access, QoS components ,
Virtualization technologies, Hypervisor type 1 and 2 Virtual
machine, Virtual switching , VLAN ,VTP, 802.1q
VRF, GRE and VPN , IPsec tunneling , LISP ( Location Identifier
Separation Protocol) , VXLAN ( Virtual Extensible LAN )
Wireless models (centralized, distributed, controller-less,
controller based, cloud, remote branch),
Location services in a WLAN design , on-premises and cloud
infrastructure deployments , AP modes and antenna types
RF power, RSSI, SNR, interference noise, band and channels, and
wireless client devices , discovery algorithms,
WLC selection process , L2 , L3 Roaming, wireless security
features , EAP , Web AUTH, PSK , WPA , WPA2 , WPA3
Multicast Protocols PIM , IGMP v2/v3 , NTP, NAT/PAT, IP SLA
(Service level Agreement) Debug, trace route, SNMP, syslog
Net Flow and Flexible Net Flow , SPAN/RSPAN/ERSPAN
(Encapsulated Remote Switched Port Analyzer), Threat Défense
Endpoint security, Next-generation firewall , TrustSec, MACsec ,
STP , RSTP and Multiple Spanning tree Protocol
EEM applet to automate configuration , Chef, Puppet, Ansible,
and SaltStack ( Management Tools)