Cisco Certified Network Professional (CCNP) - Enterprise
1 Introduction to Enterprise Networks
1-1 Enterprise Network Architecture
1-2 Network Design Principles
1-3 Network Security in Enterprise Environments
1-4 Network Management and Monitoring
2 Network Infrastructure
2-1 Cabling and Connectivity
2-2 Network Topologies
2-3 Network Devices (Switches, Routers, Firewalls)
2-4 Network Addressing (IP, Subnetting)
3 Switching Technologies
3-1 Layer 2 Switching
3-2 VLANs and Trunking
3-3 Spanning Tree Protocol (STP)
3-4 EtherChannel and Link Aggregation
3-5 Virtual Switching Systems (VSS)
4 Routing Technologies
4-1 Static Routing
4-2 Dynamic Routing Protocols (RIP, EIGRP, OSPF, BGP)
4-3 Route Redistribution and Filtering
4-4 IPv6 Routing
4-5 Policy-Based Routing (PBR)
5 Network Automation and Programmability
5-1 Introduction to Network Automation
5-2 Python for Network Automation
5-3 RESTful APIs and NETCONFYANG
5-4 Ansible for Network Automation
5-5 Network Programmability with Cisco DNA Center
6 Network Security
6-1 Network Security Fundamentals
6-2 Access Control Lists (ACLs)
6-3 Intrusion Detection and Prevention Systems (IDSIPS)
6-4 Virtual Private Networks (VPNs)
6-5 Firewalls and Security Zones
7 Wireless Networking
7-1 Wireless LAN Fundamentals
7-2 Wireless Security Protocols (WPA, WPA2, WPA3)
7-3 Wireless Site Surveys
7-4 Wireless Network Design
7-5 Wireless Network Management
8 Network Services
8-1 DHCP and DNS
8-2 Network Time Protocol (NTP)
8-3 Quality of Service (QoS)
8-4 Network Address Translation (NAT)
8-5 Network Management Protocols (SNMP, Syslog)
9 Network Troubleshooting
9-1 Troubleshooting Methodologies
9-2 Common Network Issues
9-3 Troubleshooting Tools (Ping, Traceroute, Wireshark)
9-4 Troubleshooting Wireless Networks
9-5 Troubleshooting Security Issues
10 Enterprise Network Design
10-1 Network Design Models (Hub-and-Spoke, Mesh)
10-2 Network Redundancy and High Availability
10-3 Network Scalability and Performance
10-4 Network Documentation and Diagrams
10-5 Case Studies and Real-World Scenarios
2. Network Infrastructure

2. Network Infrastructure

Core Layer

The Core Layer is the backbone of the network, responsible for high-speed data transfer between different parts of the network. It acts as the central hub that connects various distribution layers and ensures rapid transit of data. Think of it as the main highway system in a city, where traffic (data) flows quickly and efficiently between different districts (distribution layers).

Distribution Layer

The Distribution Layer serves as an intermediary between the Core Layer and the Access Layer. It provides policy-based connectivity, aggregates routes from access layers, and applies security and quality of service (QoS) policies. This layer is akin to the local roads and intersections in a city, where traffic management (policies) ensures smooth flow and prioritization of different types of traffic (data).

Access Layer

The Access Layer is the entry point for end-user devices into the network. It connects individual workstations, printers, and other devices to the network. This layer is analogous to the residential streets in a city, where individual homes (devices) connect to the broader network infrastructure.

Redundancy

Redundancy in network infrastructure involves creating backup paths to ensure continuous operation in case of a failure. Techniques like link aggregation (LACP), redundant power supplies, and multiple ISPs can be employed. Imagine a city with multiple routes to the same destination; if one route is blocked (failure), traffic can still flow through the alternate routes.

Scalability

Scalability refers to the ability of the network to grow and accommodate more users and devices without degradation in performance. Hierarchical network design, modular hardware, and virtualization are key to achieving scalability. Consider a city that can easily expand its infrastructure to accommodate new residents and businesses; similarly, a scalable network can grow with increasing demands.

Security

Security in network infrastructure involves protecting the network from unauthorized access and threats. Implementing firewalls, intrusion detection systems (IDS), and encryption are essential. Think of a city with fortified walls, security checkpoints, and surveillance systems to protect its citizens; the same principles apply to secure a network.