Tel: +1-866-777-0060 | Request For Information
CCNP Enterprise Bootcamp - $3,999 USD - 10 Days
Configure, troubleshoot, and manage the networks of the largest companies in the world. When you earn your CCNP Enterprise certification, you’re proving that you can scale and maintain enterprise networks to ensure they can continue to meet growing demand.
This Bootcamp covers:
- Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
- Implementing Cisco Enterprise Advanced Routing and Services
- Implementing Cisco SD-WAN Solutions
What is included
- 10 Days Instructor-led Training
- Free Retake - Up to 2 Years
- Attend Online or Onsite
- Full Access to Study Kits
- Email Support from Instructor
Upcoming Schedule
If you do not see any schedules, please contact us at This email address is being protected from spambots. You need JavaScript enabled to view it. . We will give you 2 to 3 possible dates if you are interested in the course.
Image | Event | Event Date | Location | Individual Price | Register |
---|---|---|---|---|---|
CCNP Enterprise Bootcamp - Online | Dubai, UAE | 06-12-2023 9:30 am | Online Webex | Onsite - Dubai, UAE | $3,995.00 | ||
CCNP Enterprise Bootcamp - Online | Las Vegas, USA | 07-10-2023 9:30 am | Online | In-person - Las Vegas, USA | $3,995.00 | ||
CCNP Enterprise Bootcamp - Online | Bangkok, Thailand | 07-10-2023 9:30 am | Online Webex | Onsite - Bangkok, Thailand | $3,995.00 | ||
CCNP Enterprise Bootcamp - Online | Toronto, Canada | 09-11-2023 9:30 am | Online | In-Person - Toronto, Canada | $3,995.00 | ||
CCNP Enterprise Bootcamp - Online | Dubai, UAE | 10-09-2023 9:30 am | Online Webex | Onsite - Dubai, UAE | $3,995.00 |
Course Outline
Course Outline
- Defining the Security Operations Center
- Understanding Network Infrastructure and Network Security Monitoring Tools
- Exploring Data Type Categories
- Understanding Basic Cryptography Concepts
- Understanding Common TCP/IP Attacks
- Understanding Endpoint Security Technologies
- Understanding Incident Analysis in a Threat-Centric SOC
- Identifying Resources for Hunting Cyber Threats
- Understanding Event Correlation and Normalization
- Identifying Common Attack Vectors
- Identifying Malicious Activity
- Identifying Patterns of Suspicious Behavior
- Conducting Security Incident Investigations
- Using a Playbook Model to Organize Security Monitoring
- Understanding SOC Metrics
- Understanding SOC Workflow and Automation
- Describing Incident Response
- Understanding the Use of VERIS
- Understanding Windows Operating System Basics
- Understanding Linux Operating System Basics
Lab Outline
- Configure the Initial Collaboration Lab Environment
- Use NSM Tools to Analyze Data Categories
- Explore Cryptographic Technologies
- Explore TCP/IP Attacks
- Explore Endpoint Security
- Investigate Hacker Methodology
- Hunt Malicious Traffic
- Correlate Event Logs, PCAPs, and Alerts of an Attack
- Investigate Browser-Based Attacks
- Analyze Suspicious DNS Activity
- Explore Security Data for Analysis
- Investigate Suspicious Activity Using Security Onion
- Investigate Advanced Persistent Threats
- Explore SOC Playbooks
- Explore the Windows Operating System
- Explore the Linux Operating System