 |
 |
 |
1ÀÏÂ÷ |
BSCI [module 1] routing basic |
OT
routing priciples characteristics of routing protocols |
2ÀÏÂ÷ |
BSCI [module 2] EIGRP |
Introducing EIGRP Implementing and Verifying EIGRP EIGRP ½Ç½À 1 |
3ÀÏÂ÷ |
Configuring Advanced EIGRP Option Configuring EIGRP Authentication Using EIGRP in an Enterprise Network EIGRP ½Ç½À 1 |
4ÀÏÂ÷ |
BSCI [module 3] EIGRP |
Introducing the OSPF OSPF Packet Types Configuring OSPF Routing OSPF ½Ç½À 1 |
5ÀÏÂ÷ |
OSPF Network Types Link-State Advertisements OSPF Route Summarization OSPF ½Ç½À 2 |
6ÀÏÂ÷ |
Configuring OSPF Special Area Types Configuring OSPF Authentication OSPF ½Ç½À 3 |
7ÀÏÂ÷ |
BSCI [module 4] EIGRP |
Introducing intergrated IS-IS Routing Performing IS-IS Routig Operations Configuring Basic Integrated IS-IS IS-IS ½Ç½À 1 |
8ÀÏÂ÷ |
BSCI [module 5] Manipulating
Routing Updates |
Operating a Network Using Multiple IP Routing Protocols Configuring and Verifying Route Redistribution redistribute ½Ç½À 1 |
9ÀÏÂ÷ |
Controlling Routing Update Traffic Implementing Advanced Cisco IOS Features: Configuring DHCP |
10ÀÏÂ÷ |
BSCI [module6] BGP |
Explaining BGP Concepts and Terminology Explaining EBGP and IBGP BGP ½Ç½À 1 |
11ÀÏÂ÷ |
Configuring Basic BGP Operations Border Gateway Protocol Route Summarization BGP ½Ç½À 2 |
12ÀÏÂ÷ |
Selecting a BGP Path Using Route Maps to Manipulate Basic BGP Paths BGP ½Ç½À 3 |
13ÀÏÂ÷ |
BSCI [module 7]Multicast |
Explaining Multicast IGMP and Layer 2 Issues Explaining Multicast Routing Protocols Multicast Configuration and Verification Multicast ½Ç½À 1 |
14ÀÏÂ÷ |
BSCI [module 8]IPV6 |
Introducing IPv6 Defining IPv6 Addressing Implementing Dynamic IPv6 Addresses Using IPv6 with OSPF and Other Routing Protocols Using IPv6 with IPv4 IPv6 ½Ç½À 1 |
15ÀÏÂ÷ |
ONT[module 1,2] Describe Cisco VoIP
Implementations |
introducing VoIP Networks Digitizing and Packetizing Voice Encapsulation Voice Packets for Transport Calculating Bandwidth Requirements Implementing Voice Support in an Enterprise Network |
16ÀÏÂ÷ |
ONT [module 3] Introduction to IP
QoS |
Introducing QoS Identifying Models for Implementing QoS Identifying Methods for Implemeting QoS Qos½Ç½À 1 |
17ÀÏÂ÷ |
ONT[module 4] Implement the
DiffServ QoS Model |
Introducing Classification and Markin Using NBAR for Classification Introducing Queuing Implementations Configuring WFQ Configuring CBWFQ and LLQ Qos½Ç½À 2 Qos½Ç½À 3 |
18ÀÏÂ÷ |
ONT [module 4] Implement the
DiffServ QoS Model |
Introducing Congestion Avoidance Introducig Traffic Policing and Shaping Understanding WAN Link Efficiency Mechanisms Implementing QoS Preclassify Deploying End-to-End QoS Qos½Ç½À 4 |
19ÀÏÂ÷ |
ONT [module 5] Implement Cisco Auto
Qos |
Introducing Cisco AutoQoS Mitigating Commo Cisco AutoQoS lssues Cisco AutoQoS ½Ç½À 1 |
20ÀÏÂ÷ |
ONT [module 6] Wireless scalability |
lmplementing WLAN QoS Introducing 802.1x Configuring Encryption and Authentication on Lightweight Access Points Managing WLANs ÃÖÁ¾Á¤¸® |
21ÀÏÂ÷ |
routing basicBCMSN [module 1,2]Vlan
Trunk VTP |
OT. Implementing Best Practices for VLAN Topologies Implementing VLANs Implementing Trunks Propagating VLAN Configurations with VTP Correcting Common VLAN Configuration Errors VLAN TRUNK VTP ½Ç½À 1 |
22ÀÏÂ÷ |
BCMSN [module 3]STP |
Describing the STP Implementing and Verifying EIGRP STP ½Ç½À 1 |
23ÀÏÂ÷ |
BCMSN [module 3]Advance STP |
Implementing RSTP Implementing MSTP Configuring Link Aggregation with EtherChannel STP ½Ç½À 2 STP ½Ç½À 3 |
24ÀÏÂ÷ |
BCMSN [module 4] Inter-Vlna L3
Routing |
Describing Routing Between VLANs Enabling Routing Between VLANs on a Multilayer Switch Multilayer Switch ½Ç½À 1 |
25ÀÏÂ÷ |
Deploying CEF-Based Multilayer Switching Multilayer Switch ½Ç½À 2 |
26ÀÏÂ÷ |
BCMSN [module 5] High_Avilability
HSRP VRRP GLBP |
Configuring Layer 3 Redundancy with HSRP Optimizing HSRP HSRP ½Ç½À 1 |
27ÀÏÂ÷ |
Configuring Layer 3 Redundancy with VRRP and GLBP HSRP ½Ç½À 2 |
28ÀÏÂ÷ |
BCMSN [module 8] Minimiing service
loss&data |
Understanding Switch Security Issues Protecting Against VLAN Attacks Protecting Against Spoof Attacks SWITCH º¸¾È ½Ç½À1 |
29ÀÏÂ÷ |
Describing STP Security Mechanisms Preventing STP Forwarding Loops Securing Network Switches SWITCH º¸¾È ½Ç½À2 |
30ÀÏÂ÷ |
ISCW Teleworker Connectivity |
Describing Topologies for Facilitating Remote Connections Describing Cable Technology Describing DSL Technology Configuring the CPE as the PPPoE or PPPoA Client |
31ÀÏÂ÷ |
ISCW Implementation of Frame Mode MPLS |
Introducing MPLS Networks Assigning MPLS Labels to Packets MPLS ½Ç½À1 |
32ÀÏÂ÷ |
Implementing Frame Mode MPLS MPLS VPN Technology MPLS ½Ç½À2 |
33ÀÏÂ÷ |
MPLS VPN Technology MPLS ½Ç½À3 |
34ÀÏÂ÷ |
ISCW IPsec VPNs |
IPsec Components and IPsec VPN Features Site-to-Site IPsec VPN Operation VPN ½Ç½À1 |
35ÀÏÂ÷ |
Configuring IPsec Site-to-Site VPN Using SDM Configuring GRE Tunnels over IPsec Cisco High Availability Options VPN ½Ç½À2 |
36ÀÏÂ÷ |
Configuring Cisco Easy VPN and Easy VPN Server Using SDM Implementing the Cisco VPN Client VPN ½Ç½À3 |
37ÀÏÂ÷ |
ISCW Cisco Device Hardening |
Mitigating Network Attacks Disabling Unused Cisco Router Network Services and Interfaces Securing Cisco Router Installations and Administrative Access Router º¸¾È½Ç½À 1 |
38ÀÏÂ÷ |
Mitigating Threats and Attacks with Access Lists Securing Management and Reporting Features Configuring AAA on Cisco Routers Router º¸¾È½Ç½À 2 |
39ÀÏÂ÷ |
ISCW Cisco IOS Threat Defense Features |
Introducing the Cisco IOS Firewall Implementing Cisco IOS Firewalls CBAC ½Ç½À 1 |
40ÀÏÂ÷ |
Introducing Cisco IOS IPS Configuring Cisco IOS IPS IPS IDS ½Ç½À 1 ÃÖÁ¾Á¤¸® |