Cisco træning

Insoft Services er en af de få uddannelsesudbydere i EMEAR, der tilbyder hele spektret af Cisco-certificering og specialiseret teknologiuddannelse.

Lær hvordan

Cisco-certificeringer

Oplev en blandet læringsmetode, der kombinerer det bedste fra instruktørstyret træning og e-læring i eget tempo for at hjælpe dig med at forberede dig til din certificeringseksamen.

Lær hvordan

Cisco Learning Credits

Cisco Learning Credits (CLCs) er forudbetalte træningskuponer, der indløses direkte med Cisco, og som gør det nemmere at planlægge din succes, når du køber Cisco-produkter og -tjenester.

Lær hvordan

Cisco Efteruddannelse

Cisco Continuing Education Program tilbyder alle aktive certificeringsindehavere fleksible muligheder for at gencertificere ved at gennemføre en række kvalificerede træningselementer.

Lær hvordan

Cisco Digital Learning

Certificerede medarbejdere er VÆRDSATTE aktiver. Udforsk Ciscos officielle digitale læringsbibliotek for at uddanne dig selv gennem optagede sessioner.

Lær hvordan

Cisco Business Enablement

Cisco Business Enablement Partner Program fokuserer på at skærpe Cisco Channel Partners og kunders forretningsmæssige færdigheder.

Lær hvordan

Cisco kursuskatalog

Lær hvordan

Fortinet-certificeringer

Fortinet Network Security Expert (NSE) -programmet er et otte-niveau uddannelses- og certificeringsprogram for at undervise ingeniører i deres netværkssikkerhed for Fortinet FW-færdigheder og erfaring.

Lær hvordan

Fortinet træning

Insoft er anerkendt som Autoriseret Fortinet Training Center på udvalgte steder på tværs af EMEA.

Tekniske kurser

Fortinet kursuskatalog

Udforsk hele Fortinet-træningskataloget. Programmet omfatter en bred vifte af selvstændige og instruktørledede kurser.

Lær hvordan

ATC-status

Tjek vores ATC-status på tværs af udvalgte lande i Europa.

Lær hvordan

Fortinet Professionelle Services

Globalt anerkendte team af certificerede eksperter hjælper dig med at gøre en mere jævn overgang med vores foruddefinerede konsulent-, installations- og migreringspakker til en lang række Fortinet-produkter.

Lær hvordan

Microsoft træning

Insoft Services tilbyder Microsoft-undervisning i EMEAR. Vi tilbyder Microsoft tekniske kurser og certificeringskurser, der ledes af instruktører i verdensklasse.

Tekniske kurser

Extreme træning

Find all the Extreme Networks online and instructor led class room based calendar here.

Tekniske kurser

Tekniske certificeringer

Vi leverer omfattende læseplan for tekniske kompetencefærdigheder på certificeringspræstationen.

Lær hvordan

Extreme kursuskatalog

Lær hvordan

ATP-akkreditering

Som autoriseret uddannelsespartner (ATP) sikrer Insoft Services, at du får de højeste uddannelsesstandarder, der findes.

Lær hvordan

Løsninger og tjenester

Vi leverer innovativ og avanceret support til design, implementering og optimering af IT-løsninger. Vores kundebase omfatter nogle af de største Telcos globalt.

Lær hvordan

Globalt anerkendte team af certificerede eksperter hjælper dig med at gøre en mere jævn overgang med vores foruddefinerede konsulent-, installations- og migreringspakker til en lang række Fortinet-produkter.

Om os

Insoft tilbyder autoriseret uddannelses- og konsulentbistand til udvalgte IP-leverandører. Få mere at vide om, hvordan vi revolutionerer branchen.

Lær hvordan
  • +45 32 70 99 90
  • ECMS2 v2.0 - Engineering Cisco Meraki Solutions

    Duration
    3 Dage
    Delivery
    (Online Og På stedet)
    Price
    Pris på forespørgsel
      

    28 excl. VAT

    The course, Engineering Cisco Meraki Solutions Part 2 (ECMS2) v2.0 elevates your knowledge of Cisco® Meraki™ technology suite. In this advanced technical training course, you’ll learn how to plan for network deployments and integrations using the Cisco Meraki platform. Through practical hands-on instruction and experiences, you will learn how to operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics. You will also learn how to design Meraki architectures for redundancy, high-density, and scalability by implementing comprehensive Meraki product features to meet design objectives. This course is the second of two courses that prepares you for Cisco Meraki certification.

     

    This course will help you:

    • Acquire the advanced skills and techniques to plan, design, implement, and operate the complex Cisco Meraki platform for cloud-based network management.
    • Prepare you for the upcoming Meraki certification(s)

    After completing the course, you should be able to:

    • Plan new Cisco Meraki architectures and expand existing deployments
    • Design the network for scalable management and high availability
    • Describe how to automate and scale Meraki deployments with dashboard tools
    • Use dynamic routing protocols to expand networks and improve WAN performance
    • Describe proper QoS, policy and performance-based routing configurations across a Cisco Meraki network and WAN optimization through traffic shaping
    • Describe Virtual Private Network (VPN) and Wide Area Network (WAN) topologies and how to integrate them
    • Secure, expand, and shape the network
    • Implement switched network concepts and practices, and configure guests networks
    • Implement wireless configurations concepts and practices
    • Describe endpoint management concepts and practices using Cisco Meraki Systems Manager
    • Describe physical security concepts and practices
    • Gain network insight by monitoring applications
    • Describe how to prepare monitoring, logging, and alerting services
    • Set up reporting and auditing capabilities in the Cisco Meraki dashboard
    • Monitor and troubleshoot issues using Cisco Meraki tools
    • Planning new Cisco Meraki architectures and expanding existing deployments
    • Designing for scalable management and high availability
    • Automating and scaling Meraki deployments
    • Designing routing and practices on the Meraki platform
    • Describing Quality of Service (QoS) and traffic shaping design
    • Building VPN and WAN topologies
    • Securing, expanding, and shaping the network
    • Describing network concepts and practices
    • Implementing wireless configuration practices and concepts
    • Describing Endpoint management concepts and practices
    • Describing physical security concepts and practices
    • Gaining network insight through monitoring applications
    • Preparing monitoring, logging, and alerting services
    • Setting up reporting and auditing capabilities in the Cisco Meraki Dashboard
    • Gaining visibility and resolving issues using Meraki features and built-in troubleshooting tools

     

    Lab outline

    • Configure Tags, Link Aggregation, Port Mirroring, and High-Density SSIDs
    • Establishing Auto VPN
    • Configuring Virtual Interfaces and Routing on Cisco Meraki MS Switches
    • Configuring Routes and Redistribution
    • Configuring Quality of Service
    • Configuring Traffic Shaping
    • Configuring Load Balancing
    • Defining Firewall Rules
    • Enabling Advanced Malware Protection, Intrusion Detection, and Intrusion Prevention
    • Enabling Content Filtering
    • Configure and Apply Access Policies
    • Configure Wireless Guest Access
    • Configure Service Set Identifiers (SSIDs)
    • Implementing RF Profiles
    • Implement Air Marshal
    • Create Cisco Meraki Systems Manager (SM) Configuration Profiles
    • Define Security Policies
    • Enforce End-to-End Security
    • Set-up Motion Alerts
    • Deploy Wireless Cameras
    • Manage Video Retention
    • Enable Alerts
    • Add Monitoring and Reporting
    • Generate and Analyze Summary Reports
    • Manage Firmware
    • Generate a Peripheral Component Interconnect (PCI) Compliance Report
    • Troubleshoot an Offline Device
    • Troubleshoot Content Filtering
    • Troubleshooting Remote Site Connectivity
    • Consulting Systems Engineer
    • Deployment Engineer
    • Network Administrator
    • Network Manager
    • Network Engineer
    • Site Reliability Engineer
    • Systems Engineer
    • Technical Solutions Architect
    • Wireless Design Engineer
    • Wireless Engineer

    Before enrolling in the ECMS2 course, it is highly recommended that you have already attended and completed the ECMS1 course before attending this training. You should also have general networking understanding, Meraki-specific proficiency, and knowledge in the following areas:

     

    General network:

    • Be actively engaged in the design, deployment, scaling, and management of enterprise networks
    • Strong fundamental knowledge of IP addressing and subnetting schemas necessary to build local area networks
    • Strong fundamental knowledge of dynamic routing protocols (focus/emphasis on Open Shortest Path First [OSPF] and Border Gateway Protocol [BGP])
    • A foundational understanding of wired and wireless Quality of Service (QoS) mechanisms, packet queue operations, and practical implementations
    • Be experienced with the design and configuration of IPsec and associated Virtual Private Network (VPN) technologies
    • A foundational understanding of network security controls/protocols, network management best practices, and data security
    • A foundational understanding of best practice Radio Frequency (RF) design principles and practical implementations
    • A foundational knowledge of wireless security best practices centered around access control (802.1x) and spectrum security through Wireless Intrusion Detection Systems (WIDS) and Wireless Intrusion Prevention Systems (WIPS)
    • A foundational command of standard logging/monitoring protocols (focus/emphasis on Simple Network Management Protocol [SNMP], syslog, and webhooks) and related implementation components or tools
    • Be familiar with and have basic knowledge of Application Programming Interfaces (APIs) and related languages/formats (REST, JavaScript Object Notation [JSON])

     

    Meraki knowledge:

    • Be able to describe the security, reliability, and scalability of the Cisco Meraki dashboard cloud architecture and its out-of-band control plane
    • Fundamental understanding of Dashboard’s organizational structure, delineation of privileges, and overarching administrative processes
    • Be able to outline the key components of Meraki licensing (co-termination model and expiration grace period)
    • Have the knowledge and ability to deploy advanced security features on MX security appliances (intrusion detection/prevention, Advanced Malware Protection [AMP], Layer 3 & 7 firewall rules)
    • Fundamental understanding of Auto VPN and its purpose when utilized in a Software-Defined Wide Area Network (SD-WAN) deployment
    • Be able to describe the concepts behind a cloud-based WLAN solution and the features that can be delivered including Layer 7 traffic shaping and various guest access authentication methods
    • Fundamental understanding of device profile containerization and remote management capabilities as managed through the Systems Manager platform
    • Fundamental understanding of the edge architecture as implemented by Meraki MV security cameras and its implications on video retention through various configurable options

     

    The following are the recommended Cisco offerings that may help you meet these prerequisites:

    • Implementing and Administering Cisco Solutions (CCNA)
    • Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
    • Engineering Cisco Meraki Solutions Part 1 (ECMS1)

    The course, Engineering Cisco Meraki Solutions Part 2 (ECMS2) v2.0 elevates your knowledge of Cisco® Meraki™ technology suite. In this advanced technical training course, you’ll learn how to plan for network deployments and integrations using the Cisco Meraki platform. Through practical hands-on instruction and experiences, you will learn how to operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics. You will also learn how to design Meraki architectures for redundancy, high-density, and scalability by implementing comprehensive Meraki product features to meet design objectives. This course is the second of two courses that prepares you for Cisco Meraki certification.

     

    This course will help you:

    • Acquire the advanced skills and techniques to plan, design, implement, and operate the complex Cisco Meraki platform for cloud-based network management.
    • Prepare you for the upcoming Meraki certification(s)

    After completing the course, you should be able to:

    • Plan new Cisco Meraki architectures and expand existing deployments
    • Design the network for scalable management and high availability
    • Describe how to automate and scale Meraki deployments with dashboard tools
    • Use dynamic routing protocols to expand networks and improve WAN performance
    • Describe proper QoS, policy and performance-based routing configurations across a Cisco Meraki network and WAN optimization through traffic shaping
    • Describe Virtual Private Network (VPN) and Wide Area Network (WAN) topologies and how to integrate them
    • Secure, expand, and shape the network
    • Implement switched network concepts and practices, and configure guests networks
    • Implement wireless configurations concepts and practices
    • Describe endpoint management concepts and practices using Cisco Meraki Systems Manager
    • Describe physical security concepts and practices
    • Gain network insight by monitoring applications
    • Describe how to prepare monitoring, logging, and alerting services
    • Set up reporting and auditing capabilities in the Cisco Meraki dashboard
    • Monitor and troubleshoot issues using Cisco Meraki tools
    • Planning new Cisco Meraki architectures and expanding existing deployments
    • Designing for scalable management and high availability
    • Automating and scaling Meraki deployments
    • Designing routing and practices on the Meraki platform
    • Describing Quality of Service (QoS) and traffic shaping design
    • Building VPN and WAN topologies
    • Securing, expanding, and shaping the network
    • Describing network concepts and practices
    • Implementing wireless configuration practices and concepts
    • Describing Endpoint management concepts and practices
    • Describing physical security concepts and practices
    • Gaining network insight through monitoring applications
    • Preparing monitoring, logging, and alerting services
    • Setting up reporting and auditing capabilities in the Cisco Meraki Dashboard
    • Gaining visibility and resolving issues using Meraki features and built-in troubleshooting tools

     

    Lab outline

    • Configure Tags, Link Aggregation, Port Mirroring, and High-Density SSIDs
    • Establishing Auto VPN
    • Configuring Virtual Interfaces and Routing on Cisco Meraki MS Switches
    • Configuring Routes and Redistribution
    • Configuring Quality of Service
    • Configuring Traffic Shaping
    • Configuring Load Balancing
    • Defining Firewall Rules
    • Enabling Advanced Malware Protection, Intrusion Detection, and Intrusion Prevention
    • Enabling Content Filtering
    • Configure and Apply Access Policies
    • Configure Wireless Guest Access
    • Configure Service Set Identifiers (SSIDs)
    • Implementing RF Profiles
    • Implement Air Marshal
    • Create Cisco Meraki Systems Manager (SM) Configuration Profiles
    • Define Security Policies
    • Enforce End-to-End Security
    • Set-up Motion Alerts
    • Deploy Wireless Cameras
    • Manage Video Retention
    • Enable Alerts
    • Add Monitoring and Reporting
    • Generate and Analyze Summary Reports
    • Manage Firmware
    • Generate a Peripheral Component Interconnect (PCI) Compliance Report
    • Troubleshoot an Offline Device
    • Troubleshoot Content Filtering
    • Troubleshooting Remote Site Connectivity
    • Consulting Systems Engineer
    • Deployment Engineer
    • Network Administrator
    • Network Manager
    • Network Engineer
    • Site Reliability Engineer
    • Systems Engineer
    • Technical Solutions Architect
    • Wireless Design Engineer
    • Wireless Engineer

    Before enrolling in the ECMS2 course, it is highly recommended that you have already attended and completed the ECMS1 course before attending this training. You should also have general networking understanding, Meraki-specific proficiency, and knowledge in the following areas:

     

    General network:

    • Be actively engaged in the design, deployment, scaling, and management of enterprise networks
    • Strong fundamental knowledge of IP addressing and subnetting schemas necessary to build local area networks
    • Strong fundamental knowledge of dynamic routing protocols (focus/emphasis on Open Shortest Path First [OSPF] and Border Gateway Protocol [BGP])
    • A foundational understanding of wired and wireless Quality of Service (QoS) mechanisms, packet queue operations, and practical implementations
    • Be experienced with the design and configuration of IPsec and associated Virtual Private Network (VPN) technologies
    • A foundational understanding of network security controls/protocols, network management best practices, and data security
    • A foundational understanding of best practice Radio Frequency (RF) design principles and practical implementations
    • A foundational knowledge of wireless security best practices centered around access control (802.1x) and spectrum security through Wireless Intrusion Detection Systems (WIDS) and Wireless Intrusion Prevention Systems (WIPS)
    • A foundational command of standard logging/monitoring protocols (focus/emphasis on Simple Network Management Protocol [SNMP], syslog, and webhooks) and related implementation components or tools
    • Be familiar with and have basic knowledge of Application Programming Interfaces (APIs) and related languages/formats (REST, JavaScript Object Notation [JSON])

     

    Meraki knowledge:

    • Be able to describe the security, reliability, and scalability of the Cisco Meraki dashboard cloud architecture and its out-of-band control plane
    • Fundamental understanding of Dashboard’s organizational structure, delineation of privileges, and overarching administrative processes
    • Be able to outline the key components of Meraki licensing (co-termination model and expiration grace period)
    • Have the knowledge and ability to deploy advanced security features on MX security appliances (intrusion detection/prevention, Advanced Malware Protection [AMP], Layer 3 & 7 firewall rules)
    • Fundamental understanding of Auto VPN and its purpose when utilized in a Software-Defined Wide Area Network (SD-WAN) deployment
    • Be able to describe the concepts behind a cloud-based WLAN solution and the features that can be delivered including Layer 7 traffic shaping and various guest access authentication methods
    • Fundamental understanding of device profile containerization and remote management capabilities as managed through the Systems Manager platform
    • Fundamental understanding of the edge architecture as implemented by Meraki MV security cameras and its implications on video retention through various configurable options

     

    The following are the recommended Cisco offerings that may help you meet these prerequisites:

    • Implementing and Administering Cisco Solutions (CCNA)
    • Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
    • Engineering Cisco Meraki Solutions Part 1 (ECMS1)
      Kommende datoer
    • ` 21 May - 23 May, 2024
    • ` 24 Jun - 26 Jun, 2024
    • ` 22 Jul - 24 Jul, 2024
    • ` 19 Aug - 21 Aug, 2024
    • ` 16 Sep - 18 Sep, 2024
    • ` 14 Oct - 16 Oct, 2024

    Follow Up Courses

    Filtrer
    • 2 Dage

      15 Apr - 16 Apr, 2024

      13 May - 14 May, 2024

      10 Jun - 11 Jun, 2024

      8 Jul - 9 Jul, 2024

      5 Aug - 6 Aug, 2024

      2 Sep - 3 Sep, 2024

      Price on Request
      Book Now
    • 4 Dage

      29 Apr - 2 May, 2024

      27 May - 30 May, 2024

      24 Jun - 27 Jun, 2024

      22 Jul - 25 Jul, 2024

      19 Aug - 22 Aug, 2024

      Price on Request
      Book Now
    • 4 Dage

      15 Apr - 18 Apr, 2024

      13 May - 16 May, 2024

      10 Jun - 13 Jun, 2024

      8 Jul - 11 Jul, 2024

      5 Aug - 8 Aug, 2024

      2 Sep - 5 Sep, 2024

      Price on Request
      Book Now
    • 4 Dage

      15 Apr - 18 Apr, 2024

      13 May - 16 May, 2024

      10 Jun - 13 Jun, 2024

      8 Jul - 11 Jul, 2024

      5 Aug - 8 Aug, 2024

      2 Sep - 5 Sep, 2024

      Price on Request
      Book Now
    • 3 Dage

      15 Apr - 17 Apr, 2024

      13 May - 15 May, 2024

      10 Jun - 12 Jun, 2024

      8 Jul - 10 Jul, 2024

      5 Aug - 7 Aug, 2024

      2 Sep - 4 Sep, 2024

      Price on Request
      Book Now
    • 2 Dage

      15 Apr - 16 Apr, 2024

      13 May - 14 May, 2024

      10 Jun - 11 Jun, 2024

      8 Jul - 9 Jul, 2024

      5 Aug - 6 Aug, 2024

      2 Sep - 3 Sep, 2024

      Price on Request
      Book Now
    • 3 Dage

      22 Apr - 24 Apr, 2024

      20 May - 22 May, 2024

      17 Jun - 19 Jun, 2024

      15 Jul - 17 Jul, 2024

      12 Aug - 14 Aug, 2024

      9 Sep - 11 Sep, 2024

      Price on Request
      Book Now
    • 5 Dage

      8 Apr - 12 Apr, 2024

      6 May - 10 May, 2024

      3 Jun - 7 Jun, 2024

      1 Jul - 5 Jul, 2024

      29 Jul - 2 Aug, 2024

      26 Aug - 30 Aug, 2024

      Price on Request
      Book Now
    • 3 Dage

      29 Apr - 1 May, 2024

      27 May - 29 May, 2024

      24 Jun - 26 Jun, 2024

      22 Jul - 24 Jul, 2024

      19 Aug - 21 Aug, 2024

      Price on Request
      Book Now
    • 4 Dage

      8 Apr - 11 Apr, 2024

      6 May - 9 May, 2024

      3 Jun - 6 Jun, 2024

      1 Jul - 4 Jul, 2024

      29 Jul - 1 Aug, 2024

      26 Aug - 29 Aug, 2024

      Price on Request
      Book Now

    Know someone who´d be interested in this course?
    Let them know...

    Use the hashtag #InsoftLearning to talk about this course and find students like you on social media.