ECMS2 v2.0 - Engineering Cisco Meraki Solutions Course Training

Cisco Training Courses

Insoft has been serving IT community with official Cisco training offering since 2010. Find all the relevant information on Cisco training on this page.

View More

Cisco Certifications

Experience a blended learning approach that combines the best of instructor-led training and self-paced e-learning to help you prepare for your certification exam.

View More

Cisco Training Catalogue

Explore a wide variety of the Cisco courses, across different countries as well as online courses.

Browse Catalogue

Cisco Learning Credits

Cisco Learning Credits (CLCs) are prepaid training vouchers redeemed directly with Cisco that make planning for your success easier when purchasing Cisco products and services.

Have CLCs and want to redeem them?

Cisco Continuing Education

The Cisco Continuing Education Program offers all active certification holders flexible options to recertify by completing a variety of eligible training items.

View More

Cisco Digital Learning

Certified employees are VALUED assets. Explore Cisco official Digital Learning Library to educate yourself through recorded sessions.

Browse CDLL Catalogue

Cisco Business Enablement

The Cisco Business Enablement Partner Program focuses on sharpening the business skills of Cisco Channel Partners and customers.

View More

Fortinet Technical Certifications

The Fortinet Network Security Expert (NSE) program is an eight-level training and certification program to teach engineers of their network security for Fortinet FW skills and experience.

View More

Fortinet Technical Courses

Insoft is recognised as Fortinet Authorized Training Center in selected locations across EMEA.

View More

Fortinet Training Catalogue

Explore the full Fortinet training catalogue. The program includes a wide range of self-paced and instructor-led courses.

Browse Catalogue

Official ATC Status

Check our ATC Status across selected countries in Europe.

View More

Fortinet Services Packages

Insoft Services has developed a specific solution to streamline and simplify the process of installing or migrating to Fortinet Products.

Browse Packages

Prepforce Bootcamp

The only comprehensive source available today to prepare for Fortinet NSE 8 certification globally.

View More

Microsoft Training

Insoft Services provides Microsoft training in EMEAR. We offer Microsoft technical training and certification courses that are led by world-class instructors.

View More

Technical Training

The evolution of Extreme Networks Technical Training provides a comprehensive progressive pathway from Associate to Professional accreditation.

View More

Technical Certification

We provide comprehensive curriculum of technical competency skills on the certification accomplishment.

View More

Courses Catalogue

Find all the Extreme Networks online and instructor led class room based calendar here.

View More

ATP Accreditation

As an authorised training partner (ATP), Insoft Services ensures that you receive the highest standards of education available.

View More

Consulting package

We provide innovative and advanced support for designing, implementing and optimising IT solutions. Our client-base includes some of the largest Telcos globally.

Solutions and services

Globally recognised team of certified experts helps you make a smoother transition with our pre-defined consultancy, installation and migration packages for a wide range of Fortinet products.

About Us

Our training portfolio includes a wide range of IT training from IP providers, including Cisco, Extreme Networks, Fortinet, Microsoft, to name a few, in EMEA.

View More
  • +44 20 7131 0263
  • ECMS2 v2.0 - Engineering Cisco Meraki Solutions

    Duration
    3 days
    Delivery
    (Online and onsite)
    Price
    Price Upon Request

    The course, Engineering Cisco Meraki Solutions Part 2 (ECMS2) v2.0 elevates your knowledge of Cisco® Meraki™ technology suite. In this advanced technical training course, you’ll learn how to plan for network deployments and integrations using the Cisco Meraki platform. Through practical hands-on instruction and experiences, you will learn how to operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics. You will also learn how to design Meraki architectures for redundancy, high-density, and scalability by implementing comprehensive Meraki product features to meet design objectives. This course is the second of two courses that prepares you for Cisco Meraki certification.

     

    This course will help you:

    • Acquire the advanced skills and techniques to plan, design, implement, and operate the complex Cisco Meraki platform for cloud-based network management.
    • Prepare you for the upcoming Meraki certification(s)

    After completing the course, you should be able to:

    • Plan new Cisco Meraki architectures and expand existing deployments
    • Design the network for scalable management and high availability
    • Describe how to automate and scale Meraki deployments with dashboard tools
    • Use dynamic routing protocols to expand networks and improve WAN performance
    • Describe proper QoS, policy and performance-based routing configurations across a Cisco Meraki network and WAN optimization through traffic shaping
    • Describe Virtual Private Network (VPN) and Wide Area Network (WAN) topologies and how to integrate them
    • Secure, expand, and shape the network
    • Implement switched network concepts and practices, and configure guests networks
    • Implement wireless configurations concepts and practices
    • Describe endpoint management concepts and practices using Cisco Meraki Systems Manager
    • Describe physical security concepts and practices
    • Gain network insight by monitoring applications
    • Describe how to prepare monitoring, logging, and alerting services
    • Set up reporting and auditing capabilities in the Cisco Meraki dashboard
    • Monitor and troubleshoot issues using Cisco Meraki tools
    • Planning new Cisco Meraki architectures and expanding existing deployments
    • Designing for scalable management and high availability
    • Automating and scaling Meraki deployments
    • Designing routing and practices on the Meraki platform
    • Describing Quality of Service (QoS) and traffic shaping design
    • Building VPN and WAN topologies
    • Securing, expanding, and shaping the network
    • Describing network concepts and practices
    • Implementing wireless configuration practices and concepts
    • Describing Endpoint management concepts and practices
    • Describing physical security concepts and practices
    • Gaining network insight through monitoring applications
    • Preparing monitoring, logging, and alerting services
    • Setting up reporting and auditing capabilities in the Cisco Meraki Dashboard
    • Gaining visibility and resolving issues using Meraki features and built-in troubleshooting tools

     

    Lab outline

    • Configure Tags, Link Aggregation, Port Mirroring, and High-Density SSIDs
    • Establishing Auto VPN
    • Configuring Virtual Interfaces and Routing on Cisco Meraki MS Switches
    • Configuring Routes and Redistribution
    • Configuring Quality of Service
    • Configuring Traffic Shaping
    • Configuring Load Balancing
    • Defining Firewall Rules
    • Enabling Advanced Malware Protection, Intrusion Detection, and Intrusion Prevention
    • Enabling Content Filtering
    • Configure and Apply Access Policies
    • Configure Wireless Guest Access
    • Configure Service Set Identifiers (SSIDs)
    • Implementing RF Profiles
    • Implement Air Marshal
    • Create Cisco Meraki Systems Manager (SM) Configuration Profiles
    • Define Security Policies
    • Enforce End-to-End Security
    • Set-up Motion Alerts
    • Deploy Wireless Cameras
    • Manage Video Retention
    • Enable Alerts
    • Add Monitoring and Reporting
    • Generate and Analyze Summary Reports
    • Manage Firmware
    • Generate a Peripheral Component Interconnect (PCI) Compliance Report
    • Troubleshoot an Offline Device
    • Troubleshoot Content Filtering
    • Troubleshooting Remote Site Connectivity
    • Consulting Systems Engineer
    • Deployment Engineer
    • Network Administrator
    • Network Manager
    • Network Engineer
    • Site Reliability Engineer
    • Systems Engineer
    • Technical Solutions Architect
    • Wireless Design Engineer
    • Wireless Engineer

    Before enrolling in the ECMS2 course, it is highly recommended that you have already attended and completed the ECMS1 course before attending this training. You should also have general networking understanding, Meraki-specific proficiency, and knowledge in the following areas:

     

    General network:

    • Be actively engaged in the design, deployment, scaling, and management of enterprise networks
    • Strong fundamental knowledge of IP addressing and subnetting schemas necessary to build local area networks
    • Strong fundamental knowledge of dynamic routing protocols (focus/emphasis on Open Shortest Path First [OSPF] and Border Gateway Protocol [BGP])
    • A foundational understanding of wired and wireless Quality of Service (QoS) mechanisms, packet queue operations, and practical implementations
    • Be experienced with the design and configuration of IPsec and associated Virtual Private Network (VPN) technologies
    • A foundational understanding of network security controls/protocols, network management best practices, and data security
    • A foundational understanding of best practice Radio Frequency (RF) design principles and practical implementations
    • A foundational knowledge of wireless security best practices centered around access control (802.1x) and spectrum security through Wireless Intrusion Detection Systems (WIDS) and Wireless Intrusion Prevention Systems (WIPS)
    • A foundational command of standard logging/monitoring protocols (focus/emphasis on Simple Network Management Protocol [SNMP], syslog, and webhooks) and related implementation components or tools
    • Be familiar with and have basic knowledge of Application Programming Interfaces (APIs) and related languages/formats (REST, JavaScript Object Notation [JSON])

     

    Meraki knowledge:

    • Be able to describe the security, reliability, and scalability of the Cisco Meraki dashboard cloud architecture and its out-of-band control plane
    • Fundamental understanding of Dashboard’s organizational structure, delineation of privileges, and overarching administrative processes
    • Be able to outline the key components of Meraki licensing (co-termination model and expiration grace period)
    • Have the knowledge and ability to deploy advanced security features on MX security appliances (intrusion detection/prevention, Advanced Malware Protection [AMP], Layer 3 & 7 firewall rules)
    • Fundamental understanding of Auto VPN and its purpose when utilized in a Software-Defined Wide Area Network (SD-WAN) deployment
    • Be able to describe the concepts behind a cloud-based WLAN solution and the features that can be delivered including Layer 7 traffic shaping and various guest access authentication methods
    • Fundamental understanding of device profile containerization and remote management capabilities as managed through the Systems Manager platform
    • Fundamental understanding of the edge architecture as implemented by Meraki MV security cameras and its implications on video retention through various configurable options

     

    The following are the recommended Cisco offerings that may help you meet these prerequisites:

    • Implementing and Administering Cisco Solutions (CCNA)
    • Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
    • Engineering Cisco Meraki Solutions Part 1 (ECMS1)

    The course, Engineering Cisco Meraki Solutions Part 2 (ECMS2) v2.0 elevates your knowledge of Cisco® Meraki™ technology suite. In this advanced technical training course, you’ll learn how to plan for network deployments and integrations using the Cisco Meraki platform. Through practical hands-on instruction and experiences, you will learn how to operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics. You will also learn how to design Meraki architectures for redundancy, high-density, and scalability by implementing comprehensive Meraki product features to meet design objectives. This course is the second of two courses that prepares you for Cisco Meraki certification.

     

    This course will help you:

    • Acquire the advanced skills and techniques to plan, design, implement, and operate the complex Cisco Meraki platform for cloud-based network management.
    • Prepare you for the upcoming Meraki certification(s)

    After completing the course, you should be able to:

    • Plan new Cisco Meraki architectures and expand existing deployments
    • Design the network for scalable management and high availability
    • Describe how to automate and scale Meraki deployments with dashboard tools
    • Use dynamic routing protocols to expand networks and improve WAN performance
    • Describe proper QoS, policy and performance-based routing configurations across a Cisco Meraki network and WAN optimization through traffic shaping
    • Describe Virtual Private Network (VPN) and Wide Area Network (WAN) topologies and how to integrate them
    • Secure, expand, and shape the network
    • Implement switched network concepts and practices, and configure guests networks
    • Implement wireless configurations concepts and practices
    • Describe endpoint management concepts and practices using Cisco Meraki Systems Manager
    • Describe physical security concepts and practices
    • Gain network insight by monitoring applications
    • Describe how to prepare monitoring, logging, and alerting services
    • Set up reporting and auditing capabilities in the Cisco Meraki dashboard
    • Monitor and troubleshoot issues using Cisco Meraki tools
    • Planning new Cisco Meraki architectures and expanding existing deployments
    • Designing for scalable management and high availability
    • Automating and scaling Meraki deployments
    • Designing routing and practices on the Meraki platform
    • Describing Quality of Service (QoS) and traffic shaping design
    • Building VPN and WAN topologies
    • Securing, expanding, and shaping the network
    • Describing network concepts and practices
    • Implementing wireless configuration practices and concepts
    • Describing Endpoint management concepts and practices
    • Describing physical security concepts and practices
    • Gaining network insight through monitoring applications
    • Preparing monitoring, logging, and alerting services
    • Setting up reporting and auditing capabilities in the Cisco Meraki Dashboard
    • Gaining visibility and resolving issues using Meraki features and built-in troubleshooting tools

     

    Lab outline

    • Configure Tags, Link Aggregation, Port Mirroring, and High-Density SSIDs
    • Establishing Auto VPN
    • Configuring Virtual Interfaces and Routing on Cisco Meraki MS Switches
    • Configuring Routes and Redistribution
    • Configuring Quality of Service
    • Configuring Traffic Shaping
    • Configuring Load Balancing
    • Defining Firewall Rules
    • Enabling Advanced Malware Protection, Intrusion Detection, and Intrusion Prevention
    • Enabling Content Filtering
    • Configure and Apply Access Policies
    • Configure Wireless Guest Access
    • Configure Service Set Identifiers (SSIDs)
    • Implementing RF Profiles
    • Implement Air Marshal
    • Create Cisco Meraki Systems Manager (SM) Configuration Profiles
    • Define Security Policies
    • Enforce End-to-End Security
    • Set-up Motion Alerts
    • Deploy Wireless Cameras
    • Manage Video Retention
    • Enable Alerts
    • Add Monitoring and Reporting
    • Generate and Analyze Summary Reports
    • Manage Firmware
    • Generate a Peripheral Component Interconnect (PCI) Compliance Report
    • Troubleshoot an Offline Device
    • Troubleshoot Content Filtering
    • Troubleshooting Remote Site Connectivity
    • Consulting Systems Engineer
    • Deployment Engineer
    • Network Administrator
    • Network Manager
    • Network Engineer
    • Site Reliability Engineer
    • Systems Engineer
    • Technical Solutions Architect
    • Wireless Design Engineer
    • Wireless Engineer

    Before enrolling in the ECMS2 course, it is highly recommended that you have already attended and completed the ECMS1 course before attending this training. You should also have general networking understanding, Meraki-specific proficiency, and knowledge in the following areas:

     

    General network:

    • Be actively engaged in the design, deployment, scaling, and management of enterprise networks
    • Strong fundamental knowledge of IP addressing and subnetting schemas necessary to build local area networks
    • Strong fundamental knowledge of dynamic routing protocols (focus/emphasis on Open Shortest Path First [OSPF] and Border Gateway Protocol [BGP])
    • A foundational understanding of wired and wireless Quality of Service (QoS) mechanisms, packet queue operations, and practical implementations
    • Be experienced with the design and configuration of IPsec and associated Virtual Private Network (VPN) technologies
    • A foundational understanding of network security controls/protocols, network management best practices, and data security
    • A foundational understanding of best practice Radio Frequency (RF) design principles and practical implementations
    • A foundational knowledge of wireless security best practices centered around access control (802.1x) and spectrum security through Wireless Intrusion Detection Systems (WIDS) and Wireless Intrusion Prevention Systems (WIPS)
    • A foundational command of standard logging/monitoring protocols (focus/emphasis on Simple Network Management Protocol [SNMP], syslog, and webhooks) and related implementation components or tools
    • Be familiar with and have basic knowledge of Application Programming Interfaces (APIs) and related languages/formats (REST, JavaScript Object Notation [JSON])

     

    Meraki knowledge:

    • Be able to describe the security, reliability, and scalability of the Cisco Meraki dashboard cloud architecture and its out-of-band control plane
    • Fundamental understanding of Dashboard’s organizational structure, delineation of privileges, and overarching administrative processes
    • Be able to outline the key components of Meraki licensing (co-termination model and expiration grace period)
    • Have the knowledge and ability to deploy advanced security features on MX security appliances (intrusion detection/prevention, Advanced Malware Protection [AMP], Layer 3 & 7 firewall rules)
    • Fundamental understanding of Auto VPN and its purpose when utilized in a Software-Defined Wide Area Network (SD-WAN) deployment
    • Be able to describe the concepts behind a cloud-based WLAN solution and the features that can be delivered including Layer 7 traffic shaping and various guest access authentication methods
    • Fundamental understanding of device profile containerization and remote management capabilities as managed through the Systems Manager platform
    • Fundamental understanding of the edge architecture as implemented by Meraki MV security cameras and its implications on video retention through various configurable options

     

    The following are the recommended Cisco offerings that may help you meet these prerequisites:

    • Implementing and Administering Cisco Solutions (CCNA)
    • Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
    • Engineering Cisco Meraki Solutions Part 1 (ECMS1)
      Upcoming Dates
    • ` 2 Jan - 4 Jan, 2023
    • ` 30 Jan - 1 Feb, 2023
    • ` 27 Feb - 1 Mar, 2023
    • ` 27 Mar - 29 Mar, 2023
    • ` 24 Apr - 26 Apr, 2023

    Follow Up Courses

    Filter
    • 3 Days

      2 Jan - 4 Jan, 2023 Online

      30 Jan - 1 Feb, 2023 Online

      27 Feb - 1 Mar, 2023 Online

      27 Mar - 29 Mar, 2023 Online

      24 Apr - 26 Apr, 2023 Online

      Price on Request
      Book Now
    • 5 Days

      2 Jan - 6 Jan, 2023 Online

      30 Jan - 3 Feb, 2023 Online

      27 Feb - 3 Mar, 2023 Online

      27 Mar - 31 Mar, 2023 Online

      24 Apr - 28 Apr, 2023 Online

      Price on Request
      Book Now
    • 3 Days

      2 Jan - 4 Jan, 2023 Online

      30 Jan - 1 Feb, 2023 Online

      27 Feb - 1 Mar, 2023 Online

      27 Mar - 29 Mar, 2023 Online

      24 Apr - 26 Apr, 2023 Online

      Price on Request
      Book Now
    • 4 Days

      2 Jan - 5 Jan, 2023 Online

      30 Jan - 2 Feb, 2023 Online

      27 Feb - 2 Mar, 2023 Online

      27 Mar - 30 Mar, 2023 Online

      24 Apr - 27 Apr, 2023 Online

      Price on Request
      Book Now
    • 5 Days

      2 Jan - 6 Jan, 2023 Online

      30 Jan - 3 Feb, 2023 Online

      27 Feb - 3 Mar, 2023 Online

      27 Mar - 31 Mar, 2023 Online

      24 Apr - 28 Apr, 2023 Online

      Price on Request
      Book Now
    • 2 Days

      2 Jan - 3 Jan, 2023 Online

      30 Jan - 31 Jan, 2023 Online

      27 Feb - 28 Feb, 2023 Online

      27 Mar - 28 Mar, 2023 Online

      24 Apr - 25 Apr, 2023 Online

      Price on Request
      Book Now
    • 3 Days

      2 Jan - 4 Jan, 2023 Online

      30 Jan - 1 Feb, 2023 Online

      27 Feb - 1 Mar, 2023 Online

      27 Mar - 29 Mar, 2023 Online

      24 Apr - 26 Apr, 2023 Online

      Price on Request
      Book Now
    • 4 Days

      2 Jan - 5 Jan, 2023 Online

      30 Jan - 2 Feb, 2023 Online

      27 Feb - 2 Mar, 2023 Online

      27 Mar - 30 Mar, 2023 Online

      24 Apr - 27 Apr, 2023 Online

      Price on Request
      Book Now
    • 3 Days

      2 Jan - 4 Jan, 2023 Online

      30 Jan - 1 Feb, 2023 Online

      27 Feb - 1 Mar, 2023 Online

      27 Mar - 29 Mar, 2023 Online

      24 Apr - 26 Apr, 2023 Online

      Price on Request
      Book Now
    • 1 Days

      2 Jan - 2 Jan, 2023 Online

      30 Jan - 30 Jan, 2023 Online

      27 Feb - 27 Feb, 2023 Online

      27 Mar - 27 Mar, 2023 Online

      24 Apr - 24 Apr, 2023 Online

      Price on Request
      Book Now

    Know someone who´d be interested in this course?
    Let them know...

    Use the hashtag #InsoftLearning to talk about this course and find students like you on social media.