Formazione Cisco

Insoft Services è uno dei pochi fornitori di formazione in EMEAR a offrire una gamma completa di certificazione Cisco e formazione tecnologica specializzata.

Dettagli

Certificazioni Cisco

Sperimenta un approccio di apprendimento misto che combina il meglio della formazione con istruttore e dell'e-learning autogestito per aiutarti a prepararti per l'esame di certificazione.

Dettagli

Cisco Learning Credits

I Cisco Learning Credits (CLC) sono voucher di formazione prepagati riscattati direttamente con Cisco che semplificano la pianificazione del successo durante l'acquisto di prodotti e servizi Cisco.

Dettagli

Formazione Continua

The Cisco Continuing Education Program offers all active certification holders flexible options to recertify by completing a variety of eligible training items.

Dettagli

Cisco Digital Learning

Certified employees are VALUED assets. Explore Cisco official Digital Learning Library to educate yourself through recorded sessions.

Dettagli

Cisco Business Enablement

The Cisco Business Enablement Partner Program focuses on sharpening the business skills of Cisco Channel Partners and customers.

Dettagli

Catalogo Cisco

Dettagli

Certificazioni Fortinet

Il programma Fortinet Network Security Expert (NSE) è un programma di formazione e certificazione di otto livelli per insegnare agli ingegneri la sicurezza della loro rete per le competenze e l'esperienza di Fortinet FW.

Dettagli

Corsi di formazione tecnica

Insoft è riconosciuto come Fortinet Authorized Training Center in sedi selezionate in tutta l'EMEA.

Corsi tecnici

Catalogo Fortinet

Esplora un'ampia varietà di programmi Fortinet in diversi paesi e corsi online.

Dettagli

Stato ATC

Controlla il nostro stato ATC in tutti i paesi selezionati in Europa.

Dettagli

Fortinet Servizi Professionale

Il team riconosciuto a livello globale di esperti certificati ti aiuta a fare una transizione più fluida con i nostri pacchetti di consulenza, installazione e migrazione predefiniti per una vasta gamma di prodotti Fortinet.

Dettagli

Catalogo Microsoft

Insoft Services fornisce formazione Microsoft in EMEAR. Offriamo corsi di formazione tecnica e certificazione Microsoft guidati da istruttori di livello mondiale.

Corsi tecnici

Corsi di formazione

Impara conoscenze e abilità eccezionali di Extreme Networks.Find all the Extreme Networks online and instructor led class room based calendar here.

Corsi tecnici

Certificazioni Extreme

Forniamo un curriculum completo di competenze tecniche sul conseguimento della certificazione.

Dettagli

Catalogo Extreme

Dettagli

Accreditamento ATP

In qualità di partner di formazione autorizzato (ATP), Insoft Services garantisce che tu riceva i più alti standard di istruzione disponibili.

Dettagli

Pacchetti di consulenza

Forniamo un supporto innovativo e avanzato per la progettazione, l'implementazione e l'ottimizzazione delle soluzioni IT.La nostra base di clienti comprende alcune delle più grandi telco a livello globale.

Soluzioni & Servizi

Il team riconosciuto a livello globale di esperti certificati ti aiuta a fare una transizione più fluida con i nostri pacchetti di consulenza, installazione e migrazione predefiniti per una vasta gamma di prodotti Fortinet.

Chi siamo

Insoft fornisce servizi di formazione e consulenza autorizzati per fornitori IP selezionati.Scopri come stiamo rivoluzionando il settore.

Dettagli
  • +39 02 8704 5199
  • ECMS2 v2.0 - Engineering Cisco Meraki Solutions

    Duration
    3 Giorni
    Delivery
    (Online e in loco)
    Price
    Prezzo su richiesta
      

    28 excl. VAT

    The course, Engineering Cisco Meraki Solutions Part 2 (ECMS2) v2.0 elevates your knowledge of Cisco® Meraki™ technology suite. In this advanced technical training course, you’ll learn how to plan for network deployments and integrations using the Cisco Meraki platform. Through practical hands-on instruction and experiences, you will learn how to operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics. You will also learn how to design Meraki architectures for redundancy, high-density, and scalability by implementing comprehensive Meraki product features to meet design objectives. This course is the second of two courses that prepares you for Cisco Meraki certification.

     

    This course will help you:

    • Acquire the advanced skills and techniques to plan, design, implement, and operate the complex Cisco Meraki platform for cloud-based network management.
    • Prepare you for the upcoming Meraki certification(s)

    After completing the course, you should be able to:

    • Plan new Cisco Meraki architectures and expand existing deployments
    • Design the network for scalable management and high availability
    • Describe how to automate and scale Meraki deployments with dashboard tools
    • Use dynamic routing protocols to expand networks and improve WAN performance
    • Describe proper QoS, policy and performance-based routing configurations across a Cisco Meraki network and WAN optimization through traffic shaping
    • Describe Virtual Private Network (VPN) and Wide Area Network (WAN) topologies and how to integrate them
    • Secure, expand, and shape the network
    • Implement switched network concepts and practices, and configure guests networks
    • Implement wireless configurations concepts and practices
    • Describe endpoint management concepts and practices using Cisco Meraki Systems Manager
    • Describe physical security concepts and practices
    • Gain network insight by monitoring applications
    • Describe how to prepare monitoring, logging, and alerting services
    • Set up reporting and auditing capabilities in the Cisco Meraki dashboard
    • Monitor and troubleshoot issues using Cisco Meraki tools
    • Planning new Cisco Meraki architectures and expanding existing deployments
    • Designing for scalable management and high availability
    • Automating and scaling Meraki deployments
    • Designing routing and practices on the Meraki platform
    • Describing Quality of Service (QoS) and traffic shaping design
    • Building VPN and WAN topologies
    • Securing, expanding, and shaping the network
    • Describing network concepts and practices
    • Implementing wireless configuration practices and concepts
    • Describing Endpoint management concepts and practices
    • Describing physical security concepts and practices
    • Gaining network insight through monitoring applications
    • Preparing monitoring, logging, and alerting services
    • Setting up reporting and auditing capabilities in the Cisco Meraki Dashboard
    • Gaining visibility and resolving issues using Meraki features and built-in troubleshooting tools

     

    Lab outline

    • Configure Tags, Link Aggregation, Port Mirroring, and High-Density SSIDs
    • Establishing Auto VPN
    • Configuring Virtual Interfaces and Routing on Cisco Meraki MS Switches
    • Configuring Routes and Redistribution
    • Configuring Quality of Service
    • Configuring Traffic Shaping
    • Configuring Load Balancing
    • Defining Firewall Rules
    • Enabling Advanced Malware Protection, Intrusion Detection, and Intrusion Prevention
    • Enabling Content Filtering
    • Configure and Apply Access Policies
    • Configure Wireless Guest Access
    • Configure Service Set Identifiers (SSIDs)
    • Implementing RF Profiles
    • Implement Air Marshal
    • Create Cisco Meraki Systems Manager (SM) Configuration Profiles
    • Define Security Policies
    • Enforce End-to-End Security
    • Set-up Motion Alerts
    • Deploy Wireless Cameras
    • Manage Video Retention
    • Enable Alerts
    • Add Monitoring and Reporting
    • Generate and Analyze Summary Reports
    • Manage Firmware
    • Generate a Peripheral Component Interconnect (PCI) Compliance Report
    • Troubleshoot an Offline Device
    • Troubleshoot Content Filtering
    • Troubleshooting Remote Site Connectivity
    • Consulting Systems Engineer
    • Deployment Engineer
    • Network Administrator
    • Network Manager
    • Network Engineer
    • Site Reliability Engineer
    • Systems Engineer
    • Technical Solutions Architect
    • Wireless Design Engineer
    • Wireless Engineer

    Before enrolling in the ECMS2 course, it is highly recommended that you have already attended and completed the ECMS1 course before attending this training. You should also have general networking understanding, Meraki-specific proficiency, and knowledge in the following areas:

     

    General network:

    • Be actively engaged in the design, deployment, scaling, and management of enterprise networks
    • Strong fundamental knowledge of IP addressing and subnetting schemas necessary to build local area networks
    • Strong fundamental knowledge of dynamic routing protocols (focus/emphasis on Open Shortest Path First [OSPF] and Border Gateway Protocol [BGP])
    • A foundational understanding of wired and wireless Quality of Service (QoS) mechanisms, packet queue operations, and practical implementations
    • Be experienced with the design and configuration of IPsec and associated Virtual Private Network (VPN) technologies
    • A foundational understanding of network security controls/protocols, network management best practices, and data security
    • A foundational understanding of best practice Radio Frequency (RF) design principles and practical implementations
    • A foundational knowledge of wireless security best practices centered around access control (802.1x) and spectrum security through Wireless Intrusion Detection Systems (WIDS) and Wireless Intrusion Prevention Systems (WIPS)
    • A foundational command of standard logging/monitoring protocols (focus/emphasis on Simple Network Management Protocol [SNMP], syslog, and webhooks) and related implementation components or tools
    • Be familiar with and have basic knowledge of Application Programming Interfaces (APIs) and related languages/formats (REST, JavaScript Object Notation [JSON])

     

    Meraki knowledge:

    • Be able to describe the security, reliability, and scalability of the Cisco Meraki dashboard cloud architecture and its out-of-band control plane
    • Fundamental understanding of Dashboard’s organizational structure, delineation of privileges, and overarching administrative processes
    • Be able to outline the key components of Meraki licensing (co-termination model and expiration grace period)
    • Have the knowledge and ability to deploy advanced security features on MX security appliances (intrusion detection/prevention, Advanced Malware Protection [AMP], Layer 3 & 7 firewall rules)
    • Fundamental understanding of Auto VPN and its purpose when utilized in a Software-Defined Wide Area Network (SD-WAN) deployment
    • Be able to describe the concepts behind a cloud-based WLAN solution and the features that can be delivered including Layer 7 traffic shaping and various guest access authentication methods
    • Fundamental understanding of device profile containerization and remote management capabilities as managed through the Systems Manager platform
    • Fundamental understanding of the edge architecture as implemented by Meraki MV security cameras and its implications on video retention through various configurable options

     

    The following are the recommended Cisco offerings that may help you meet these prerequisites:

    • Implementing and Administering Cisco Solutions (CCNA)
    • Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
    • Engineering Cisco Meraki Solutions Part 1 (ECMS1)

    The course, Engineering Cisco Meraki Solutions Part 2 (ECMS2) v2.0 elevates your knowledge of Cisco® Meraki™ technology suite. In this advanced technical training course, you’ll learn how to plan for network deployments and integrations using the Cisco Meraki platform. Through practical hands-on instruction and experiences, you will learn how to operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics. You will also learn how to design Meraki architectures for redundancy, high-density, and scalability by implementing comprehensive Meraki product features to meet design objectives. This course is the second of two courses that prepares you for Cisco Meraki certification.

     

    This course will help you:

    • Acquire the advanced skills and techniques to plan, design, implement, and operate the complex Cisco Meraki platform for cloud-based network management.
    • Prepare you for the upcoming Meraki certification(s)

    After completing the course, you should be able to:

    • Plan new Cisco Meraki architectures and expand existing deployments
    • Design the network for scalable management and high availability
    • Describe how to automate and scale Meraki deployments with dashboard tools
    • Use dynamic routing protocols to expand networks and improve WAN performance
    • Describe proper QoS, policy and performance-based routing configurations across a Cisco Meraki network and WAN optimization through traffic shaping
    • Describe Virtual Private Network (VPN) and Wide Area Network (WAN) topologies and how to integrate them
    • Secure, expand, and shape the network
    • Implement switched network concepts and practices, and configure guests networks
    • Implement wireless configurations concepts and practices
    • Describe endpoint management concepts and practices using Cisco Meraki Systems Manager
    • Describe physical security concepts and practices
    • Gain network insight by monitoring applications
    • Describe how to prepare monitoring, logging, and alerting services
    • Set up reporting and auditing capabilities in the Cisco Meraki dashboard
    • Monitor and troubleshoot issues using Cisco Meraki tools
    • Planning new Cisco Meraki architectures and expanding existing deployments
    • Designing for scalable management and high availability
    • Automating and scaling Meraki deployments
    • Designing routing and practices on the Meraki platform
    • Describing Quality of Service (QoS) and traffic shaping design
    • Building VPN and WAN topologies
    • Securing, expanding, and shaping the network
    • Describing network concepts and practices
    • Implementing wireless configuration practices and concepts
    • Describing Endpoint management concepts and practices
    • Describing physical security concepts and practices
    • Gaining network insight through monitoring applications
    • Preparing monitoring, logging, and alerting services
    • Setting up reporting and auditing capabilities in the Cisco Meraki Dashboard
    • Gaining visibility and resolving issues using Meraki features and built-in troubleshooting tools

     

    Lab outline

    • Configure Tags, Link Aggregation, Port Mirroring, and High-Density SSIDs
    • Establishing Auto VPN
    • Configuring Virtual Interfaces and Routing on Cisco Meraki MS Switches
    • Configuring Routes and Redistribution
    • Configuring Quality of Service
    • Configuring Traffic Shaping
    • Configuring Load Balancing
    • Defining Firewall Rules
    • Enabling Advanced Malware Protection, Intrusion Detection, and Intrusion Prevention
    • Enabling Content Filtering
    • Configure and Apply Access Policies
    • Configure Wireless Guest Access
    • Configure Service Set Identifiers (SSIDs)
    • Implementing RF Profiles
    • Implement Air Marshal
    • Create Cisco Meraki Systems Manager (SM) Configuration Profiles
    • Define Security Policies
    • Enforce End-to-End Security
    • Set-up Motion Alerts
    • Deploy Wireless Cameras
    • Manage Video Retention
    • Enable Alerts
    • Add Monitoring and Reporting
    • Generate and Analyze Summary Reports
    • Manage Firmware
    • Generate a Peripheral Component Interconnect (PCI) Compliance Report
    • Troubleshoot an Offline Device
    • Troubleshoot Content Filtering
    • Troubleshooting Remote Site Connectivity
    • Consulting Systems Engineer
    • Deployment Engineer
    • Network Administrator
    • Network Manager
    • Network Engineer
    • Site Reliability Engineer
    • Systems Engineer
    • Technical Solutions Architect
    • Wireless Design Engineer
    • Wireless Engineer

    Before enrolling in the ECMS2 course, it is highly recommended that you have already attended and completed the ECMS1 course before attending this training. You should also have general networking understanding, Meraki-specific proficiency, and knowledge in the following areas:

     

    General network:

    • Be actively engaged in the design, deployment, scaling, and management of enterprise networks
    • Strong fundamental knowledge of IP addressing and subnetting schemas necessary to build local area networks
    • Strong fundamental knowledge of dynamic routing protocols (focus/emphasis on Open Shortest Path First [OSPF] and Border Gateway Protocol [BGP])
    • A foundational understanding of wired and wireless Quality of Service (QoS) mechanisms, packet queue operations, and practical implementations
    • Be experienced with the design and configuration of IPsec and associated Virtual Private Network (VPN) technologies
    • A foundational understanding of network security controls/protocols, network management best practices, and data security
    • A foundational understanding of best practice Radio Frequency (RF) design principles and practical implementations
    • A foundational knowledge of wireless security best practices centered around access control (802.1x) and spectrum security through Wireless Intrusion Detection Systems (WIDS) and Wireless Intrusion Prevention Systems (WIPS)
    • A foundational command of standard logging/monitoring protocols (focus/emphasis on Simple Network Management Protocol [SNMP], syslog, and webhooks) and related implementation components or tools
    • Be familiar with and have basic knowledge of Application Programming Interfaces (APIs) and related languages/formats (REST, JavaScript Object Notation [JSON])

     

    Meraki knowledge:

    • Be able to describe the security, reliability, and scalability of the Cisco Meraki dashboard cloud architecture and its out-of-band control plane
    • Fundamental understanding of Dashboard’s organizational structure, delineation of privileges, and overarching administrative processes
    • Be able to outline the key components of Meraki licensing (co-termination model and expiration grace period)
    • Have the knowledge and ability to deploy advanced security features on MX security appliances (intrusion detection/prevention, Advanced Malware Protection [AMP], Layer 3 & 7 firewall rules)
    • Fundamental understanding of Auto VPN and its purpose when utilized in a Software-Defined Wide Area Network (SD-WAN) deployment
    • Be able to describe the concepts behind a cloud-based WLAN solution and the features that can be delivered including Layer 7 traffic shaping and various guest access authentication methods
    • Fundamental understanding of device profile containerization and remote management capabilities as managed through the Systems Manager platform
    • Fundamental understanding of the edge architecture as implemented by Meraki MV security cameras and its implications on video retention through various configurable options

     

    The following are the recommended Cisco offerings that may help you meet these prerequisites:

    • Implementing and Administering Cisco Solutions (CCNA)
    • Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
    • Engineering Cisco Meraki Solutions Part 1 (ECMS1)
      Programma
    • ` 29 Apr - 1 May, 2024
    • ` 27 May - 29 May, 2024
    • ` 24 Jun - 26 Jun, 2024
    • ` 22 Jul - 24 Jul, 2024
    • ` 19 Aug - 21 Aug, 2024

    Follow Up Courses

    Filtra
    • 2 Giorni

      15 Apr - 16 Apr, 2024

      13 May - 14 May, 2024

      10 Jun - 11 Jun, 2024

      8 Jul - 9 Jul, 2024

      5 Aug - 6 Aug, 2024

      2 Sep - 3 Sep, 2024

      Price on Request
      Book Now
    • 4 Giorni

      22 Apr - 25 Apr, 2024

      20 May - 23 May, 2024

      17 Jun - 20 Jun, 2024

      15 Jul - 18 Jul, 2024

      12 Aug - 15 Aug, 2024

      9 Sep - 12 Sep, 2024

      Price on Request
      Book Now
    • 4 Giorni

      15 Apr - 18 Apr, 2024

      13 May - 16 May, 2024

      10 Jun - 13 Jun, 2024

      8 Jul - 11 Jul, 2024

      5 Aug - 8 Aug, 2024

      2 Sep - 5 Sep, 2024

      Price on Request
      Book Now
    • 4 Giorni

      15 Apr - 18 Apr, 2024

      13 May - 16 May, 2024

      10 Jun - 13 Jun, 2024

      8 Jul - 11 Jul, 2024

      5 Aug - 8 Aug, 2024

      2 Sep - 5 Sep, 2024

      Price on Request
      Book Now
    • 3 Giorni

      15 Apr - 17 Apr, 2024

      13 May - 15 May, 2024

      10 Jun - 12 Jun, 2024

      8 Jul - 10 Jul, 2024

      5 Aug - 7 Aug, 2024

      2 Sep - 4 Sep, 2024

      Price on Request
      Book Now
    • 2 Giorni

      15 Apr - 16 Apr, 2024

      13 May - 14 May, 2024

      10 Jun - 11 Jun, 2024

      8 Jul - 9 Jul, 2024

      5 Aug - 6 Aug, 2024

      2 Sep - 3 Sep, 2024

      Price on Request
      Book Now
    • 3 Giorni

      22 Apr - 24 Apr, 2024

      20 May - 22 May, 2024

      17 Jun - 19 Jun, 2024

      15 Jul - 17 Jul, 2024

      12 Aug - 14 Aug, 2024

      9 Sep - 11 Sep, 2024

      Price on Request
      Book Now
    • 5 Giorni

      22 Apr - 26 Apr, 2024

      20 May - 24 May, 2024

      17 Jun - 21 Jun, 2024

      15 Jul - 19 Jul, 2024

      12 Aug - 16 Aug, 2024

      9 Sep - 13 Sep, 2024

      Price on Request
      Book Now
    • 3 Giorni

      22 Apr - 24 Apr, 2024

      20 May - 22 May, 2024

      17 Jun - 19 Jun, 2024

      15 Jul - 17 Jul, 2024

      12 Aug - 14 Aug, 2024

      9 Sep - 11 Sep, 2024

      Price on Request
      Book Now
    • 4 Giorni

      22 Apr - 25 Apr, 2024

      20 May - 23 May, 2024

      17 Jun - 20 Jun, 2024

      15 Jul - 18 Jul, 2024

      12 Aug - 15 Aug, 2024

      9 Sep - 12 Sep, 2024

      Price on Request
      Book Now

    Know someone who´d be interested in this course?
    Let them know...

    Use the hashtag #InsoftLearning to talk about this course and find students like you on social media.