Network Kings

Cisco CCNP
Enterprise / Security / Data Center

CCNP Enterprise is a professional-level certification designed especially for candidates thriving to excel in networking. After completing the CCNA certification training, one can enroll for the CCNP Enterprise certification. The CCNP Enterprise course can help you make up to 12+ LPA as a fresher. The CCNP Enterprise training is for those who really want to move ahead in the networking field and become Network Engineers.


World's biggest
virtual labs

Learn Directly
from Engineers

IT Infrastructure

Applications are Closing Soon, Register Now!

Apply Now for Next Class &
Get 5 Days FREE Fundamental Course

* Your information is secure with us

Curriculum designed to clear CCNP Exam

  • Apply routing protocols – OSPFv2, OSPFv3, MP-BGP, PIM, FHRP
  • Apply switching protocols such as RSTP+, LACP, and vPC
  • Apply overlay protocols such as VXLAN, EVPN, and OTV
  • Apply ACI concepts – Fabric setup, Access policies, VMM, Tenant policies
  • Analyze packet flow (unicast, multicast, and broadcast)
  • Analyze Cloud service and deployment models (NIST 800-145)
  • Describe software updates and their impacts – Disruptive/nondisruptive, EPLD, and Patches
  • Implement network configuration management
  • Implement infrastructure monitoring such as NetFlow and SPAN
  • Explain network assurance concepts such as streaming telemetry
  • Implement Cisco Unified Compute System Rack Servers
  • Implement Cisco Unified Compute System Blade Chassis – Initial setup, Infrastructure Management, Network Management, Storage Management, Server Management
  • Explain HyperFlex Infrastructure Concepts and benefits (Edge and Hybrid Architecture vs all-flash)
  • Describe firmware and software updates and their impacts on B-Series and C-Series servers
  • Implement compute configuration management (Backup and restore)
  • Implement infrastructure monitoring such as SPAN and Intersight
  • Implement Fiber Channel
    Switch fabric initialization
    Port channels
    Device alias
    NPV and NPIV
  • Implement automation and scripting tools – EEM, Scheduler, Bash Shell and Guest Shell for NX-OS, REST API, JSON and XML encodings
  • Evaluate automation and orchestration technologies – Ansible, Puppet, Python, POAP, DCNM, UCSD, PowerShell
  • Apply network security
    AAA and RBAC, ACI contracts and micro-segmentation, CoPP
    AAA and RBAC, Keychain authentication
    AAA and RBAC, Fabric binding
  1. ASA Overview and History
  2. ASA deployment
  3. Bootstrapping and basic ASA configuration
  4. ASA traffic flow & ASA routing
  5. NAT
  6. Modular Policy Framework (MPF)
  7. Transparent firewall
  8. QoS
  9. ASA HA & ASA clustering
  10. Security context
  1. Introduction and overview
  2. Firepower deployment
  3. Firepower traffic flow
  4. Access Control Policy
  5. Device and object management
  6. Network Discovery & Intrusion Policy
  7. NAP and pre-processors
  8. File detection and AMP4N
  9. SSL decryption & Identity policy
  10. Correlation policies & Event analysis
  1. Basics of cryptography
  2. Introduction to IPSec and PK
  3. VPN types and modes
  4. Site-to-Site VPNs
  6. FlexVPN
  7. SSL VPN
  8. Clientless RA VPNs
  9. AnyConnect VPNs
  10. VPN load balancing and HA
  1. Layer 2 Threats and Mitigation
  2. Implementing network foundation protection framework (NFP)
  3. Understand and secure MP-CP
  4. Secure management traffic
  5. Secure Infra device images and config files
  6. Securing routing protocols
  1. WSA proxy services & Integrated L4TM
  2. User identity and authentication
  3. Web security policies
  4. URL filtering & SSL decryption
  5. Bandwidth control & AVC
  6. Outbound data security
  7. SMTP Overview & Relay
  8. ESA packet flow & Reputation filters
  9. AS and AV & Outbreak filters
  10. Content Filters & Content Security
  1. AAA framework overview
  3. IEEE 802.1x
  4. ISE introduction and overview
  5. ISE and AD integration
  6. Wired and wireless 802.1x
  7. Guest access & ISE posturing
  8. Device profiling
  9. BYOD, MAB & TrustSec
  10. ISE in SDA deployment
  1. NetFlow and deployment scenarios
  2. Netflow in Cisco IOS and IOS-XE
  3. StealthWatch Management Console and Flow Collector
  4. CTA and ETA
  1. AMP4E introduction and overview
  2. Licensing
  3. AMP4E Console
  4. Managing policies
  5. Best practices
  6. Malicious investigations
  7. Introduction to Threat Grid
  8. Cloud vs On-prem
  9. TG File analysis
  10. CTR and SecureX
  1. Why and What of DNS?
  2. DNS Importance
  3. Umbrella introduction
  4. Umbrella use cases

3X your salary prospects with CCNP certification

CCNP by Mr. Sumit

Network Consultant


hours of learning


Enrolled Students

Access to the world’s

biggest Cisco labs

Live interactive


Our Students got job at

24x7 Lab Access
We offer world's biggest virtual labs

Our Alumni Placed at the Big IT firms...

A man standing in front of a blue and white wall.

Pradipta Sannyasi

Network Engineer

A blue logo with a blue background.
A young man in a suit and tie posing for a photo.

Kartick Mondal

System Engineer

A green logo with a black background.
Sarwar Ansari

Harsh Sonker

Associate Consultant

A blue background with a white arrow in the middle of it.
An image of a man with a beard and mustache.

Ilyas Khan

Network Administration Trainee

A purple and green logo with a green and purple background.
Network Kings

Disclaimer-  @2011-2023-Network Kings. All Rights Reserved.
We do not claim the ownership of the logos used above. They only belong to their respective organizations.