Network Specialist Master Program

 5/5

97% positive reviews

Beginner

About Course

The Network Specialist Master’s Program is an advanced networking program tailored especially for the Network Associates who want to upskill for better job opportunities and better income. This course includes: Cisco Certified Network Professional (CCNP) Implementing Cisco Enterprise Network Core Technologies (ENCOR)/ Cisco Certified Internetwork Expert (CCIE) and firewalls (F5 LTM, PaloAlto, and CheckPoint firewall). 

This Combo includes

ccnp encor

CCIE/CCNP ENCOR

Vector (5)
F5 LTM FIREWALL CERTIFICATION

F5 LTM Firewall

Vector (5)
paloalto-training

PaloAlto Firewall

Vector (5)
CHECKPOINT FIREWALL CERTIFICATION

Checkpoint Firewall

Eligibility

✓   Bachelor’s degree in computer science, information science, or something with  similar value. 

✓   Certified CompTIA, Microsoft, or Cisco network professionals preferred.

✓  A minimum of two years’ experience as a network specialist.

✓  Extensive knowledge of network connectivity, technologies, protocols, and security.

Play Video

Book Free 1 to 1 Guidance Session
with Career Counsellor

Days
Hours
Minutes
Seconds

Have a look at Network Kings Terms and Privacy Policy

Multiple Languages

Choose from Hindi and English

24X7 Assistance

To answer your queries

Updated Syllabus

Latest resources to learn from

Hands on Experience

Practice with virtual labs

Get Certified

Earn a completion certificate

We offer world's largest virtual labs

✓ Experience real world simulations to become job ready.

✓ Get 24×7 access to labs to learn at your convenience.

✓ Access virtually from any part of the world.

Lab SDWAN 1

Syllabus

CCNP ENCOR
F5 LTM Firewall
Palo Alto Firewall
Checkpoint Firewall
CCNP ENCOR

01

Architecture

  • Enterprise Network
  • WLAN Deployment
  • Cisco SD-WAN Solutions
  • Cisco SD-Access Solution
  • Wireless QoS
  • Switching Mechanisms

02

Virtualization

  • Virtualization technologies
  • Path virtualization technologies
  • Virtualization Concepts

03

Infrastructure

  • Layer 2
  • Layer 3
  • Wireless
  • IP Services

04

Network Assurance

  • Diagnose network problems using various tools

05

Security

  • Configure and verify device access control
  • Configure and verify infrastructure security features
  • Describe REST API security
  • Configure and verify wireless security features
  • Describe components of network security design

06

Automation

  • Basic Python components and scripts

ccnp training
Download Brochure

F5 LTM Firewall

01

Setting Up the BIG-IP System

  • Introducing the BIG-IP System
  •  Initially Setting Up the BIG-IP System
  • Archiving the BIG-IP Configuration
  • Leveraging F5 Support Resources and Tools

02

Reviewing Local Traffic Configuration

  • Reviewing Nodes, Pools, and Virtual Servers
  • Reviewing Address Translation
  • Reviewing Routing Assumptions
  • Reviewing Application Health Monitoring
  • Reviewing Traffic Behavior Modification with Profiles
  • Reviewing the TMOS Shell (TMSH)
  • Reviewing Managing BIG-IP Configuration Data

03

Load Balancing Traffic with LTM

  • Exploring Load Balancing Options
  • Using Priority Group Activation and Fallback Host
  • Comparing Member and Node Load Balancing

04

Modifying Traffic Behavior with Persistence

  • Reviewing Persistence
  • Introducing Cookie Persistence
  • Specifying Default and Fallback Persistence
  • Introducing SSL Persistence
  • Introducing SIP Persistence
  • Introducing Universal Persistence
  • Introducing Destination Address Affinity Persistence
  • Using Match Across Options for Persistence

05

Monitoring Application Health

  • Differentiating Monitor Types
  • Customizing the HTTP Monitor
  • Monitoring an Alias Address and Port
  • Monitoring a Path vs. Monitoring a Device
  • Managing Multiple Monitors
  • Using Application Check Monitors
  • Using Manual Resume and Advanced Monitor Timer
    Settings

06

Processing Traffic with SNATs

  • Overview of SNATs
  • Using SNAT Pools
  • SNATs as Listeners
  • SNAT Specificity
  • VIP Bounceback
  • Additional SNAT Options
  • Network Packet
  • Processing Review

07

Processing Traffic with Virtual Servers

  • Understanding the Need for Other Virtual
    Server Types
  • Forwarding Traffic with a Virtual Server
  • Understanding Virtual Server Order of
    Precedence
  • Path Load Balancing

08

Modifying Traffic Behavior with Profiles

  • Profiles Overview
  • TCP Express Optimization
  • TCP Profiles Overview
  • HTTP Profile Options
  • HTTP/2 Profile Options
  • OneConnect
  • Offloading HTTP Compression to BIG-IP
  • Web Acceleration Profile and HTTP Caching
  • Stream Profiles
  • F5 Acceleration Technologies

09

Selected Topics

  • VLAN, VLAN Tagging, and Trunking
  • Restricting Network Access
  • SNMP Features
  • Segmenting Network Traffic with Route Domains

10

Customizing Application Delivery with iRules

  • Getting Started with iRules
  • Understanding When iRules are Triggered
  • Deploying iRules
  • Constructing an iRule
  • Testing and Debugging iRules
  • Exploring iRules Documentation

11

Customizing Application Delivery with Local Traffic Policies

  • Introducing the BIG-IP System
  • Initially Setting Up the BIG-IP System
  • Archiving the BIG-IP Configuration
  • Leveraging F5 Support Resources and Tools

12

Securing Application Delivery with LTM

  • Understanding Today’s Threat Landscape
  • Integrating LTM Into Your Security Strategy
  • Defending Your Environment Against SYN Flood
    Attacks
  • Defending Your Environment Against Other
    Volumetric Attacks
  • Addressing Application Vulnerabilities with iRules and
    Local Traffic Policies
  • Detecting and Mitigating Other Common HTTP
    Threats

13

Customizing Application Delivery with Local Traffic Policies

  • About the Final Lab Project
Download Brochure

Palo Alto Firewall

01

Palo Alto Networks Security Operating Platform Core Components

  • Components and operation
  • Zero Trust security model
  • Cyberattack lifecycle

02

Simply Passing Traffic

  • Firewall Interfaces
  • Security
  • Virtual Router

03

Traffic Visibility

  • Security policies
  • App-ID

04

Securing Traffic

  • Security Prole
  • Firewall

05

Identifying Users

  • Usernames

06

Deployment Optimization

  • Heatmap and BPA reports
Download Brochure

Checkpoint Firewall

01

Security Concepts

  • Introduction to Check point and its appliances, GAIA
    OS- Know your product
  • Introduction to Check Point architecture and
    terminologies
  • Overview of Security management and security
    gateway

02

Virtualization

  • Deploying Security Gateway and Security
    management server on GNS or VMware in distributed
    and standalone architecture
  • Integrating Security management with Security gateway
  • Licensing
  • Installing and navigating Smart Console

03

Check Point software ow & introduction to GAIA OS

  • Software blades- In depth discussion about different
    SW blades and usage
  • Firewall ow processing- Logical in depth GW rewall
    chains processing

04

Security Policy Management

  • In depth discussion about security policies- Inline layers,
    ordered layers
  • Access, Application control and Threat prevention policies
  • NAT (Hide NAT, Static NAT)
  • URLF (URL ltering) In-depth discussion about how URL
    gets categorized
  • QoS
    Labs: Creating security policies to allow or block access