[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jwt0gt3e’ admin_preview_bg=”]

juniper design course

ASSOCIATEDesign, Associate (JNCDA)

Designed for networking professionals and designers with beginner knowledge of network design, theory, and best practices, this written exam verifies the candidate’s understanding of network design fundamentals.

Prerequisite certification: none.

  • 24 hours of teaching design concepts includes customer`s requirement , managing data , network security , automation and …

Topics of JNCDA:

[/av_textblock] [av_table purpose=’pricing’ pricing_table_design=’avia_pricing_default’ pricing_hidden_cells=” caption=” responsive_styling=’avia_responsive_table’ av_uid=’av-w6pk3g1j’] [av_row row_style=” av_uid=’av-w5cwi6bb’][av_cell col_style=” av_uid=’av-vxb94dfb’]JNCDA[/av_cell][/av_row] [av_row row_style=” av_uid=’av-vtvnam47′][av_cell col_style=” av_uid=’av-vrmn5h4n’]JNCDA(24H)[/av_cell][/av_row] [av_row row_style=” av_uid=’av-vlfa10tz’][av_cell col_style=” av_uid=’av-359iwks7′]Chapter 1:       Course Introduction[/av_cell][/av_row] [av_row row_style=” av_uid=’av-va29tv3r’][av_cell col_style=” av_uid=’av-34iv5tmf’]Chapter 2:       Network Design Fundamentals[/av_cell][/av_row] [av_row row_style=” av_uid=’av-v2sfv5pz’][av_cell col_style=” av_uid=’av-ux7nfe5z’]·        A Need for Design[/av_cell][/av_row] [av_row row_style=” av_uid=’av-332rqe2f’][av_cell col_style=” av_uid=’av-up4xxuk7′]·        Knowledge is King[/av_cell][/av_row] [av_row row_style=” av_uid=’av-um8r2zg7′][av_cell col_style=” av_uid=’av-31o14i47′]·        A Proposed Design Methodology[/av_cell][/av_row] [av_row row_style=” av_uid=’av-ua4ouo1j’][av_cell col_style=” av_uid=’av-u6nm1bw7′]·        A Reference Network[/av_cell][/av_row] [av_row row_style=” av_uid=’av-u3nssjav’][av_cell col_style=” av_uid=’av-tzd61l4n’]Chapter 3:       Understanding Customer Requirements[/av_cell][/av_row] [av_row row_style=” av_uid=’av-ttceh37b’][av_cell col_style=” av_uid=’av-tph4tu0n’]·        RFP Requirements[/av_cell][/av_row] [av_row row_style=” av_uid=’av-thtmhncn’][av_cell col_style=” av_uid=’av-ten1qkc7′]·        Scoping the Design Project[/av_cell][/av_row] [av_row row_style=” av_uid=’av-2xjr008n’][av_cell col_style=” av_uid=’av-t5t8fk8n’]·        Analyzing the Data[/av_cell][/av_row] [av_row row_style=” av_uid=’av-t08oxarb’][av_cell col_style=” av_uid=’av-2vxm9cvr’]·        Lab: Understanding Customer Requirements[/av_cell][/av_row] [av_row row_style=” av_uid=’av-sr8k6pkn’][av_cell col_style=” av_uid=’av-sosbv587′]Chapter 4:       Organizing the Data[/av_cell][/av_row] [av_row row_style=” av_uid=’av-sia5d7av’][av_cell col_style=” av_uid=’av-sewsie9j’]·        Processing the Data and Requests[/av_cell][/av_row] [av_row row_style=” av_uid=’av-sb435buf’][av_cell col_style=” av_uid=’av-s49weoqf’]·        Understanding Boundaries and Scope[/av_cell][/av_row] [av_row row_style=” av_uid=’av-s1zggu47′][av_cell col_style=” av_uid=’av-rx4nyhiv’]·        Design Proposal Considerations[/av_cell][/av_row] [av_row row_style=” av_uid=’av-rq71z46v’][av_cell col_style=” av_uid=’av-2rjz5ilz’]Chapter 5:       Securing the Network[/av_cell][/av_row] [av_row row_style=” av_uid=’av-rise5u5z’][av_cell col_style=” av_uid=’av-rchorto7′]·        Why Secure the Network?[/av_cell][/av_row] [av_row row_style=” av_uid=’av-racgyy7r’][av_cell col_style=” av_uid=’av-r455msqf’]·        Security Design Considerations[/av_cell][/av_row] [av_row row_style=” av_uid=’av-qzqc96if’][av_cell col_style=” av_uid=’av-qv8ecmyf’]Chapter 6:       Creating the Design—Campus[/av_cell][/av_row] [av_row row_style=” av_uid=’av-qpbdc3qv’][av_cell col_style=” av_uid=’av-qmpqx86v’]·        The Campus Network: An Overview[/av_cell][/av_row] [av_row row_style=” av_uid=’av-qg2nljlj’][av_cell col_style=” av_uid=’av-qc1cn2lz’]·        Best Practices and Considerations[/av_cell][/av_row] [av_row row_style=” av_uid=’av-qa0rjkjb’][av_cell col_style=” av_uid=’av-q30k3587′]·        Architectural Design Options[/av_cell][/av_row] [av_row row_style=” av_uid=’av-pxgn7cqf’][av_cell col_style=” av_uid=’av-ptgnvk53′]·        Lab: Creating the Design—Campus[/av_cell][/av_row] [av_row row_style=” av_uid=’av-po3nuyif’][av_cell col_style=” av_uid=’av-pmodlrlj’]Chapter 7:       Creating the Design—Wide Area Networks[/av_cell][/av_row] [av_row row_style=” av_uid=’av-phfd2mrb’][av_cell col_style=” av_uid=’av-pe4u0y5z’]·        The WAN: An Overview[/av_cell][/av_row] [av_row row_style=” av_uid=’av-p8cdc1x3′][av_cell col_style=” av_uid=’av-p1iqu5dj’]·        Best Practices and Considerations[/av_cell][/av_row] [av_row row_style=” av_uid=’av-ox148ubb’][av_cell col_style=” av_uid=’av-ovl2lpkn’]·        WAN Design Examples[/av_cell][/av_row] [av_row row_style=” av_uid=’av-2gtq6t9z’][av_cell col_style=” av_uid=’av-olcf47w7′]·        Lab: Creating the Design—WAN[/av_cell][/av_row] [av_row row_style=” av_uid=’av-oefiqhkn’][av_cell col_style=” av_uid=’av-ocqdmy47′]Chapter 8:       Creating the Design—Data Center[/av_cell][/av_row] [av_row row_style=” av_uid=’av-o8dqujqv’][av_cell col_style=” av_uid=’av-o3ar173r’]·        The Data Center: An Overview[/av_cell][/av_row] [av_row row_style=” av_uid=’av-2ed173zr’][av_cell col_style=” av_uid=’av-nu4kze47′]·        Best Practices and Considerations[/av_cell][/av_row] [av_row row_style=” av_uid=’av-noqcwppz’][av_cell col_style=” av_uid=’av-2cs2q8l3′]·        Data Center Design Examples[/av_cell][/av_row] [av_row row_style=” av_uid=’av-ndk30z7b’][av_cell col_style=” av_uid=’av-2btizpvb’]·        Lab: Creating the Design—Data Center[/av_cell][/av_row] [av_row row_style=” av_uid=’av-n68ymgmv’][av_cell col_style=” av_uid=’av-n37ev5iv’]Chapter 9:       Business Continuity and Network Enhancements[/av_cell][/av_row] [av_row row_style=” av_uid=’av-myqlg33r’][av_cell col_style=” av_uid=’av-2a23qcxj’]·        Business Continuity Planning[/av_cell][/av_row] [av_row row_style=” av_uid=’av-mn75nb1z’][av_cell col_style=” av_uid=’av-mhwdeshj’]·        High Availability Design Considerations and Best Practices[/av_cell][/av_row] [av_row row_style=” av_uid=’av-mg98y4tz’][av_cell col_style=” av_uid=’av-mb6qzsc7′]·        Offerings and Solutions[/av_cell][/av_row] [av_row row_style=” av_uid=’av-m567rcvr’][av_cell col_style=” av_uid=’av-lzxd6k3b’]·        CoS and Traffic Engineering Considerations[/av_cell][/av_row] [av_row row_style=” av_uid=’av-lxq8begn’][av_cell col_style=” av_uid=’av-lq9669pz’]·        Environmental Design[/av_cell][/av_row] [av_row row_style=” av_uid=’av-lo3xrynr’][av_cell col_style=” av_uid=’av-lijnsmuv’]Chapter 10: Network Management[/av_cell][/av_row] [av_row row_style=” av_uid=’av-legmx2yf’][av_cell col_style=” av_uid=’av-ladzqhyv’]·        Designing for Network Management[/av_cell][/av_row] [av_row row_style=” av_uid=’av-l5ot23g7′][av_cell col_style=” av_uid=’av-kxv6fiyf’]Chapter 11: Automation[/av_cell][/av_row] [av_row row_style=” av_uid=’av-kuchv54n’][av_cell col_style=” av_uid=’av-22i8yyyf’]·        Designing for Network Automation[/av_cell][/av_row] [av_row row_style=” av_uid=’av-kl9lp5x3′][av_cell col_style=” av_uid=’av-kike383b’]·        Lab: Enhancing the Design[/av_cell][/av_row] [av_row row_style=” av_uid=’av-kblmfiev’][av_cell col_style=” av_uid=’av-k8icr4dz’]Chapter 12:     Putting Network Design into Practice[/av_cell][/av_row] [av_row row_style=” av_uid=’av-20g1izlj’][av_cell col_style=” av_uid=’av-200kuozb’]·        Network Design Recap[/av_cell][/av_row] [av_row row_style=” av_uid=’av-jwmeun07′][av_cell col_style=” av_uid=’av-jp51e9rr’]·        Responding to the RFP[/av_cell][/av_row] [av_row row_style=” av_uid=’av-jjtamm47′][av_cell col_style=” av_uid=’av-jh02ccaf’]·        Final Lab Introduction[/av_cell][/av_row] [av_row row_style=” av_uid=’av-jbck9hiv’][av_cell col_style=” av_uid=’av-j9gq1e2f’]·        Lab: Putting Network Design into Practice[/av_cell][/av_row] [/av_table] [av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jwt0wohy’ admin_preview_bg=”]

JNCDS-DC courses includes topics that related to designing big networks and data centers

24 hours of teaching design concepts likes How to design data centers in the old days, data center security, virtualization in data centers, strategy for relocation, logical and physical services and equipment sustainability, …

Topics of JNCDS-DC:

[/av_textblock] [av_table purpose=’pricing’ pricing_table_design=’avia_pricing_default’ pricing_hidden_cells=” caption=” responsive_styling=’avia_responsive_table’ av_uid=’av-j4a6t9yv’] [av_row row_style=” av_uid=’av-iwjc7j3r’][av_cell col_style=” av_uid=’av-ivgb4jg7′]JNCDS-DC[/av_cell][/av_row] [av_row row_style=” av_uid=’av-ipx684dz’][av_cell col_style=” av_uid=’av-imjsrvqv’]JND-DC(40H)[/av_cell][/av_row] [av_row row_style=” av_uid=’av-ihmtobav’][av_cell col_style=” av_uid=’av-ib830j7b’]Course Level[/av_cell][/av_row] [av_row row_style=” av_uid=’av-1tlivodz’][av_cell col_style=” av_uid=’av-i0lvblh3′]JND-DC is an intermediate-level course.[/av_cell][/av_row] [av_row row_style=” av_uid=’av-hx29exrr’][av_cell col_style=” av_uid=’av-hs14a4vr’]Course Contents[/av_cell][/av_row] [av_row row_style=” av_uid=’av-hn1192pj’][av_cell col_style=” av_uid=’av-hi2bmzqv’]Day 1[/av_cell][/av_row] [av_row row_style=” av_uid=’av-hdmfk77b’][av_cell col_style=” av_uid=’av-hchqxv1z’]Chapter 1: Course Introduction[/av_cell][/av_row] [av_row row_style=” av_uid=’av-h6ahzfzr’][av_cell col_style=” av_uid=’av-1p5lm0mv’]Chapter 2: Overview of Data Center Design[/av_cell][/av_row] [av_row row_style=” av_uid=’av-gx6kb5o7′][av_cell col_style=” av_uid=’av-gqbilz3r’]·        Initial Considerations[/av_cell][/av_row] [av_row row_style=” av_uid=’av-gpfm4t6f’][av_cell col_style=” av_uid=’av-gijn3cqf’]·        Architectures and Design Considerations[/av_cell][/av_row] [av_row row_style=” av_uid=’av-ges0fgmv’][av_cell col_style=” av_uid=’av-g9b249fb’]·        Connecting Data Centers[/av_cell][/av_row] [av_row row_style=” av_uid=’av-g5p6n7uf’][av_cell col_style=” av_uid=’av-1ljq4z1z’]·        Security and Operation[/av_cell][/av_row] [av_row row_style=” av_uid=’av-fu89cbqv’][av_cell col_style=” av_uid=’av-ftgkop2v’]·        Implementation Considerations[/av_cell][/av_row] [av_row row_style=” av_uid=’av-flm62r5j’][av_cell col_style=” av_uid=’av-fj1hll2v’]Chapter 3: Initial Design Considerations[/av_cell][/av_row] [av_row row_style=” av_uid=’av-feopga9j’][av_cell col_style=” av_uid=’av-far7fiev’]·        Physical Layout and Placement[/av_cell][/av_row] [av_row row_style=” av_uid=’av-f5qox6if’][av_cell col_style=” av_uid=’av-ey9vpjuf’]·        Environmental Conditions[/av_cell][/av_row] [av_row row_style=” av_uid=’av-ewn5japj’][av_cell col_style=” av_uid=’av-esord46v’]·        Cabling Options[/av_cell][/av_row] [av_row row_style=” av_uid=’av-1govubnb’][av_cell col_style=” av_uid=’av-eh7de35j’]·        Data Center Use Cases[/av_cell][/av_row] [av_row row_style=” av_uid=’av-eb23a92v’][av_cell col_style=” av_uid=’av-e9hpnjuf’]Chapter 4: Traditional Data Center Architecture[/av_cell][/av_row] [av_row row_style=” av_uid=’av-e41wf9dj’][av_cell col_style=” av_uid=’av-e11lww8n’]·        Traditional Multitier Architecture[/av_cell][/av_row] [av_row row_style=” av_uid=’av-dv02d0vr’][av_cell col_style=” av_uid=’av-dqe36ppz’]·        Link Aggregation and Redundant Trunk Groups[/av_cell][/av_row] [av_row row_style=” av_uid=’av-dm1vvl2v’][av_cell col_style=” av_uid=’av-dgldn37b’]·        Multichassis Link Aggregation[/av_cell][/av_row] [av_row row_style=” av_uid=’av-1bvt91yv’][av_cell col_style=” av_uid=’av-d5wv6wdz’]·        Lab: Designing a Multitier Architecture[/av_cell][/av_row] [av_row row_style=” av_uid=’av-d4lwbud3′][av_cell col_style=” av_uid=’av-cx61ncs7′]Chapter 5: Ethernet Fabric Architectures[/av_cell][/av_row] [av_row row_style=” av_uid=’av-csr2beif’][av_cell col_style=” av_uid=’av-cnp2825z’]·        Virtual Chassis[/av_cell][/av_row] [av_row row_style=” av_uid=’av-cip4jwfr’][av_cell col_style=” av_uid=’av-cgr0rf3r’]·        Virtual Chassis Fabric[/av_cell][/av_row] [av_row row_style=” av_uid=’av-c9nmec1j’][av_cell col_style=” av_uid=’av-c7wrdpo7′]·        QFabric[/av_cell][/av_row] [av_row row_style=” av_uid=’av-c3vmz0c7′][av_cell col_style=” av_uid=’av-bzdzs9o7′]·        Junos Fusion[/av_cell][/av_row] [av_row row_style=” av_uid=’av-buy92dkn’][av_cell col_style=” av_uid=’av-bqmjm92v’]·        Ethernet Fabric Design Considerations[/av_cell][/av_row] [av_row row_style=” av_uid=’av-bkhlf33r’][av_cell col_style=” av_uid=’av-bhfzvh6f’]·        Lab: Ethernet Fabric Architecture[/av_cell][/av_row] [av_row row_style=” av_uid=’av-bb3uor1z’][av_cell col_style=” av_uid=’av-14afpsc7′]Chapter 6: IP Fabric Architecture[/av_cell][/av_row] [av_row row_style=” av_uid=’av-b1kwevg7′][av_cell col_style=” av_uid=’av-avv1716f’]·        The Shift To IP Fabrics[/av_cell][/av_row] [av_row row_style=” av_uid=’av-at5rssjb’][av_cell col_style=” av_uid=’av-aml7kfhz’]·        IP Fabric Routing Design[/av_cell][/av_row] [av_row row_style=” av_uid=’av-akir6y2f’][av_cell col_style=” av_uid=’av-ae4oci5z’]·        IP Fabric Scaling[/av_cell][/av_row] [av_row row_style=” av_uid=’av-11469xtj’][av_cell col_style=” av_uid=’av-a5hk622f’]·        VXLAN[/av_cell][/av_row] [av_row row_style=” av_uid=’av-a1y5elmf’][av_cell col_style=” av_uid=’av-9wufzlyv’]·        Lab: IP Fabric Architecture[/av_cell][/av_row] [av_row row_style=” av_uid=’av-9s5meqrb’][av_cell col_style=” av_uid=’av-9mpsl0on’]Chapter 7: Data Center Interconnect[/av_cell][/av_row] [av_row row_style=” av_uid=’av-y2fdfg7′][av_cell col_style=” av_uid=’av-9dymjddj’]·        DCI Overview[/av_cell][/av_row] [av_row row_style=” av_uid=’av-97je0l4n’][av_cell col_style=” av_uid=’av-93e1scjb’]·        Layer 2 DCI[/av_cell][/av_row] [av_row row_style=” av_uid=’av-8zbjd8dz’][av_cell col_style=” av_uid=’av-8tmogu0n’]·        EVPN Use Cases[/av_cell][/av_row] [av_row row_style=” av_uid=’av-8qofs7w7′][av_cell col_style=” av_uid=’av-8l2lu587′]·        Layer 3 DCI[/av_cell][/av_row] [av_row row_style=” av_uid=’av-8if0koon’][av_cell col_style=” av_uid=’av-8btvi5h3′]·        Lab: Data Center Interconnect[/av_cell][/av_row] [av_row row_style=” av_uid=’av-874szs6v’][av_cell col_style=” av_uid=’av-84fd1rw7′]Chapter 8: Securing the Data Center[/av_cell][/av_row] [av_row row_style=” av_uid=’av-7zwxa86v’][av_cell col_style=” av_uid=’av-7wa236bb’]·        Overview of Data Center Security[/av_cell][/av_row] [av_row row_style=” av_uid=’av-7qxi5a0n’][av_cell col_style=” av_uid=’av-7lse4fxz’]·        Security Elements[/av_cell][/av_row] [av_row row_style=” av_uid=’av-7fxhbe5z’][av_cell col_style=” av_uid=’av-7b5hfat3′]·        Simplifying Security in the Data Center[/av_cell][/av_row] [av_row row_style=” av_uid=’av-prynl4n’][av_cell col_style=” av_uid=’av-71prudrr’]·        Advanced Data Center Security[/av_cell][/av_row] [av_row row_style=” av_uid=’av-6wp4kl13′][av_cell col_style=” av_uid=’av-6tsitvsn’]·        Lab: Securing the Data Center[/av_cell][/av_row] [av_row row_style=” av_uid=’av-6ocoeq47′][av_cell col_style=” av_uid=’av-6kgfmw8n’]Chapter 9: SDN and Virtualization in the Data Center[/av_cell][/av_row] [av_row row_style=” av_uid=’av-6eea1zhz’][av_cell col_style=” av_uid=’av-6cx8ougn’]·        Designing SDN in the Data Center[/av_cell][/av_row] [av_row row_style=” av_uid=’av-mb75hh3′][av_cell col_style=” av_uid=’av-63njtpmf’]·        Using Contrail in the Data Center[/av_cell][/av_row] [av_row row_style=” av_uid=’av-5wghvtvb’][av_cell col_style=” av_uid=’av-5rj8nw53′]·        Using NFV in the Data Center[/av_cell][/av_row] [av_row row_style=” av_uid=’av-5mzd3mt3′][av_cell col_style=” av_uid=’av-5l9xvq2f’]·        Understanding How Contrail Works in the Data Center[/av_cell][/av_row] [av_row row_style=” av_uid=’av-jh8o513′][av_cell col_style=” av_uid=’av-5945qbqv’]·        Working in Virtual Environments in the Data Center[/av_cell][/av_row] [av_row row_style=” av_uid=’av-558a216f’][av_cell col_style=” av_uid=’av-52727e5z’]·        Lab: SDN and Virtualization[/av_cell][/av_row] [av_row row_style=” av_uid=’av-4yrkjo3b’][av_cell col_style=” av_uid=’av-4qj39ud3′]Chapter 10: Data Center Operation[/av_cell][/av_row] [av_row row_style=” av_uid=’av-4pd4t4mv’][av_cell col_style=” av_uid=’av-4kywv46v’]·        Understanding Baseline Behaviors[/av_cell][/av_row] [av_row row_style=” av_uid=’av-4dky21kn’][av_cell col_style=” av_uid=’av-486syj7b’]·        Deploying Junos Space and JSA[/av_cell][/av_row] [av_row row_style=” av_uid=’av-455i4q5z’][av_cell col_style=” av_uid=’av-3zosr113′]·        Understanding Analytics[/av_cell][/av_row] [av_row row_style=” av_uid=’av-3wmc8vnb’][av_cell col_style=” av_uid=’av-3tf330tz’]·        Deploying Automation in the Data Center[/av_cell][/av_row] [av_row row_style=” av_uid=’av-3ouvm3ef’][av_cell col_style=” av_uid=’av-3gzsldo7′]·        Lab: Operating a Data Center[/av_cell][/av_row] [av_row row_style=” av_uid=’av-3eo3el2v’][av_cell col_style=” av_uid=’av-3a9rvz07′]Chapter 11: Traffic Prioritization for Converged Networks[/av_cell][/av_row] [av_row row_style=” av_uid=’av-33lcc6ev’][av_cell col_style=” av_uid=’av-30a33f7b’]·        Understanding QoS and CoS[/av_cell][/av_row] [av_row row_style=” av_uid=’av-2vu41gmv’][av_cell col_style=” av_uid=’av-9qp4arb’]·        Converging Networks[/av_cell][/av_row] [av_row row_style=” av_uid=’av-2lp8w8hj’][av_cell col_style=” av_uid=’av-2h3bi853′]·        Lab: Prioritizing Data in the Data Center[/av_cell][/av_row] [av_row row_style=” av_uid=’av-2c392lkn’][av_cell col_style=” av_uid=’av-295u5np3′]Chapter 12:     Migration Strategies[/av_cell][/av_row] [av_row row_style=” av_uid=’av-24ith1fb’][av_cell col_style=” av_uid=’av-711fnlj’]·        Migration Overview[/av_cell][/av_row] [av_row row_style=” av_uid=’av-6ii0qgn’][av_cell col_style=” av_uid=’av-1rukvvzr’]·        Common Scenarios[/av_cell][/av_row] [av_row row_style=” av_uid=’av-1mykbgmv’][av_cell col_style=” av_uid=’av-1gtjqk8n’]·        Migration Case Study[/av_cell][/av_row] [av_row row_style=” av_uid=’av-1aop3zw7′][av_cell col_style=” av_uid=’av-184cjhx3′]·        Lab: Data Center Migration[/av_cell][/av_row] [av_row row_style=” av_uid=’av-3zo8453′][av_cell col_style=” av_uid=’av-zzbp9mf’]  Chapter 13:     High Availability[/av_cell][/av_row] [av_row row_style=” av_uid=’av-ttliq7r’][av_cell col_style=” av_uid=’av-qo4noqf’]·        Data Center High Availability Overview[/av_cell][/av_row] [av_row row_style=” av_uid=’av-l9572if’][av_cell col_style=” av_uid=’av-fjibapj’]·        Link Level and Physical Device Redundancy[/av_cell][/av_row] [av_row row_style=” av_uid=’av-18bt99z’][av_cell col_style=” av_uid=’av-92jvfjr’]·        Device-Level Redundancy[/av_cell][/av_row] [/av_table] [av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jwt1fee8′ admin_preview_bg=”]

Click here to register

Contact us for more information

[/av_textblock]