[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jwsxrkrn’ admin_preview_bg=”]

Juniper Enterprise Routing and Switching

Juniper training R&S courses are divided into four section that`s including:

R&S: Enterprise Routing and Switching, Specialist (JNCIS-ENT)

Designed for experienced networking professionals with beginner to intermediate knowledge of routing and switching implementations in Junos, this written exam verifies the candidate’s basic understanding of routing and switching technologies and related platform configuration and troubleshooting skills.

Prerequisite certification

  • JNCIA-Junos

Topics of JNCIS:

[/av_textblock] [av_table purpose=’tabular’ pricing_table_design=’avia_pricing_default’ pricing_hidden_cells=” caption=” responsive_styling=’avia_scrollable_table’ av_uid=”] [av_row row_style=’avia-heading-row’][av_cell col_style=”]JNCIS-ENT [/av_cell][av_cell col_style=”][/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]JEX(16H)[/av_cell][av_cell col_style=”]JIR(16H)[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 1: Course Introduction[/av_cell][av_cell col_style=”]Chapter 1: Course Introduction[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 2: Layer 2 Switching[/av_cell][av_cell col_style=”]Chapter 2: Protocol-Independent Routing[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Ethernet Bridging Basics[/av_cell][av_cell col_style=”]·        Static Routes[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Terminology and Design Considerations[/av_cell][av_cell col_style=”]·        Aggregated Routes[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Overview of Enterprise Switching Platforms[/av_cell][av_cell col_style=”]·        Generated Routes[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Enabling and Monitoring Layer 2 Switching Operations[/av_cell][av_cell col_style=”]·        Martian Addresses[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Lab 1: Implementing Layer 2 Switching[/av_cell][av_cell col_style=”]·        Routing Instances[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 3: Virtual Networks[/av_cell][av_cell col_style=”]·        Lab 1: Protocol-Independent Routing[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Overview of VLANs[/av_cell][av_cell col_style=”]Chapter 3: Load Balancing and Filter-Based Forwarding[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Configuring and Monitoring VLANs[/av_cell][av_cell col_style=”]·        Overview of Load Balancing[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Voice VLAN[/av_cell][av_cell col_style=”]·        Configuring and Monitoring Load Balancing[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Native VLAN[/av_cell][av_cell col_style=”]·        Overview of Filter-Based Forwarding[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Routed VLAN Interfaces[/av_cell][av_cell col_style=”]·        Configuring and Monitoring Filter-Based Forwarding[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Lab 2: Implementing Virtual Networks[/av_cell][av_cell col_style=”]·        Lab 2: Load Balancing and Filter-Based Forwarding[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 4: Spanning Tree[/av_cell][av_cell col_style=”]Chapter 4: Open Shortest Path First[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Spanning Tree Protocol[/av_cell][av_cell col_style=”]·        Overview of OSPF[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Rapid Spanning Tree Protocol[/av_cell][av_cell col_style=”]·        Adjacency Formation and the Designated Router Election[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Configuring and Monitoring STP and RSTP[/av_cell][av_cell col_style=”]·        OSPF Scalability[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Protection Features: BPDU Protection[/av_cell][av_cell col_style=”]·        Configuring and Monitoring OSPF[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Protection Features: Loop Protection[/av_cell][av_cell col_style=”]·        Basic OSPF Troubleshooting[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Protection Features: Root Protection[/av_cell][av_cell col_style=”]·        Lab 3: Open Shortest Path First[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Lab 3: Implementing Spanning Tree[/av_cell][av_cell col_style=”]Chapter 5: Border Gateway Protocol[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 5: Port Security[/av_cell][av_cell col_style=”]·        Overview of BGP[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        MAC Limiting[/av_cell][av_cell col_style=”]·        BGP Attributes[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        DHCP Snooping[/av_cell][av_cell col_style=”]·        IBGP Versus EBGP[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Dynamic ARP Inspection (DAI)[/av_cell][av_cell col_style=”]·        Configuring and Monitoring BGP[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        IP Source Guard[/av_cell][av_cell col_style=”]·        Lab 4: Border Gateway Protocol[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Lab 4: Implementing Port Security[/av_cell][av_cell col_style=”]Chapter 6: IP Tunneling[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 6: Device Security and Firewall Filters[/av_cell][av_cell col_style=”]·        Overview of IP Tunneling[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Storm Control[/av_cell][av_cell col_style=”]·        GRE and IP-IP Tunnels[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Firewall Filters[/av_cell][av_cell col_style=”]·        Implementing GRE and IP-IP Tunnels[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Lab 5: Implementing Storm Control and Firewall Filters[/av_cell][av_cell col_style=”]·        Lab 5: IP Tunneling[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 7: Virtual Chassis[/av_cell][av_cell col_style=”]Chapter 7: High Availability[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Overview of Virtual Chassis[/av_cell][av_cell col_style=”]·        Overview of High Availability Networks[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Configuring and Monitoring a Virtual Chassis[/av_cell][av_cell col_style=”]·        GR[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Lab 6: Implementing Virtual Chassis Systems[/av_cell][av_cell col_style=”]·        Graceful RE Switchover[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 8: High Availability Features[/av_cell][av_cell col_style=”]·        Nonstop Active Routing[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Overview of High Availability Networks[/av_cell][av_cell col_style=”]·        BFD[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Link Aggregation Groups[/av_cell][av_cell col_style=”]·        VRRP[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Redundant Trunk Groups[/av_cell][av_cell col_style=”]·        Lab 6: High Availability[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Lab 7: Implementing High Availability Features[/av_cell][av_cell col_style=”][/av_cell][/av_row] [/av_table] [av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jwsy4hlg’ admin_preview_bg=”]

PROFESSIONALEnterprise Routing and Switching, Professional (JNCIP-ENT)

JNCIP-ENT exam topics are based on the content of the recommended instructor-led training courses, as well as the additional resources.

Prerequisite certification

  • JNCIS-ENT

Topics of JNCIP:

[/av_textblock] [av_table purpose=’tabular’ pricing_table_design=’avia_pricing_default’ pricing_hidden_cells=” caption=” responsive_styling=’avia_scrollable_table’ av_uid=”] [av_row row_style=’avia-heading-row’][av_cell col_style=”]JNCIP-ENT[/av_cell][av_cell col_style=”][/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]AJEX(16H)[/av_cell][av_cell col_style=”]AJER(24H)[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 1: Course Introduction[/av_cell][av_cell col_style=”]Chapter 1: Course Introduction[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 2: Advanced Ethernet Switching[/av_cell][av_cell col_style=”]Chapter 2: OSPF[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Virtual Local Area Networks[/av_cell][av_cell col_style=”]·        OSPFv2 Review[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Automating VLAN Administration[/av_cell][av_cell col_style=”]·        Link-State Advertisements[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Tunneling Layer 2 Traffic[/av_cell][av_cell col_style=”]·        Protocol Operations[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Lab 1: Advanced Ethernet Switching[/av_cell][av_cell col_style=”]·        OSPF Authentication[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 3: Advanced Spanning Tree[/av_cell][av_cell col_style=”]·        OSPFv3[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Spanning Tree Review[/av_cell][av_cell col_style=”]·        Lab 1: Configuring and Monitoring OSPF[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        MSTP[/av_cell][av_cell col_style=”]Chapter 3: OSPF Areas[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        VSTP[/av_cell][av_cell col_style=”]·        Review of OSPF Areas[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Lab 2: Advanced Spanning Tree[/av_cell][av_cell col_style=”]·        Stub Area Operation[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 4: Authentication and Access Control[/av_cell][av_cell col_style=”]·        Stub Area Configuration[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Authentication Overview[/av_cell][av_cell col_style=”]·        NSSA Operation[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Access Control Features[/av_cell][av_cell col_style=”]·        NSSA Configuration[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Overview of Authentication Processing[/av_cell][av_cell col_style=”]·        Route Summarization[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Lab 3: Authentication and Access Control[/av_cell][av_cell col_style=”]·        Lab 2: Configuring and Monitoring OSPF Areas and Route Summarization[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 5: Deploying IP Telephony Features[/av_cell][av_cell col_style=”]Chapter 4: OSPF Case Studies and Solutions[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Deployment Scenarios[/av_cell][av_cell col_style=”]·        IGP Transition Overview[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        IP Telephony Features[/av_cell][av_cell col_style=”]·        Transition Case Study[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Case Study: Deploying IP Telephony Features[/av_cell][av_cell col_style=”]·        OSPF Multiarea Adjacencies[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Lab 4: Deploying IP Telephony Features[/av_cell][av_cell col_style=”]·        External Reachability[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 6: Class of Service[/av_cell][av_cell col_style=”]·        Virtual Links[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Class of Service Review[/av_cell][av_cell col_style=”]·        Lab 3: Configuring and Monitoring Routing Policy and Advanced OSPF Policy[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Processing and Feature Overview[/av_cell][av_cell col_style=”]Chapter 5: BGP[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Case Study: Implementing Class of Service[/av_cell][av_cell col_style=”]·        Review of BGP[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Lab 5: Class of Service[/av_cell][av_cell col_style=”]·        BGP Operations[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 7: Monitoring and Troubleshooting Layer 2 Networks[/av_cell][av_cell col_style=”]·        Load Balancing Options[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Introduction to Monitoring and Troubleshooting[/av_cell][av_cell col_style=”]·        Path Selection and Configuration Options[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Monitoring and Troubleshooting Tools[/av_cell][av_cell col_style=”]·        Lab 4: Implementing BGP[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Case Studies[/av_cell][av_cell col_style=”]Chapter 6: BGP Attributes and Policy[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Lab 6: Monitoring and Troubleshooting[/av_cell][av_cell col_style=”]·        Policy and BGP[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]·        BGP Attributes[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]·        Details and Manipulation of Common BGP Path Attributes[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]·        Lab 5: BGP Attributes[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]Chapter 7: Enterprise Routing Policies[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]·        Enterprise BGP Core Network Design[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]·        Enterprise External Network Deployment[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]·        Lab 6: Implementing Enterprise Routing Policies[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]Chapter 8: Introduction to Multicast[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]·        Overview of Multicast[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]·        Multicast Addressing[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]·        RPF[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]·        IGMP[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]Chapter 9: Multicast Routing Protocols and SSM[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]·        Overview of Multicast Routing Protocols[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]·        PIM-SM Using the ASM Model[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]·        Lab 7: Implementing PIM-SM[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]·        PIM-SM Using the SSM Model[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]·        Lab 8: Implementing SSM[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]Chapter 10: Class of Service[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]·        CoS Components Review and Case Study[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]·        CoS Processing and CoS Defaults on the SRX Series Device[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]·        Policing[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]·        Virtual Channels[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]·        Monitoring with Resource Performance Monitoring[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”][/av_cell][av_cell col_style=”]·        Lab 9: Implementing CoS Features in the Enterprise[/av_cell][/av_row] [/av_table] [av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jwsymw7g’ admin_preview_bg=”]

EXPERTEnterprise Routing and Switching, Expert (JNCIE-ENT)

At the pinnacle of the Enterprise Routing and Switching certification track is the 1-day JNCIE-ENT practical exam. This exam is designed to validate the networking professionals’ ability to deploy, configure, manage and troubleshoot Junos-based enterprise routing and switching platforms. Throughout this 8-hour practical exam, candidates will build an enterprise network infrastructure consisting of multiple routers and switching devices. Successful candidates will perform system configuration on all devices, configure protocols and features like IPV6, OSPF V2, OSPF V3, BGP, MSDP, PIM, SSM, RSTP, LLDP, 802.1x, CoS, routing policies.

Prerequisite certification

  • JNCIP-ENT

The professional-level JNCIP-ENT certification requires a valid JNCIS-ENT certification.  Designed for experienced networking professionals with advanced knowledge of the Juniper Networks Junos OS, this written exam verifies the candidate’s understanding of advanced enterprise routing and switching technologies and related platform configuration and troubleshooting skills.

Note that any items pertaining to enterprise switching topics use Junos Enhanced Layer 2 Software (ELS) as of 1 September 2017.

Topics of JNCIE:

[/av_textblock] [av_table purpose=’tabular’ pricing_table_design=’avia_pricing_default’ pricing_hidden_cells=” caption=” responsive_styling=’avia_scrollable_table’ av_uid=”] [av_row row_style=”][av_cell col_style=”]JNCIE-ENT(40H)[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 1: Course Introduction[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 2: Exam Strategies[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Prior to the Exam[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Exam Day[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        After the Exam[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 3: System Services and Security[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Section Objectives and Topics[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Sample Task Analysis 1[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Sample Task Analysis 2[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Configuring System Services and Security Lab[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 4: Ethernet Switching Implementation[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Section Objectives[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Spanning Tree Protocols[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Using VLANs[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Virtual Chassis[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Layer 2 Security Features[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Implementing Ethernet Switching Lab[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 5: Interfaces[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Section Objectives and Topics[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Sample Task Analysis 1[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Sample Task Analysis 2[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Configuring Interfaces Lab[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 6: IGP Implementation[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Section Objectives and Topics[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Sample Task Analysis 1[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Sample Task Analysis 2[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Sample Task Analysis 3[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Implementing IGP Lab[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 7: IGP Troubleshooting[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Section Objectives and Topics[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Sample Task Analysis 1[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Sample Task Analysis 2[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Sample Task Analysis 3[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Troubleshooting IGP Lab[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 8: BGP Implementation[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Section Objectives and Topics[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Sample Task Analysis 1[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Sample Task Analysis 2[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Sample Task Analysis 3[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Implementing BGP Lab[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 9: BGP Troubleshooting[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Troubleshooting BGP[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Sample Task Analysis 1[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Sample Task Analysis 2[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Troubleshooting BGP Lab[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 10: Protocol Independent Routing[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Section Objectives and Topics[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Sample Task Analysis 1[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Sample Task Analysis 2[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Sample Task Analysis 3[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Implementing Protocol Independent Routing Lab[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 11: Multicast Implementation[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Section Objectives and Topics[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Sample Task Analysis 1[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Sample Task Analysis 2[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Implementing Multicast Lab[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]Chapter 12: Class of Service Implementation[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Section Objectives and Topics[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Sample Task Analysis 1[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Sample Task Analysis 2[/av_cell][/av_row] [av_row row_style=”][av_cell col_style=”]·        Implementing Class of Service Lab[/av_cell][/av_row] [/av_table] [av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jwsz1ogf’ admin_preview_bg=”]

Students who intend to pass the above courses(Juniper courses) must have full knowledge of the concepts of the two reference model, OSI and TCP / IP.

[/av_textblock]