ENGINEERING CISCO MERAKI SOLUTIONS PART 2 (ECMS2)

Description

The course, Engineering Cisco Meraki Solutions Part 2 (ECMS2) v1.0 elevates your knowledge of Cisco© Meraki technology. In this advanced technical training course, you’ll learn how to plan for network deployments and integrations using the Cisco Meraki platform. Through practical hands-on instruction and experiences, you will learn how to operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics. You will also learn how to design Meraki architectures for redundancy, high-density, and scalability by implementing comprehensive Meraki product features to meet design objectives. This course is the second of two courses that prepares you for the Cisco Meraki certification.

This course will help you:

  • Acquire the advanced skills and techniques to plan, design, implement, and operate the complex Cisco Meraki platform for cloud-based network management.
  • Prepare you to take the upcoming Meraki certification(s)

What’s included?

  • Authorized Courseware
  • Intensive Hands on Skills Development with an Experienced Subject Matter Expert
  • Hands on practice on real Servers and extended lab support 1.800.482.3172
  • Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
  • Academy Code of Honor: Test Pass Guarantee
  • Optional: Package for Hotel Accommodations, Lunch and Transportation

Training Solutions

With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.

Methods

  • Instructor-Led (the best training format we offer)
  • Live Online Classroom – Online Instructor-Led
  • Self-Paced Video

Speak to an Admissions Representative for complete details

StartFinishPublic PricePublic Enroll Private PricePrivate Enroll
12/25/202312/27/2023
1/15/20241/17/2024
2/5/20242/7/2024
2/26/20242/28/2024
3/18/20243/20/2024
4/8/20244/10/2024
4/29/20245/1/2024
5/20/20245/22/2024
6/10/20246/12/2024
7/1/20247/3/2024
7/22/20247/24/2024
8/12/20248/14/2024
9/2/20249/4/2024
9/23/20249/25/2024
10/14/202410/16/2024
11/4/202411/6/2024
11/25/202411/27/2024
12/16/202412/18/2024
1/6/20251/8/2025

Curriculum

  • Planning new Meraki architectures and expanding existing deployments
  • Designing for scalable management and high availability
  • Automating and scaling Meraki deployments
  • Routing design and practices on the Meraki platform
  • Implementing Quality of Service (QoS) and traffic shaping design
  • Architecting VPN and WAN topologies
  • Securing, expanding, and shaping the network
  • Switched network concepts and practices
  • Understand wireless configuration practices and concepts
  • Understand Endpoint management concepts and practices
  • Implement physical security concepts and practices
  • Gaining additional network insight through application monitoring
  • Preparing monitoring, logging, and alerting services
  • Setting up Dashboard reporting and auditing capabilities
  • Gaining visibility and resolving issues using Meraki features and built-in troubleshooting tools

Lab outline

  • Creating and Applying Tags
  • Configuring Link Aggregation
  • Setting Up Port Mirroring
  • Establishing Auto VPN
  • Configuring Virtual Interfaces and Routing
  • Configuring Routes and Redistribution
  • Configuring Quality of Service
  • Configuring Traffic Shaping
  • Configuring Load Balancing
  • Defining Firewall Rules
  • Enabling Advanced Malware Protection
  • Enabling Intrusion Detection and Protection
  • Enabling Content Filtering
  • Configuring and Applying Access Policies
  • Configuring Wireless Guest Access
  • Configuring Service Set Identifiers (SSIDs)
  • Implementing RF Profiles
  • Implementing Air Marshal
  • Creating System Manager (SM) Configuration Profiles
  • Defining Security Policies
  • Enforcing End-to-End Security
  • Setting Up Motion Alerts
  • Managing Video Retention
  • Deploying Wireless Cameras
  • Enabling Alerts
  • Adding Monitoring and Reporting
  • Generating Summary Reports
  • Managing Firmware
  • Peripheral Component Interconnect (PCI) Reporting
  • Troubleshooting an Offline Device
  • Troubleshooting Content Filtering
  • Troubleshooting Remote Site Connectivity