Cisco Training Courses

Cisco Training Courses

Insoft has been serving IT industry with authorized Cisco courses training, since 2010. Find all the relevant information on Cisco training on this page.

View More

Cisco Certifications

Experience a blended learning approach that combines the best of instructor-led training and self-paced e-learning to help you prepare for your certification exam.

View More

Cisco Learning Credits

Cisco Learning Credits (CLCs) are prepaid training vouchers redeemed directly with Cisco that make planning for your success easier when purchasing Cisco products and services.

Have CLCs and want to redeem them?

Cisco Continuing Education

The Cisco Continuing Education Program offers all active certification holders flexible options to recertify by completing a variety of eligible training items.

View More

Cisco U

Cisco U. is customized to achieve your learning needs as this provides learning paths that includes wide range of topics, including CCNA, Cloud and Network Automation Essentials.

Browse Catalogue

Cisco Business Enablement

The Cisco Business Enablement Partner Program focuses on sharpening the business skills of Cisco Channel Partners and customers.

View More

Fortinet Technical Certifications

Insoft Services´ training capabilities rely on the excellence of our exclusive Fortinet Certified Trainers (FCT). We are dedicated to providing high-quality training to Fortinet Customers and Partners.

View More

Fortinet Technical Courses

Insoft is recognised as Fortinet Authorized Training Center in selected locations across EMEA.

View More

ATC Status

Check our ATC Status across selected countries in Europe.

View More

Fortinet Services Packages

Insoft Services has developed a specific solution to streamline and simplify the process of installing or migrating to Fortinet Products.

Browse Packages

Prepforce Bootcamp

The only comprehensive source available today to prepare for Fortinet NSE 8 certification globally.

View More

Microsoft Training

Insoft Services provides Microsoft training in EMEAR. We provide Microsoft technical training and certification courses that are led by world-class instructors.

View More

Technical Training

The evolution of Extreme Networks Technical Training provides a comprehensive progressive pathway from Associate to Professional accreditation.

View More

ATP Accreditation

As an authorised training partner (ATP), Insoft Services ensures that you receive the highest standards of education available.

View More

What we do

Through our global presence and partner ecosystem, we provide strategic IT consulting services to align IT services with customers' business goals.

View More

 

We are pleased to launch pre-scoped Enterprise Networking Consulting Packages, our ready-made solutions, tailored to ensure efficiency and cost containment.

 

View More

 

We specialize in the deployment of vendor-specific automation tools as well as open-source and vendor-independent solutions, that can be tuned in accordance with the business needs of a specific organization.

 

View More

 

We provide comprehensive IoT consultancy, deployment and support solutions for businesses that want to launch or improve their use of connected technologies.

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

 

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

 

View More
Cisco Training Courses

 

We provide the highest level of expertise on Cisco consultancy services, that target audits of your current network and implementing updates for improved operational performance, secure data and compliant systems.

View More

 

We provide the highest level of expertise on Fortinet consultancy services that target audits of your current network and implementing updates for improved operational performance, secure data and compliant systems.

View More

 

Our team can help enterprises, get the most value from Extreme products and services following our predefined value-added packages or custom ones that fits business needs.

 

View More

 

TXOne Networks provides cybersecurity solutions that ensure the reliability and safety of ICS and OT environments through the OT zero trust methodology protecting assets for their entire life cycle.

 

View More

About Us

Our training portfolio includes a wide range of IT training from IP providers, including Cisco, Extreme Networks, Fortinet, Microsoft, to name a few, in EMEA.

View More

ECMS2 v2.0 – Engineering Cisco Meraki Solutions

Contact Us

We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.

Data Protection & Privacy

I consent to receive emails and/or calls from Insoft Services related to the Insoft Services´ products and services.
I acknowledge that my data will be collected and processed as described in the Insoft Services privacy policy.

Close

ECMS2 v2.0 – Engineering Cisco Meraki Solutions

Enroll Now
ECMS2 v2.0 – Engineering Cisco Meraki Solutions
Duration
3 Days
Delivery
(Online and onsite)
Price
Price Upon Request
  

28 excl. VAT

The course, Engineering Cisco Meraki Solutions Part 2 (ECMS2) v2.0 elevates your knowledge of Cisco® Meraki™ technology suite. In this advanced technical training course, you’ll learn how to plan for network deployments and integrations using the Cisco Meraki platform. Through practical hands-on instruction and experiences, you will learn how to operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics. You will also learn how to design Meraki architectures for redundancy, high-density, and scalability by implementing comprehensive Meraki product features to meet design objectives. This course is the second of two courses that prepares you for Cisco Meraki certification.

 

This course will help you:

  • Acquire the advanced skills and techniques to plan, design, implement, and operate the complex Cisco Meraki platform for cloud-based network management.
  • Prepare you for the upcoming Meraki certification(s)

After completing the course, you should be able to:

  • Plan new Cisco Meraki architectures and expand existing deployments
  • Design the network for scalable management and high availability
  • Describe how to automate and scale Meraki deployments with dashboard tools
  • Use dynamic routing protocols to expand networks and improve WAN performance
  • Describe proper QoS, policy and performance-based routing configurations across a Cisco Meraki network and WAN optimization through traffic shaping
  • Describe Virtual Private Network (VPN) and Wide Area Network (WAN) topologies and how to integrate them
  • Secure, expand, and shape the network
  • Implement switched network concepts and practices, and configure guests networks
  • Implement wireless configurations concepts and practices
  • Describe endpoint management concepts and practices using Cisco Meraki Systems Manager
  • Describe physical security concepts and practices
  • Gain network insight by monitoring applications
  • Describe how to prepare monitoring, logging, and alerting services
  • Set up reporting and auditing capabilities in the Cisco Meraki dashboard
  • Monitor and troubleshoot issues using Cisco Meraki tools
  • Planning new Cisco Meraki architectures and expanding existing deployments
  • Designing for scalable management and high availability
  • Automating and scaling Meraki deployments
  • Designing routing and practices on the Meraki platform
  • Describing Quality of Service (QoS) and traffic shaping design
  • Building VPN and WAN topologies
  • Securing, expanding, and shaping the network
  • Describing network concepts and practices
  • Implementing wireless configuration practices and concepts
  • Describing Endpoint management concepts and practices
  • Describing physical security concepts and practices
  • Gaining network insight through monitoring applications
  • Preparing monitoring, logging, and alerting services
  • Setting up reporting and auditing capabilities in the Cisco Meraki Dashboard
  • Gaining visibility and resolving issues using Meraki features and built-in troubleshooting tools

 

Lab outline

  • Configure Tags, Link Aggregation, Port Mirroring, and High-Density SSIDs
  • Establishing Auto VPN
  • Configuring Virtual Interfaces and Routing on Cisco Meraki MS Switches
  • Configuring Routes and Redistribution
  • Configuring Quality of Service
  • Configuring Traffic Shaping
  • Configuring Load Balancing
  • Defining Firewall Rules
  • Enabling Advanced Malware Protection, Intrusion Detection, and Intrusion Prevention
  • Enabling Content Filtering
  • Configure and Apply Access Policies
  • Configure Wireless Guest Access
  • Configure Service Set Identifiers (SSIDs)
  • Implementing RF Profiles
  • Implement Air Marshal
  • Create Cisco Meraki Systems Manager (SM) Configuration Profiles
  • Define Security Policies
  • Enforce End-to-End Security
  • Set-up Motion Alerts
  • Deploy Wireless Cameras
  • Manage Video Retention
  • Enable Alerts
  • Add Monitoring and Reporting
  • Generate and Analyze Summary Reports
  • Manage Firmware
  • Generate a Peripheral Component Interconnect (PCI) Compliance Report
  • Troubleshoot an Offline Device
  • Troubleshoot Content Filtering
  • Troubleshooting Remote Site Connectivity
  • Consulting Systems Engineer
  • Deployment Engineer
  • Network Administrator
  • Network Manager
  • Network Engineer
  • Site Reliability Engineer
  • Systems Engineer
  • Technical Solutions Architect
  • Wireless Design Engineer
  • Wireless Engineer

Before enrolling in the ECMS2 course, it is highly recommended that you have already attended and completed the ECMS1 course before attending this training. You should also have general networking understanding, Meraki-specific proficiency, and knowledge in the following areas:

 

General network:

  • Be actively engaged in the design, deployment, scaling, and management of enterprise networks
  • Strong fundamental knowledge of IP addressing and subnetting schemas necessary to build local area networks
  • Strong fundamental knowledge of dynamic routing protocols (focus/emphasis on Open Shortest Path First [OSPF] and Border Gateway Protocol [BGP])
  • A foundational understanding of wired and wireless Quality of Service (QoS) mechanisms, packet queue operations, and practical implementations
  • Be experienced with the design and configuration of IPsec and associated Virtual Private Network (VPN) technologies
  • A foundational understanding of network security controls/protocols, network management best practices, and data security
  • A foundational understanding of best practice Radio Frequency (RF) design principles and practical implementations
  • A foundational knowledge of wireless security best practices centered around access control (802.1x) and spectrum security through Wireless Intrusion Detection Systems (WIDS) and Wireless Intrusion Prevention Systems (WIPS)
  • A foundational command of standard logging/monitoring protocols (focus/emphasis on Simple Network Management Protocol [SNMP], syslog, and webhooks) and related implementation components or tools
  • Be familiar with and have basic knowledge of Application Programming Interfaces (APIs) and related languages/formats (REST, JavaScript Object Notation [JSON])

 

Meraki knowledge:

  • Be able to describe the security, reliability, and scalability of the Cisco Meraki dashboard cloud architecture and its out-of-band control plane
  • Fundamental understanding of Dashboard’s organizational structure, delineation of privileges, and overarching administrative processes
  • Be able to outline the key components of Meraki licensing (co-termination model and expiration grace period)
  • Have the knowledge and ability to deploy advanced security features on MX security appliances (intrusion detection/prevention, Advanced Malware Protection [AMP], Layer 3 & 7 firewall rules)
  • Fundamental understanding of Auto VPN and its purpose when utilized in a Software-Defined Wide Area Network (SD-WAN) deployment
  • Be able to describe the concepts behind a cloud-based WLAN solution and the features that can be delivered including Layer 7 traffic shaping and various guest access authentication methods
  • Fundamental understanding of device profile containerization and remote management capabilities as managed through the Systems Manager platform
  • Fundamental understanding of the edge architecture as implemented by Meraki MV security cameras and its implications on video retention through various configurable options

 

The following are the recommended Cisco offerings that may help you meet these prerequisites:

  • Implementing and Administering Cisco Solutions (CCNA)
  • Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
  • Engineering Cisco Meraki Solutions Part 1 (ECMS1)
The course, Engineering Cisco Meraki Solutions Part 2 (ECMS2) v2.0 elevates your knowledge of Cisco® Meraki™ technology suite. In this advanced technical training course, you’ll learn how to plan for network deployments and integrations using the Cisco Meraki platform. Through practical hands-on instruction and experiences, you will learn how to operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics. You will also learn how to design Meraki architectures for redundancy, high-density, and scalability by implementing comprehensive Meraki product features to meet design objectives. This course is the second of two courses that prepares you for Cisco Meraki certification.   This course will help you:
  • Acquire the advanced skills and techniques to plan, design, implement, and operate the complex Cisco Meraki platform for cloud-based network management.
  • Prepare you for the upcoming Meraki certification(s)

After completing the course, you should be able to:

  • Plan new Cisco Meraki architectures and expand existing deployments
  • Design the network for scalable management and high availability
  • Describe how to automate and scale Meraki deployments with dashboard tools
  • Use dynamic routing protocols to expand networks and improve WAN performance
  • Describe proper QoS, policy and performance-based routing configurations across a Cisco Meraki network and WAN optimization through traffic shaping
  • Describe Virtual Private Network (VPN) and Wide Area Network (WAN) topologies and how to integrate them
  • Secure, expand, and shape the network
  • Implement switched network concepts and practices, and configure guests networks
  • Implement wireless configurations concepts and practices
  • Describe endpoint management concepts and practices using Cisco Meraki Systems Manager
  • Describe physical security concepts and practices
  • Gain network insight by monitoring applications
  • Describe how to prepare monitoring, logging, and alerting services
  • Set up reporting and auditing capabilities in the Cisco Meraki dashboard
  • Monitor and troubleshoot issues using Cisco Meraki tools
  • Planning new Cisco Meraki architectures and expanding existing deployments
  • Designing for scalable management and high availability
  • Automating and scaling Meraki deployments
  • Designing routing and practices on the Meraki platform
  • Describing Quality of Service (QoS) and traffic shaping design
  • Building VPN and WAN topologies
  • Securing, expanding, and shaping the network
  • Describing network concepts and practices
  • Implementing wireless configuration practices and concepts
  • Describing Endpoint management concepts and practices
  • Describing physical security concepts and practices
  • Gaining network insight through monitoring applications
  • Preparing monitoring, logging, and alerting services
  • Setting up reporting and auditing capabilities in the Cisco Meraki Dashboard
  • Gaining visibility and resolving issues using Meraki features and built-in troubleshooting tools

 

Lab outline

  • Configure Tags, Link Aggregation, Port Mirroring, and High-Density SSIDs
  • Establishing Auto VPN
  • Configuring Virtual Interfaces and Routing on Cisco Meraki MS Switches
  • Configuring Routes and Redistribution
  • Configuring Quality of Service
  • Configuring Traffic Shaping
  • Configuring Load Balancing
  • Defining Firewall Rules
  • Enabling Advanced Malware Protection, Intrusion Detection, and Intrusion Prevention
  • Enabling Content Filtering
  • Configure and Apply Access Policies
  • Configure Wireless Guest Access
  • Configure Service Set Identifiers (SSIDs)
  • Implementing RF Profiles
  • Implement Air Marshal
  • Create Cisco Meraki Systems Manager (SM) Configuration Profiles
  • Define Security Policies
  • Enforce End-to-End Security
  • Set-up Motion Alerts
  • Deploy Wireless Cameras
  • Manage Video Retention
  • Enable Alerts
  • Add Monitoring and Reporting
  • Generate and Analyze Summary Reports
  • Manage Firmware
  • Generate a Peripheral Component Interconnect (PCI) Compliance Report
  • Troubleshoot an Offline Device
  • Troubleshoot Content Filtering
  • Troubleshooting Remote Site Connectivity
  • Consulting Systems Engineer
  • Deployment Engineer
  • Network Administrator
  • Network Manager
  • Network Engineer
  • Site Reliability Engineer
  • Systems Engineer
  • Technical Solutions Architect
  • Wireless Design Engineer
  • Wireless Engineer

Before enrolling in the ECMS2 course, it is highly recommended that you have already attended and completed the ECMS1 course before attending this training. You should also have general networking understanding, Meraki-specific proficiency, and knowledge in the following areas:

 

General network:

  • Be actively engaged in the design, deployment, scaling, and management of enterprise networks
  • Strong fundamental knowledge of IP addressing and subnetting schemas necessary to build local area networks
  • Strong fundamental knowledge of dynamic routing protocols (focus/emphasis on Open Shortest Path First [OSPF] and Border Gateway Protocol [BGP])
  • A foundational understanding of wired and wireless Quality of Service (QoS) mechanisms, packet queue operations, and practical implementations
  • Be experienced with the design and configuration of IPsec and associated Virtual Private Network (VPN) technologies
  • A foundational understanding of network security controls/protocols, network management best practices, and data security
  • A foundational understanding of best practice Radio Frequency (RF) design principles and practical implementations
  • A foundational knowledge of wireless security best practices centered around access control (802.1x) and spectrum security through Wireless Intrusion Detection Systems (WIDS) and Wireless Intrusion Prevention Systems (WIPS)
  • A foundational command of standard logging/monitoring protocols (focus/emphasis on Simple Network Management Protocol [SNMP], syslog, and webhooks) and related implementation components or tools
  • Be familiar with and have basic knowledge of Application Programming Interfaces (APIs) and related languages/formats (REST, JavaScript Object Notation [JSON])

 

Meraki knowledge:

  • Be able to describe the security, reliability, and scalability of the Cisco Meraki dashboard cloud architecture and its out-of-band control plane
  • Fundamental understanding of Dashboard’s organizational structure, delineation of privileges, and overarching administrative processes
  • Be able to outline the key components of Meraki licensing (co-termination model and expiration grace period)
  • Have the knowledge and ability to deploy advanced security features on MX security appliances (intrusion detection/prevention, Advanced Malware Protection [AMP], Layer 3 & 7 firewall rules)
  • Fundamental understanding of Auto VPN and its purpose when utilized in a Software-Defined Wide Area Network (SD-WAN) deployment
  • Be able to describe the concepts behind a cloud-based WLAN solution and the features that can be delivered including Layer 7 traffic shaping and various guest access authentication methods
  • Fundamental understanding of device profile containerization and remote management capabilities as managed through the Systems Manager platform
  • Fundamental understanding of the edge architecture as implemented by Meraki MV security cameras and its implications on video retention through various configurable options

 

The following are the recommended Cisco offerings that may help you meet these prerequisites:

  • Implementing and Administering Cisco Solutions (CCNA)
  • Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)
  • Engineering Cisco Meraki Solutions Part 1 (ECMS1)
    Upcoming Dates
  • ` May 21 - May 23, 2024
  • ` Jun 4 - Jun 6, 2024
  • ` Jul 2 - Jul 4, 2024
  • ` Jul 30 - Aug 1, 2024
  • ` Aug 27 - Aug 29, 2024
  • ` Sep 24 - Sep 26, 2024