ECMS2 Training
Engineering Cisco Meraki Solutions - Part 2
Elevate your Cisco Meraki technical knowledge and skills with this three-day, instructor-led training! In this advanced technical training course, you’ll gain the knowledge and skills to plan, design, implement, and operate complex Cisco Meraki solutions. This is the second of two courses that will prepare you to take the upcoming Cisco Meraki Solutions Specialist certification exam.
This course:
Provides hands-on experience with Cisco Meraki equipment via innovative technical presentations and lab exercises
Equips you with the knowledge and skills to confidently plan, design, implement, and operate complex Cisco Meraki solutions
Prepares you to take the upcoming Cisco Meraki Solutions Specialist certification exam
This course is ideal for those who regularly deploy or manage Meraki networks and want to deepen their technical expertise and understanding of the full Meraki product suite and features. This may include professionals with job titles or in roles such as:
Field deployment technicians
Network administrators
Pre-/Post-sales engineers
Service provider engineers
Systems engineers
IT professionals
The knowledge and skills that a learner should have before attending this course are as follows:
It is highly recommended that you have already attended and completed the ECMS1 course before attending this course.
You should have general networking understanding and Meraki-specific proficiency
The course, Engineering Cisco Meraki Solutions Part 2 (ECMS2) v2 elevates your knowledge of Cisco® Meraki™ technology. In this advanced technical training course, you’ll learn how to plan for network deployments and integrations using the Cisco Meraki platform. Through practical hands-on instruction and experiences, you will learn how to operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics. You will also learn how to design Meraki architectures for redundancy, high-density, and scalability by implementing comprehensive Meraki product features to meet design objectives. This course is the second of two courses that prepares you for Cisco Meraki certification.
Upon completing this course, the learner will be able to meet these overall objectives:
Acquire the advanced skills and techniques to plan, design, implement, and operate the complex Cisco Meraki platform for cloud-based network management.
Plan for network deployments and integrations using the Meraki platform
Design Meraki architectures for redundancy, high-density, and scalability
Implement comprehensive Meraki product features to meet design objectives
Operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics
Prepare you to take the upcoming Meraki certification(s)
Planning new Meraki architectures and expanding existing deployments
Designing for scalable management and high availability
Automating and scaling Meraki deployments
Routing design and practices on the Meraki platform
Implementing Quality of Service (QoS) and traffic shaping design
Architecting VPN and WAN topologies
Securing, expanding, and shaping the network
Switched network concepts and practices
Understand wireless configuration practices and concepts
Understand Endpoint management concepts and practices
Implement physical security concepts and practices
Gaining additional network insight through application monitoring
Preparing monitoring, logging, and alerting services
Setting up Dashboard reporting and auditing capabilities
Gaining visibility and resolving issues using Meraki features and built-in troubleshooting tools
Creating and Applying Tags
Configuring Link Aggregation
Setting Up Port Mirroring
Establishing Auto VPN
Configuring Virtual Interfaces and Routing
Configuring Routes and Redistribution
Configuring Quality of Service
Configuring Traffic Shaping
Configuring Load Balancing
Defining Firewall Rules
Enabling Advanced Malware Protection
Enabling Intrusion Detection and Protection
Enabling Content Filtering
Configuring and Applying Access Policies
Configuring Wireless Guest Access
Configuring Service Set Identifiers (SSIDs)
Implementing RF Profiles
Implementing Air Marshal
Creating System Manager (SM) Configuration Profiles
Defining Security Policies
Enforcing End-to-End Security
Setting Up Motion Alerts
Managing Video Retention
Deploying Wireless Cameras
Enabling Alerts
Adding Monitoring and Reporting
Generating Summary Reports
Managing Firmware
Payment Card Industry (PCI) Reporting
Troubleshooting an Offline Device
Troubleshooting Content Filtering
Troubleshooting Remote Site Connectivity