Course curriculum

  • 1

    Introduction

    • Introduction

    • What will we cover?

  • 2

    WAN Topologies Overview

    • Some WAN "ISMS"

    • WAN Topologies Overview

    • Most WANs look like this.....

    • .....or this........

    • ......or more recently like this.........

    • ......and let's not forget the WAN in the DC!

    • WAN Topologies Quiz

  • 3

    Underlays & Overlays

    • Underlays and Overlays Summary

    • Underlay Technology Overview

    • Underlay Design Use Cases & Examples

    • Overlay Technology Overview

    • Overlay Design Use Cases & Examples

    • Underlays & Overlays Quiz

  • 4

    WAN Technology Design (IP and MPLS)

    • MPLS L3VPN Technology Operations

    • L3VPN Design Scenarios & Business Use Cases

    • MPLS L2VPN (VPLS) Technology Operations & Use Cases

    • MPLS L2VPN (P2P) Technology Operations

    • L2VPN (P2P) Design Scenarios & Business Use Cases

  • 5

    DWDM Overview

    • DWDM Technology Overview

    • Use Cases & Scenario Examples

  • 6

    Internet Based WAN Design

    • IPSec VPN with / without GRE

    • GRE (unencrypted for hosted security)

    • mGRE (encrypted) i.e. DMVPN, ADVPN

    • VPN Design Considerations

    • VPN Entry Points & Architectural Design

  • 7

    Module 1 Summary

    • Module 1 Summary