- 积分
- 237
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 注册时间
- 2010-6-8
- 最后登录
- 1970-1-1
- 阅读权限
- 30
- 听众
- 收听
初级工程师
|
我登錄CISCO網站,查到以下信息,是不是我要重認證有二個辦法,一是考以下ENCORE的其中一個? 二是考二門非必修科目? 我只是想重認證,有什麽建議?最容易考的? 謝謝
+ b/ M; q' G( V; } 4 l8 E5 }! Y# Q/ H% ]7 W B
5 m y4 O O5 [$ l/ h$ p& S$ Y; C' i) I- H) H7 j; B3 D* K
- Required:17 R+ n9 D3 a1 Z% m
- : a5 N6 U9 v! r$ Y1 g: ~
1 i$ X; U1 U. S5 C5 V2 e
& ]& \1 F- C% Z! j$ _
1.1 - Required:18 Y& @' v7 r. e9 F
- & g$ o$ F$ U" k2 P* y
, D! i; c" t* S: w8 }. ^2 e5 j! s
, k3 r" U, i; Q 1.1.1 - Required:1
& d5 o4 n2 q! _5 D; g$ N
; M$ K6 R6 I# T0 C- [352-001] Cisco Certified Design Expert (CCDEW) Incomplete
0 Q' r- j. T2 { R$ E
m+ \# l- u" O) T4 e) `$ N; W
- [352-011] Cisco Certified Design Expert Practical Exam (CCDEP) Incomplete
) w( j3 Y' n( J6 m3 s% X
- [400-007] Cisco Certified Design Expert (CCDEW) Incomplete ! J' M1 J. {9 G
% k: w6 F. e# V& F+ u% D2 L9 y
: L( A" N0 W2 k7 `& [$ p
- ' Z- }2 B+ e7 r. P
, j. U2 G2 V7 v- _ 1.1.2 - Required:19 Z' _( x7 y P; {7 b
+ j- A0 Q7 a5 y) O6 {* b" u4 r; F- [350-201] Performing CyberOps Using Cisco Security Technologies (CBRCOR) Incomplete
" A- L: k5 k* r& X' D
/ b. c7 y4 c% Y1 M4 M: a$ `% |
- [350-401] Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) Incomplete ( J+ P2 { w; Q3 Z' ?% X
- [350-501] Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) Incomplete
: W ^& R* b( O
- [350-601] Implementing and Operating Cisco Data Center Core Technologies (DCCOR) Incomplete / ]* |* N' X/ r* }' R* \4 q
- [350-701] Implementing and Operating Cisco Security Core Technologies (SCOR) Incomplete
/ V6 F) W4 v) ?% T. O3 n& f5 f
- [350-801] Implementing and Operating Cisco Collaboration Core Technologies (CLCOR) Incomplete
' {* w/ T* z& b2 E- S' t; q3 ]+ M
- [350-901] Developing Applications Using Cisco Core Platforms and APIs (DEVCOR) Incomplete 3 c$ f( [( u7 E. p* u8 I) u4 r
# F8 D! f. X/ E0 j! x
3 d1 }: V7 B7 {: j5 i3 I
- 7 z6 T2 j6 m' K3 p) g, H) k& l
. i4 c: ?6 x+ v) R1 N; h* p
1.1.3 - Required:2' N. K: S0 C8 t1 A9 o
: V5 Q& z- P# e: k5 p. u6 j- [300-215] Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps (CBRFIR) Incomplete ; h( z6 h, ]. y9 T ~( R1 k0 v
- [300-410] Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) Incomplete
U6 i0 U! h& V4 N* P+ w
- [300-415] Implementing Cisco SD-WAN Solutions (ENSDWI) Incomplete
1 l6 k1 d6 p4 P$ T: v3 L7 ?
- [300-420] Designing Cisco Enterprise Networks (ENSLD) Incomplete
/ ?. F& M4 r5 R8 r
- [300-425] Designing Cisco Enterprise Wireless Networks (ENWLSD) Incomplete
, v( y( w. _% U# }3 ^+ d
9 a2 `5 d5 {% J2 {8 f- {5 F% S6 E' d
- [300-430] Implementing Cisco Enterprise Wireless Networks (ENWLSI) Incomplete 0 u1 d- t- Q5 D) U6 u
- [300-435] Automating and Programming Cisco Enterprise Solutions (ENAUTO) Incomplete
4 |7 g0 o6 k+ n( a% Q; i
- [300-510] Implementing Cisco Service Provider Advanced Routing Solutions (SPRI) Incomplete ( c2 \3 b \6 D ^7 i
- [300-515] Implementing Cisco Service Provider VPN Services (SPVI) Incomplete # ]. h: b( g6 T2 u& M
- [300-535] Automating Cisco Service Provider Solutions (SPAUTO) Incomplete
, Z3 x* E1 U3 |1 [# K
- [300-610] Designing Cisco Data Center Infrastructure (DCID) Incomplete
. F, B( a" A& v
4 n0 z; d$ N- Y* f" f# L* t" y
- [300-615] Troubleshooting Cisco Data Center Infrastructure (DCIT) Incomplete
$ v# C, V/ `' z# _; q5 i! v5 @
- [300-620] Implementing Cisco Application Centric Infrastructure (DCACI) Incomplete 6 \0 ]- U0 ]# L5 a3 ~; \7 T
- [300-625] Implementing Cisco Storage Area Networking (DCSAN) Incomplete ; S: g/ y& E+ [! f2 z
- [300-630] Implementing Cisco Application Centric Infrastructure – Advanced (DCACIA) Incomplete " a4 b& D/ G' Z' g6 a# |" r
- 7 L. P/ f$ W5 K0 ] {* @) g" f
- [300-635] Automating and Programming Cisco Data Center Solutions (DCAUTO) Incomplete
w p. X+ y2 ~9 u. L: m% R
- [300-710] Securing Networks with Cisco Firepower (SNCF) Incomplete
* Z8 k9 H; K$ z* h' k* D$ }
5 x$ F5 Q' ~ o3 }: ]# V& Q
- [300-715] Implementing and Configuring Cisco Identity Services Engine (SISE) Incomplete
1 g" f6 }+ K* w2 o) @9 {
- [300-720] Securing Email with Cisco Email Security Appliance (SESA) Incomplete
- y: o5 s3 |5 L2 `, ]
- [300-725] Securing the Web with Cisco Web Security Appliance (SWSA) Incomplete
6 z T U. j2 N7 l. a1 E, V- y
- [300-730] Implementing Secure Solutions with Virtual Private Networks (SVPN) Incomplete % v( K0 S9 r* T& h Z1 r2 K
- [300-735] Automating and Programming Cisco Security Solutions (SAUTO) Incomplete - H$ G8 V. G8 A4 ] i
- [300-810] Implementing Cisco Collaboration Applications (CLICA) Incomplete ' _$ |$ G" G& Z, m5 P
- [300-815] Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) Incomplete - u+ {0 L# G4 M8 r f! M
- [300-820] Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI) Incomplete
. u% k f8 c/ \, U" a* J
- [300-825] Implementing Cisco Collaboration Conferencing v1.0 (CLCNF) Incomplete
/ a* u- z1 x' x, V* f" }2 f1 ]
- / U6 C7 k9 x; s' P, \; T9 e: j! U
- [300-835] Automating Cisco Collaboration Solutions (CLAUTO) Incomplete
Q/ z1 K/ t. v( S" H0 \
- [300-910] Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS) Incomplete
6 q) S7 H1 ]; p5 H1 @3 n: {8 l6 S" [
1 x+ T9 V0 e% \/ {, n) s Q t
- [300-915] Developing Solutions using Cisco IoT & Edge Platforms (DEVIOT) Incomplete
+ ~1 J# K: f! h. T0 X- N: |# l
$ Z& w7 A6 u# X5 A: B( k5 [
- [300-920] Developing Applications for Cisco Webex and Webex Devices (DEVWBX) Incomplete 7 i; ^" @4 _/ `" z: ?
0 b [! V( p6 p! l4 H# o' ?
- [600-660] Implementing Cisco Application Centric Infrastructure - Advanced (DCACIA) Incomplete : A6 s4 s, [, Q
- [300-220] Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps Incomplete ; H& ^+ ^8 T* _& Y2 f# U, z! ?) a
7 L8 s7 s, G: S! |4 h" |6 e
' A& t, U( H3 P$ W* `. } : @: o4 Z* Z+ v6 r
# A% O$ V1 I) E; Y4 ^$ L4 N
: ^, e5 K3 ]/ Q$ E4 t8 L) ~4 C$ M. ^3 P
4 w' H' h5 ^5 s# W5 D! G 1.2 - Required:All (2)
1 T, d" P! t) `' Y
+ ~- k9 L" ?) _) h* L5 ]+ V8 B, K. P5 B4 T2 X
! F% {/ F1 i# u* W. ]
1.2.1 - Required:1. p" ?+ k# V. e/ W1 @* r
, K& r) V" e% N x( C |5 N9 p , R, g6 f8 r* k: h3 U3 [
- [300-215] Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps (CBRFIR) Incomplete 8 M! @) F( f5 m% b4 A7 k8 N- {/ ?
- [300-410] Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) Incomplete
& N, l0 U$ m' [2 y& k2 z- [
- 2 a$ d! z- A0 q0 J- _$ A+ @ g: h
- [300-415] Implementing Cisco SD-WAN Solutions (ENSDWI) Incomplete : Q: ~* @, f' }
, |* P0 ^3 X$ ~, {6 D, O2 J
- [300-420] Designing Cisco Enterprise Networks (ENSLD) Incomplete
5 @4 ~& O4 ^0 a
- " U, g; v) I% f8 F0 {! {1 C% A: M
- [300-425] Designing Cisco Enterprise Wireless Networks (ENWLSD) Incomplete 4 R: N+ e: J9 v; E. _
" f- I) a& L/ s+ d6 M( A2 l/ P1 d
- [300-430] Implementing Cisco Enterprise Wireless Networks (ENWLSI) Incomplete 9 k" V! `6 _: }4 H# c( O" V6 b
- [300-435] Automating and Programming Cisco Enterprise Solutions (ENAUTO) Incomplete
* | K! g5 y1 x: ~
- [300-510] Implementing Cisco Service Provider Advanced Routing Solutions (SPRI) Incomplete ! E3 b3 x# L4 H. C4 U6 o& G
/ C" O% u/ e$ q' M/ R* G5 k
- [300-515] Implementing Cisco Service Provider VPN Services (SPVI) Incomplete 7 p5 V/ @& P5 U* M' b Q V2 v
" ]5 y( D( F# v# y4 O9 m: z5 q
- [300-535] Automating Cisco Service Provider Solutions (SPAUTO) Incomplete
* m* U' I# `( c2 M0 {
- [300-610] Designing Cisco Data Center Infrastructure (DCID) Incomplete
1 X+ C) z: T% f( E4 F$ @7 B. j% }
- [300-615] Troubleshooting Cisco Data Center Infrastructure (DCIT) Incomplete 1 [0 I) l$ g8 l3 P6 X' i7 F/ _
8 v0 U; X" O( b( } Q. ~7 v
- [300-620] Implementing Cisco Application Centric Infrastructure (DCACI) Incomplete " |4 Z2 ?) k# q9 t
- [300-625] Implementing Cisco Storage Area Networking (DCSAN) Incomplete
7 [4 _: a" }0 B( k$ Y; K5 Q
- [300-630] Implementing Cisco Application Centric Infrastructure – Advanced (DCACIA) Incomplete ( n/ Z! \' {7 q- o8 \
- [300-635] Automating and Programming Cisco Data Center Solutions (DCAUTO) Incomplete
+ q0 O" r/ Y6 E9 W4 d4 M, ^/ g3 q5 z9 Z
- [300-710] Securing Networks with Cisco Firepower (SNCF) Incomplete
( \2 l' x+ W; n- V& o7 q
- [300-715] Implementing and Configuring Cisco Identity Services Engine (SISE) Incomplete 8 C1 K9 ?! q' M5 M
- [300-720] Securing Email with Cisco Email Security Appliance (SESA) Incomplete 1 K" K9 N1 Z6 a0 M; E
2 p& Q$ W+ L$ P w& N( @! s
- [300-725] Securing the Web with Cisco Web Security Appliance (SWSA) Incomplete
' |0 L3 E& P7 e* u$ ~
- 9 Q! z/ x' q+ l6 @! A! Z+ n8 H
- [300-730] Implementing Secure Solutions with Virtual Private Networks (SVPN) Incomplete
d! P7 c7 r8 ?6 h0 n% s+ z
- [300-735] Automating and Programming Cisco Security Solutions (SAUTO) Incomplete 9 I8 e% w; k: W* Y
+ R+ A* G2 V. f: r/ |+ v9 d
- [300-810] Implementing Cisco Collaboration Applications (CLICA) Incomplete . m4 x! \+ B4 s: _3 [6 [/ K
- [300-815] Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) Incomplete
6 D1 m; s8 H: d
- [300-820] Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI) Incomplete ) L+ h3 B& C) |4 c
- ) N. P! J& S8 `3 g* c U4 l
- [300-825] Implementing Cisco Collaboration Conferencing v1.0 (CLCNF) Incomplete
3 d- H( _# F6 b. K4 s6 ^
- [300-835] Automating Cisco Collaboration Solutions (CLAUTO) Incomplete
* {) b8 U- V) [6 Y* I. X
- [300-910] Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS) Incomplete
% w2 |" W5 ~! z9 V5 M2 L5 k
- [300-915] Developing Solutions using Cisco IoT & Edge Platforms (DEVIOT) Incomplete
2 [ b) \$ a( L$ I. }: p7 X
- [300-920] Developing Applications for Cisco Webex and Webex Devices (DEVWBX) Incomplete : d% j6 s7 W' G8 e8 f* T* ^
" b' p, J, ?6 m6 W) \ a9 K+ ]+ W/ p
- [600-660] Implementing Cisco Application Centric Infrastructure - Advanced (DCACIA) Incomplete & J9 u) i& t- d' _$ H- `
[300-220] Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps - t/ j! K1 B4 c- U( O+ L
|
|