- 积分
- 240
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 注册时间
- 2010-6-8
- 最后登录
- 1970-1-1
- 阅读权限
- 30
- 听众
- 收听
初级工程师
|
我登錄CISCO網站,查到以下信息,是不是我要重認證有二個辦法,一是考以下ENCORE的其中一個? 二是考二門非必修科目? 我只是想重認證,有什麽建議?最容易考的? 謝謝
! _1 j$ |% T* J$ F) x* } : c8 ?; N+ x4 z9 g* \. q( \( H
* V/ y( ?" |4 q0 E/ U& S4 D; a
2 c" j: {5 Z8 W( R4 P. P
- Required:1
7 O( [. X6 x# t1 ^8 V' Z
, `, k% [7 k# d& f% u8 E0 n2 {* x
& U; W( j+ K, u6 b5 z. t) @ 1.1 - Required:14 ]4 e, @0 a0 G, L" d$ U/ p
* x% a" Z' Z6 \0 S. E& u& b( ]) F9 b3 f) m4 o
* M4 | o& n/ B# g/ A4 o
1.1.1 - Required:1
: [/ V; ~5 Y% A" s
7 j1 I! r9 E$ w1 g3 H! h7 Y / W. [- F' @+ s9 D& e
- [352-001] Cisco Certified Design Expert (CCDEW) Incomplete
* \. C1 q; X8 l* N$ d& D5 e9 [- L; j
- [352-011] Cisco Certified Design Expert Practical Exam (CCDEP) Incomplete # V8 h2 ]! h8 T+ N1 q/ Q. k
- % \5 t8 u* \9 P9 E0 b. f' ?
- [400-007] Cisco Certified Design Expert (CCDEW) Incomplete % T: q5 L, m7 I
8 O& t: K: }2 P& u5 S" [
3 K9 u: B* j5 C6 C
- & n' X0 i1 }% Z# g: V
( n1 X1 p* Z- X
1.1.2 - Required:1+ }* p) s% ?0 w8 S" U2 Z8 m
- % L, E* t& q; @$ |9 o7 q: b
$ S8 [* N- y1 W
- [350-201] Performing CyberOps Using Cisco Security Technologies (CBRCOR) Incomplete 4 ?8 ~1 ?. T" H* g
- [350-401] Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) Incomplete . C1 n% d( x- T5 z6 m T5 s( r) ^
& \- Y$ f p" \, A: f1 m$ r
- [350-501] Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) Incomplete * W/ {* U) O2 m" w6 @
- [350-601] Implementing and Operating Cisco Data Center Core Technologies (DCCOR) Incomplete
* E0 Q1 z$ \9 ]
- & }; d( u. G7 J+ c& l, R1 a
- [350-701] Implementing and Operating Cisco Security Core Technologies (SCOR) Incomplete
; K A" Z0 S. W6 Q. q5 d
- , \! L+ u9 ^; e& w# ]! ^3 V
- [350-801] Implementing and Operating Cisco Collaboration Core Technologies (CLCOR) Incomplete
" f* ~3 ?) T- i" l
- [350-901] Developing Applications Using Cisco Core Platforms and APIs (DEVCOR) Incomplete : |8 k9 e9 z7 F$ a
: o" D; X; M6 f" ^6 w+ d
9 O8 o" @# M2 @" s4 J9 j7 r
- 9 L* A# Y2 m: e+ {( t: ~
* |- K& H$ N: i3 G( x/ Q& ~ 1.1.3 - Required:2
2 ?' h- Y9 }3 T$ V* x6 Q( I; d- Z" S, N0 z6 ?. W! Y8 O- Z1 N
0 N) ?7 n4 C3 F- [300-215] Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps (CBRFIR) Incomplete
( j, J: Q; s$ ]
- [300-410] Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) Incomplete
# {# H( l7 K* r4 W
- [300-415] Implementing Cisco SD-WAN Solutions (ENSDWI) Incomplete
) K# r; J7 h! I& W+ I
% Q& k1 @2 u5 ^. C2 `! k4 ]+ x& k
- [300-420] Designing Cisco Enterprise Networks (ENSLD) Incomplete
4 \ N. P$ c, G7 S' G2 a: X1 X
3 C# c S" ?" a7 d% b( n3 A2 }2 G
- [300-425] Designing Cisco Enterprise Wireless Networks (ENWLSD) Incomplete
! z7 G8 u. {- M: @" K/ f
- G" V6 }0 e, N7 y! d; \ |
- [300-430] Implementing Cisco Enterprise Wireless Networks (ENWLSI) Incomplete
8 f9 Q- X- o/ @1 j5 V/ Y) P
- [300-435] Automating and Programming Cisco Enterprise Solutions (ENAUTO) Incomplete
) A, J" p' Q. v7 U% a
- 4 V! G3 e9 |2 i1 `- k5 D, f: Y, f) l
- [300-510] Implementing Cisco Service Provider Advanced Routing Solutions (SPRI) Incomplete
, P; G; |2 z% C, E. n
- [300-515] Implementing Cisco Service Provider VPN Services (SPVI) Incomplete 9 W# B! ]9 U* ]0 |: Y: Y! S
- [300-535] Automating Cisco Service Provider Solutions (SPAUTO) Incomplete
$ L% ~% B; e: U; E, }! }3 B
3 G# U. {' s6 I% @$ @1 H! f4 w8 |) a; c
- [300-610] Designing Cisco Data Center Infrastructure (DCID) Incomplete ! R% ?& Y3 w. z) b6 Z* I1 f
. \- a7 ]. @$ ~$ L. ~. O2 x& t- b
- [300-615] Troubleshooting Cisco Data Center Infrastructure (DCIT) Incomplete
5 E: z! r: b+ Y
- [300-620] Implementing Cisco Application Centric Infrastructure (DCACI) Incomplete 9 @3 G+ \2 Y3 f7 [5 Y4 P& y w
- [300-625] Implementing Cisco Storage Area Networking (DCSAN) Incomplete
4 M" }" `7 N& [7 F: |
- [300-630] Implementing Cisco Application Centric Infrastructure – Advanced (DCACIA) Incomplete
/ Q* R# Q7 I# z$ K4 E: s% B/ Y
- m" m d7 D+ g/ |$ N, }4 d4 t; U
- [300-635] Automating and Programming Cisco Data Center Solutions (DCAUTO) Incomplete
5 {* U F, R0 b2 m* f
- 7 P4 o" D3 ]& w0 c* i. M. b4 J
- [300-710] Securing Networks with Cisco Firepower (SNCF) Incomplete ( O0 o- B. h ^6 e1 ^
- [300-715] Implementing and Configuring Cisco Identity Services Engine (SISE) Incomplete
& ~! R6 H. o3 b) ~! V
- ! v6 T$ `" u: D9 P. E. x4 d* y/ _
- [300-720] Securing Email with Cisco Email Security Appliance (SESA) Incomplete ! D4 a" i6 I- A. ~2 g: H: \
- [300-725] Securing the Web with Cisco Web Security Appliance (SWSA) Incomplete
4 ~# z/ E4 x- `& O0 T
- " ]. {; T+ a; B3 B; N& f6 \
- [300-730] Implementing Secure Solutions with Virtual Private Networks (SVPN) Incomplete
+ `8 Y+ X3 F' t7 Z9 w$ v1 I) d
- [300-735] Automating and Programming Cisco Security Solutions (SAUTO) Incomplete
1 \' K$ i* C2 u
- [300-810] Implementing Cisco Collaboration Applications (CLICA) Incomplete ' O1 e$ R8 l0 q5 p; s) H
- [300-815] Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) Incomplete % p h0 `' Y7 y3 ~9 m
- [300-820] Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI) Incomplete
2 s) n8 t1 v3 ^
- 7 q$ l* m5 |) r% ]- @ c9 f
- [300-825] Implementing Cisco Collaboration Conferencing v1.0 (CLCNF) Incomplete ; p9 V. D( W: i
- [300-835] Automating Cisco Collaboration Solutions (CLAUTO) Incomplete
8 P0 s5 `8 o9 u- b1 b, ]1 ]8 Y/ X
- [300-910] Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS) Incomplete / p {7 d. C, p
- [300-915] Developing Solutions using Cisco IoT & Edge Platforms (DEVIOT) Incomplete
* r" ~$ r6 s, Y
- [300-920] Developing Applications for Cisco Webex and Webex Devices (DEVWBX) Incomplete
1 L' x; y# A% c( A
- 4 G8 R& D5 g+ J0 l0 V& l( x
- [600-660] Implementing Cisco Application Centric Infrastructure - Advanced (DCACIA) Incomplete
0 k& m: r; m4 M
- [300-220] Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps Incomplete ! D. H3 |# f" y
% G% |- R2 J* K# i; v
0 B% h& A+ L" b) q
- U0 w/ x M0 k7 }: T& A0 ~7 {' E' E3 \8 S0 E: _& G8 @* V! }
- 8 `3 q( g6 T3 J+ ?4 |. |
) W9 J7 B# @: C, z- B9 c 1.2 - Required:All (2)
: F- i4 ~2 C# L2 [0 D, u! d5 R- ! g" [% B3 ~1 H/ w' x
# i2 |* E8 s a% W7 V# [
- _( m; Y D# b8 {' V, f
1.2.1 - Required:1) T. I: w7 z9 D' u3 z" X/ K& b
1 u; u; ?5 n3 z/ Z9 `/ K# F w$ a " [* X s! A( T/ n
- [300-215] Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps (CBRFIR) Incomplete
6 I. j! H( \* M. \: y) T# i
" Q- W! S" w1 N- C# |. Q6 h w
- [300-410] Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) Incomplete 5 M5 B) l- }& B
- [300-415] Implementing Cisco SD-WAN Solutions (ENSDWI) Incomplete
3 f2 o1 ^- ~% C7 u! x+ V! \1 d
/ R' o% Q$ i9 f0 Z9 a. X/ p1 v$ M
- [300-420] Designing Cisco Enterprise Networks (ENSLD) Incomplete ; k% S& {, {6 \4 p) m" Z. y
- [300-425] Designing Cisco Enterprise Wireless Networks (ENWLSD) Incomplete
+ _% T5 N- [$ |, ?0 Q& T
; ^' g& B& w# k, S/ O1 u3 k6 [
- [300-430] Implementing Cisco Enterprise Wireless Networks (ENWLSI) Incomplete
% A3 Q; z: \$ r3 C4 F5 V( [4 x, Z
- [300-435] Automating and Programming Cisco Enterprise Solutions (ENAUTO) Incomplete
+ b4 a2 i. v" w1 T4 H
- [300-510] Implementing Cisco Service Provider Advanced Routing Solutions (SPRI) Incomplete
7 \: L( ?; n! F: k; ~/ g8 g; ~, R
- [300-515] Implementing Cisco Service Provider VPN Services (SPVI) Incomplete
1 Z5 ^; x; o& Q5 H
- [300-535] Automating Cisco Service Provider Solutions (SPAUTO) Incomplete
! ^' s0 l% `, I K+ w& H7 ]
- [300-610] Designing Cisco Data Center Infrastructure (DCID) Incomplete / O# ^7 K5 {4 m T$ \2 n" s
- # G3 ~6 E( c y4 Z F K- B* m
- [300-615] Troubleshooting Cisco Data Center Infrastructure (DCIT) Incomplete 0 Y z @5 R6 S/ i2 \5 ?8 q& ?0 l
- [300-620] Implementing Cisco Application Centric Infrastructure (DCACI) Incomplete * j7 M' i* j% c0 M/ m% @4 p
- [300-625] Implementing Cisco Storage Area Networking (DCSAN) Incomplete 9 J! \7 j- K Z4 `: D7 }! ~# l9 l& |' O
" d& n: ~4 X2 x3 E' I3 n# j4 \" I
- [300-630] Implementing Cisco Application Centric Infrastructure – Advanced (DCACIA) Incomplete
1 i/ T5 t1 w1 ~+ J( g$ D: y3 r3 q
- [300-635] Automating and Programming Cisco Data Center Solutions (DCAUTO) Incomplete
" a0 y: J' X4 ^4 `# e \" z
4 W% _5 G, p; H5 N2 t# a- ` L
- [300-710] Securing Networks with Cisco Firepower (SNCF) Incomplete - y/ y" [; ?3 A" q
- [300-715] Implementing and Configuring Cisco Identity Services Engine (SISE) Incomplete
, I5 }# f3 t( b! X5 h* `/ M4 x7 }
- [300-720] Securing Email with Cisco Email Security Appliance (SESA) Incomplete . J7 C3 V) K+ f" u' y9 A- v6 L
- ' s# z: {1 B: v! Y0 P0 x/ y
- [300-725] Securing the Web with Cisco Web Security Appliance (SWSA) Incomplete
7 ~1 Q' s# j3 z- O) Y1 a4 G2 _+ G' }5 @
- [300-730] Implementing Secure Solutions with Virtual Private Networks (SVPN) Incomplete
9 K3 p3 H1 k6 d' ~1 c
- [300-735] Automating and Programming Cisco Security Solutions (SAUTO) Incomplete
2 A5 e& G, t6 q
- [300-810] Implementing Cisco Collaboration Applications (CLICA) Incomplete
+ ?7 p) R* Z: q7 n# T/ P
- [300-815] Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) Incomplete , C$ F, E4 m. Y; D E- D/ i
- [300-820] Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI) Incomplete
% I7 U' Z' C2 s0 m$ r9 s
- [300-825] Implementing Cisco Collaboration Conferencing v1.0 (CLCNF) Incomplete
2 |& Y* H% Y+ I1 ?7 A! n( ]
- [300-835] Automating Cisco Collaboration Solutions (CLAUTO) Incomplete 3 K$ b% V& u" h: I& h
- [300-910] Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS) Incomplete
; o7 L( h8 o+ E w) O! K: m7 r
- + K: y5 ^% u( d, G, j$ k) m
- [300-915] Developing Solutions using Cisco IoT & Edge Platforms (DEVIOT) Incomplete
2 t9 ^$ a, b( |" s; y3 B
- [300-920] Developing Applications for Cisco Webex and Webex Devices (DEVWBX) Incomplete - [7 |- k) n, ~6 {
- / q4 C- _) d9 i- w# m+ [, x
- [600-660] Implementing Cisco Application Centric Infrastructure - Advanced (DCACIA) Incomplete
0 u6 G% c, P5 D. J% r, o
& \; c; b" J. g7 m9 [, z( Y* i' N8 X [300-220] Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps
1 t0 z' f* f R% W" R% I |
|