- 积分
- 240
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 30
- 听众
- 收听
初级工程师
  
|
我登錄CISCO網站,查到以下信息,是不是我要重認證有二個辦法,一是考以下ENCORE的其中一個? 二是考二門非必修科目? 我只是想重認證,有什麽建議?最容易考的? 謝謝
) ?" G/ P9 ]/ g) J8 [
$ R2 ~2 W: [, d4 z: ]
( s2 g' X. t* c. @) h* o4 ? ~
" h1 r4 Z7 S3 C I2 v6 l- Required:11 ~7 [. j% u% I3 Y x5 [4 r4 D: |
8 d# V0 L" m* K$ \$ t+ ^8 n3 O8 H, C2 r4 J
# p$ O4 S" \* n2 | 1.1 - Required:1' g& E- X! |& W/ V C
- # t7 U- r: E" {9 e' T) k6 N6 ]' {% U
7 X+ n% m. ]* }6 f/ k
) [* [2 o& H! { 1.1.1 - Required:1
# x2 y$ n% e' F" t
" |0 L7 f: B3 ^5 M/ j* T2 a- [352-001] Cisco Certified Design Expert (CCDEW) Incomplete ! \- S: U$ g3 r/ e
- [352-011] Cisco Certified Design Expert Practical Exam (CCDEP) Incomplete 8 W1 O2 j# \7 ^2 J% w
- [400-007] Cisco Certified Design Expert (CCDEW) Incomplete
7 _) }* r/ k g) @0 D; e - }6 |& H, S. d% }5 J
4 ]( @) G/ y; o1 {$ @- |
- 5 N1 e4 p4 m! G
9 |4 V1 r& k& K2 I/ x4 \, W' Y 1.1.2 - Required:1: k b, d9 V7 B5 @
- ( f( W5 m6 N! q/ u7 R. M+ s+ t; r
2 t b8 o, D1 N! {- [350-201] Performing CyberOps Using Cisco Security Technologies (CBRCOR) Incomplete ! K9 t) [+ w* I* `% h/ ?
- 1 T3 V U- Z0 W/ y$ S9 {4 S2 m) k
- [350-401] Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) Incomplete . a1 D+ t) z5 [: T4 E* i3 _
- [350-501] Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) Incomplete " ^- r$ s# _8 i4 `) e; x
- ) |2 d" G D% b2 E: p9 l+ l
- [350-601] Implementing and Operating Cisco Data Center Core Technologies (DCCOR) Incomplete / J. e- E4 }) O+ {2 R% A
) m& e' ~1 z- b9 Y% k# B, q) f
- [350-701] Implementing and Operating Cisco Security Core Technologies (SCOR) Incomplete $ n; j! [2 N$ n9 V3 H3 c
- [350-801] Implementing and Operating Cisco Collaboration Core Technologies (CLCOR) Incomplete
1 U3 d- |4 Y# P1 B
- [350-901] Developing Applications Using Cisco Core Platforms and APIs (DEVCOR) Incomplete 2 e3 c+ y; i6 F
$ Y7 W" `" S& ]1 s
" V) B1 Z; o4 [. r& i
- , \9 c# F4 n( ^" W
8 m% V6 L5 o0 X: V5 c9 [5 k
1.1.3 - Required:2
' b' k$ Y* H" `7 ^
. ^. n4 A$ l l) R- [300-215] Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps (CBRFIR) Incomplete
# \6 f9 F- I: i, I# r- K8 O+ y9 q
- [300-410] Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) Incomplete
" Z' O7 B! J: Y) H. k: M; K2 d& [
- [300-415] Implementing Cisco SD-WAN Solutions (ENSDWI) Incomplete ) T- J i5 B" v' E2 c
- [300-420] Designing Cisco Enterprise Networks (ENSLD) Incomplete
! m' a! g% j' G4 }, k
- [300-425] Designing Cisco Enterprise Wireless Networks (ENWLSD) Incomplete
7 g/ Y5 K3 Z1 p
6 U' {8 [% B0 A0 e, B7 ~7 F# {
- [300-430] Implementing Cisco Enterprise Wireless Networks (ENWLSI) Incomplete
7 a" O5 k1 z! N3 r9 B; T
- [300-435] Automating and Programming Cisco Enterprise Solutions (ENAUTO) Incomplete 2 T$ R# o6 t: j
- [300-510] Implementing Cisco Service Provider Advanced Routing Solutions (SPRI) Incomplete
$ P: E4 E8 Q& I$ y$ E
- ; X' A% Y/ r0 f$ P4 o5 b6 ~$ U
- [300-515] Implementing Cisco Service Provider VPN Services (SPVI) Incomplete
. N1 L5 P3 d, T; U, b+ d& P0 D6 `
- [300-535] Automating Cisco Service Provider Solutions (SPAUTO) Incomplete " k2 \6 n8 ]0 C' m
- [300-610] Designing Cisco Data Center Infrastructure (DCID) Incomplete 5 ~3 c, e, S6 ~2 g: `: l! e$ i! F
- [300-615] Troubleshooting Cisco Data Center Infrastructure (DCIT) Incomplete & l, l; a. A$ X/ r" M1 u* } r0 r& y
- [300-620] Implementing Cisco Application Centric Infrastructure (DCACI) Incomplete # f0 e8 T X) h5 b" g1 B$ c
- [300-625] Implementing Cisco Storage Area Networking (DCSAN) Incomplete
* ~5 K* r5 v6 {9 W! J. m
- [300-630] Implementing Cisco Application Centric Infrastructure – Advanced (DCACIA) Incomplete ( Z! s3 W6 U! Q) o( {
- [300-635] Automating and Programming Cisco Data Center Solutions (DCAUTO) Incomplete
) p' J' H+ V$ t% C$ C8 ?; s
@% H; Y$ G, |9 e2 T4 \: ~+ i
- [300-710] Securing Networks with Cisco Firepower (SNCF) Incomplete
Z, b$ f' y6 v9 A! S" I
4 c. A: |/ s* x0 P; p/ q# Y0 K* K
- [300-715] Implementing and Configuring Cisco Identity Services Engine (SISE) Incomplete
9 [9 a0 @% O$ X3 x# v% \/ W
- [300-720] Securing Email with Cisco Email Security Appliance (SESA) Incomplete
- \1 H6 b- Y7 }$ G
- [300-725] Securing the Web with Cisco Web Security Appliance (SWSA) Incomplete
1 h6 G8 S' @2 ?9 h
- [300-730] Implementing Secure Solutions with Virtual Private Networks (SVPN) Incomplete ' E* o! ~9 R# l- A% I
- [300-735] Automating and Programming Cisco Security Solutions (SAUTO) Incomplete
) P- }( Z' Y! M# _& K) V
- [300-810] Implementing Cisco Collaboration Applications (CLICA) Incomplete
4 T; w8 n3 F) x" y- @% B5 ~
, b |1 S- ]- O& n2 r4 x7 q
- [300-815] Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) Incomplete 3 J8 U; m3 g& s) s; J. k
- [300-820] Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI) Incomplete 0 _- a& j# a1 s0 s* C
: _6 U7 [8 k& m$ }1 h) A8 I
- [300-825] Implementing Cisco Collaboration Conferencing v1.0 (CLCNF) Incomplete + \/ n7 n) X4 v, F2 s$ L* A
1 ~& o) B9 @$ z, X6 J) j$ m" Y
- [300-835] Automating Cisco Collaboration Solutions (CLAUTO) Incomplete ) X7 ~2 R" m" ?+ o6 ^: P
- [300-910] Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS) Incomplete
4 w, [- e9 ~7 P; }+ z
- 8 n, g2 [& J! W+ |8 h* M0 u
- [300-915] Developing Solutions using Cisco IoT & Edge Platforms (DEVIOT) Incomplete * P, P$ o. g; I/ d7 r
- [300-920] Developing Applications for Cisco Webex and Webex Devices (DEVWBX) Incomplete " Z# f$ R8 y `$ E: O
- [600-660] Implementing Cisco Application Centric Infrastructure - Advanced (DCACIA) Incomplete
2 Y. q, \9 c Z U4 T* C
- , g$ X2 p1 {. E, _2 _$ }1 o
- [300-220] Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps Incomplete
% }& K& B& E5 ? ! T7 b7 j* i0 O. t4 W8 R
+ i% [# [3 q/ l
# _# E. _; m) n3 l0 c6 M' Q3 H
p* z+ ]% b1 F' V+ V
- # w" A# E j4 |. [
# C8 d" R$ }. J( f; p 1.2 - Required:All (2)
& ~/ I; g( |- Y9 K
- u$ |/ J/ L9 r8 R
9 w) Z9 I9 k$ i% x: J
7 {( f- b! B- t. P 1.2.1 - Required:1
+ X$ @' T- ^2 T$ z- v' R8 l* ~, G5 [
, z1 F4 j6 N' E! N( V- [300-215] Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps (CBRFIR) Incomplete 9 ~$ U3 w( q t1 w8 k+ B/ M
- ( B. k W9 s3 R E" Q3 b2 g
- [300-410] Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) Incomplete & W- a# s- S8 h% A
2 R# u. Y. p7 \2 Y- u+ L! }
- [300-415] Implementing Cisco SD-WAN Solutions (ENSDWI) Incomplete h$ P- s0 m/ T9 h4 |
- [300-420] Designing Cisco Enterprise Networks (ENSLD) Incomplete
/ \, O; P/ Z9 P# S4 S
- [300-425] Designing Cisco Enterprise Wireless Networks (ENWLSD) Incomplete 5 R% [% V( J) ]# L2 |( S
- [300-430] Implementing Cisco Enterprise Wireless Networks (ENWLSI) Incomplete
4 u' i' |2 C* ?4 v& [5 M, }' @* D
# g3 Y2 `9 d! ^9 c' D4 T1 e j
- [300-435] Automating and Programming Cisco Enterprise Solutions (ENAUTO) Incomplete 1 Y2 f0 w4 a- i2 o) S/ }
- [300-510] Implementing Cisco Service Provider Advanced Routing Solutions (SPRI) Incomplete 9 y4 {- ?# V; e/ c; H
- [300-515] Implementing Cisco Service Provider VPN Services (SPVI) Incomplete
# v9 G2 z' \" B0 w( R
- 9 z. i7 V; K/ v5 J- f) t: L
- [300-535] Automating Cisco Service Provider Solutions (SPAUTO) Incomplete
- @5 @; L2 U( D4 A$ h+ z+ E
- [300-610] Designing Cisco Data Center Infrastructure (DCID) Incomplete 6 U6 l/ U. _: c5 Q- B
- [300-615] Troubleshooting Cisco Data Center Infrastructure (DCIT) Incomplete * P+ t" q2 c! G- u& W
- [300-620] Implementing Cisco Application Centric Infrastructure (DCACI) Incomplete
, Y% f7 w; @9 S( m& C9 H
- - {' a1 f& y" G3 M3 S6 K1 p
- [300-625] Implementing Cisco Storage Area Networking (DCSAN) Incomplete . m* m' D. e3 _8 P. a
4 e4 t. v8 h% o# D$ B. t/ `
- [300-630] Implementing Cisco Application Centric Infrastructure – Advanced (DCACIA) Incomplete
# S- L# S# T1 ^
; \) A9 a" C; W! B0 ~- M* |
- [300-635] Automating and Programming Cisco Data Center Solutions (DCAUTO) Incomplete s* B/ Z: q' [- q* w5 v, w5 @) _
- [300-710] Securing Networks with Cisco Firepower (SNCF) Incomplete 9 X0 N: q) H! ]
- ) P* w0 [7 w- n0 U! a- Y$ \: y
- [300-715] Implementing and Configuring Cisco Identity Services Engine (SISE) Incomplete
& b9 _/ M$ F8 b* |. k3 `
- 1 U& e M3 b, q; y8 b, v4 I+ L" g( ?
- [300-720] Securing Email with Cisco Email Security Appliance (SESA) Incomplete
, d) w9 f' H$ g# d+ u
- P3 T6 p' I, f+ M% r8 E1 T Z8 L Z8 u
- [300-725] Securing the Web with Cisco Web Security Appliance (SWSA) Incomplete 8 y& ~2 y, F& J8 V* ^
- [300-730] Implementing Secure Solutions with Virtual Private Networks (SVPN) Incomplete 8 x! `5 t1 U( V8 ?0 w6 N5 h& B
- ! D3 y8 ~$ |3 c H- e6 e. b* j
- [300-735] Automating and Programming Cisco Security Solutions (SAUTO) Incomplete 7 X# B4 h3 ~# e. `2 k
- [300-810] Implementing Cisco Collaboration Applications (CLICA) Incomplete : e3 z) r5 d$ l0 b0 K# h5 A9 W
- [300-815] Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) Incomplete
% N6 ~/ t1 j- H
: {; N+ P8 ~; T3 q' e9 N; x
- [300-820] Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI) Incomplete
7 T1 j, `: J! i" q z
- [300-825] Implementing Cisco Collaboration Conferencing v1.0 (CLCNF) Incomplete
) P5 F6 F' ~7 ]* J' T1 C4 t
- [300-835] Automating Cisco Collaboration Solutions (CLAUTO) Incomplete ! g+ V- o* w4 S0 S& R1 [
- [300-910] Implementing DevOps Solutions and Practices using Cisco Platforms (DEVOPS) Incomplete
; P \) \+ j1 p
( Q6 U: ?9 |0 y* k7 a0 X3 _
- [300-915] Developing Solutions using Cisco IoT & Edge Platforms (DEVIOT) Incomplete
! o7 s0 l5 N. Z
- [300-920] Developing Applications for Cisco Webex and Webex Devices (DEVWBX) Incomplete
7 Y3 `& k$ k8 I; A7 L- {- b
) |; k, \* e5 N3 D3 B6 a' f
- [600-660] Implementing Cisco Application Centric Infrastructure - Advanced (DCACIA) Incomplete * ^$ j( i/ T+ D& q7 |0 X
3 V& X/ s1 N/ F4 W/ z5 k. ] [300-220] Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps
# g7 ?9 f8 e* W, x: o |
|