CCDE Written Exam Boot Camp (CCDEW)

Course Description Schedule

Who should attend

Candidates who want to become CCDE (Cisco Certified Design Expert) certified.


There are no formal prerequisites for CCDE certification; other professional certifications or training courses are not required. It is expected that the candidate will have an in-depth understanding of the topics in the exam blueprints, a minimum of seven years job experience, and a thorough understanding of networking infrastructure principles.

Course Objectives

Expert Level Network Design and Architecture Experience

CCDE assesses Advanced Network Infrastructure Design Principles and Fundamentals for large networks. A CCDE can demonstrate an ability to develop solutions which address planning, design, integration, optimization, operations, security and ongoing support focused at the infrastructure level for customer networks.

After passing the written exam, delegates can then proceed to the CCDE Lab Boot Camp which will prepare them for the practical lab exam.

Course Content

IP Routing

  • Explain route aggregation concepts and techniques. Purpose of route aggregation, Scalability and fault isolation, How to Aggregate
  • Explain the theory and application of network topology abstraction and layering. Layers and their purpose, Core, aggregation, distribution, access, Purpose of Link State Topology Summarization, What is the purpose of LS topology summarization (not how it works), Use of Link State Topology Summarization, Where and how to build a flooding domain border
  • Explain the impact of fault isolation and resiliency on network design. What is the impact of fault isolation on network reliability, Separating rapid and/or massive changes from the remainder of the network, how to create fault isolation, What is fate sharing, and what is it's impact
  • What is the impact of redundancy on convergence times
  • Explain metric based traffic flow and modification. How to engineer metrics to modify traffic flow, "MPLS vs. IGP Traffic Engineering Modifying IGP Metrics to Engineer Traffic Flow", Understanding Traffic Flow & Metrics, Third Party Next Hop, Impact on redistribution design
  • Explain fast convergence techniques and mechanisms. Layer 2 Down Detection, For all media types, Fast hello timers, OSPF, EIGRP, IS-IS, BGP, Fast SPF Timers, OSPF, IS-IS, Recursion and Convergence
  • Impact of Third Party Next Hop & BGP recursion
  • Explain routing protocol operation. Neighbor Relationships, OSPF, EIGRP, IS-IS, BGP, Determining Loop Free Paths, OSPF, EIGRP, IS-IS, BGP, MPLS Constrained SPF, General Operation, OSPF, EIGRP, IS-IS, BGP; How each protocol operates, Flooding Domains and Stubs, OSPF/IS-IS flooding domains, EIGRP stubs, iBGP Mesh, Next hop mechanisms in BGP, RR's, etc. Select lower operational costs and complexity. Route Filters Simple vs. complex, General, Redistribution, Simple designs, tags, route filters, etc.
  • Explain transport mechanisms and interaction with routing protocols. Link Characteristics, Point-to-point, point-to-multipoint, broadcast, etc. RP Implementation on Various Links, OSPF on each link type IS-IS on each link type, EIGRP considerations for point-to-multipoint Topology Characteristics, Full mesh, partial mesh, ring, etc. RP Implementation on Various Topologies, OSPF/IS-IS flood blocking, etc.
  • Explain generic routing and addressing concepts. Policy Based Routing
  • IPv6 Basics, Explain multicast routing concepts. General Multicast concepts


  • Explain how tunneling affects end service applications. Identify and select tunneling technologies appropriate to meet network design objectives. Identify where and when tunneling parameters must be tuned to optimize the operation of end user applications. Knowledge of issues related to Layer 2 tunneling: i.e. packet ordering, MTU, etc. What technologies support Layer 2 and Layer 3 tunneling: L2TPv3, GRE, ATOM, IPsec, etc. How to implement tunneling given a specific situation: i.e. tunneling Novel IPX over a Layer 3 service provider core, etc. Understanding of issues related to tunneling L3(IP) in L2(ATM, MPLS)
  • Explain, recognize, and select tunneling techniques appropriate to the size and scale of the network requirements. What is the impact of different tunneling technologies on scalability (Selection of a tunneling technology with scalability as a criteria) How scalability is affected based on type of tunnels (point-to-point, point-to-multipoint)
  • Explain how L3 routing is affected by tunneling technologies and select L3 routing protocols appropriate to implement tunneling and as passenger traffic in tunnels, How L3 routing is overlaid on a given tunneling technologies, What L3 Routing Protocol would suit a given tunneling technology, topology and scalability
  • Explain, recognize, and select logical and physical topologies required to meet network design requirements. What are the best points/nodes in network to initiate and terminate tunnels, Which model would fulfill the requirements (full mesh, partial mesh, hierarchical)
  • Explain, recognize, and select methods for interconnecting tunneling environments across one or more service provider networks. Describe different inter-provider tunneling models (i.e. 2547, GRE, IPsec, etc.
  • Explain, recognize, and select methods for steering traffic with tunnels and into tunnels. Class Based Tunnel Selection, Traffic Engineering
  • Explain, recognize, and select methods for providing network failover and redundancy to meet network availability requirements. Restoration vs. Protection (IGP Fast Convergence, FRR), Non-stop Forwarding vs. Restoration (at the IP routing layer), Explain, recognize, and select methods for interconnecting different types of attachment media on tunnel endpoints. Recognize and explain the differences in mapping different L2 technologies onto an L3 tunneling environment. Interworking, Mapping Layer 2 service onto Layer 3 at the edge
  • Explain, recognize, and select methods to manage the size and scale of broadcast domains in tunneled L2VPN environments. VPLS scaling issues Spanning Tree issues, Broadcast issues across various topologies

Quality of Service (QoS)

  • Measure and interpret different QoS performance metrics. Correlate performance metrics to application performance. Knowledge of the different QoS performance metrics: one-way delay, round-trip delay, jitter, etc. How to measure and interpret QoS performance metrics. How QoS performance metrics relate to user applications: i.e. impact of QoS metrics on application performance, etc.
  • Determine why, where and how to implement traffic classification, traffic conditioning and PHB. Explain how DiffServ QoS tools work. What DiffServ Terminology means (DS codepoint, Meter, DS ingress/egress node, Remark, DS domain, etc.) Where to do Traffic Classification (edge and core of DS Domain) What is Traffic Conditioning and where is it applied? (metering, marking, shaping and policing) What are traffic profiles and meaning of in/out of profile (Token bucket) What is the difference between micro-flow and DS behavior aggregate (PHB) What is the impact on non-DS-compliant nodes within a DS domain on SLAs What is the issue with MF Classifier and Fragmentation What is the issue with re-marking and OoO packets, What is the purpose of shapers and droppers, What are different PHB models (e.g. x% minimal resources and proportional remaining link capacity), What are issues with Different number/type of PHBs in different part of the network, What are the benefits of MF classification on edge and DS classification in the core, Understanding Classification/conditioning/PHB on a per customer basis or few number of templates, What are ways of DS Field Mapping to PHB: 1->1 or N->1 or both, What are tools for PHB Queue management and bounding delay, jitter, packet loss (e.g. TS, WRED, WFQ,etc.), Understanding QoS provide differentiated services only when there is contention for resources
  • Explain operations of RSVP. How RSVP Application does CAC and resource reservation, Explain generic QoS requirements for common application (VoIP, Video, TCP, UDP, control plane traffic).
  • Explain QoS requirements for control plane traffic. What are generic VoIP Requirements, What are generic Video Requirements, What are generic TCP Requirements, What are generic UDP Requirements
  • Understanding of differentiation of control traffic vs data traffic. Where and how to define marking/conditioning of Control Traffic
  • Explain the techniques to avoid Class starvation when multiple classes are used (EF and non-EF). How EF with a policer and MDRR/Priority Queue solves the problem, How minimum BW assignment per class or proportional BW assignment among all classes solves the problem. What is the impact of applications' traffic within a given queue with same DS or different DS codepoint, What is the impact of applications' traffic riding on the same node/link in case of failure
  • Explain the interaction of IP DSCP with other marking schemes (IP Prec, .1P, MPLS EXP, ATM, Frame Relay). Interaction b/w DSCP and other technologies (understanding/issues/concerns), Ethernet, ATM, Frame Relay, MPLS, RPR, IP Prec, In case of tunneling layers of marking : Differentiation between tunnel marking and data packet marking. Explain QoS based routing (PBR). Situations where one has to pick one or two of the following to solve a problem (and understanding of the following) BGP QoS Propagation, MTR, OER, PBR, CBTS


  • Analyze network conditions and behavior to determine potential degradation or failure conditions. Recognize conditions from SHOW output for data plane, control plane, hardware, etc. Recognize conditions from DEBUG output for data plane, control plane, hardware, etc. Recognize conditions from network behaviors for data plane, control plane, hardware, etc. Recognize conditions from external monitoring and reporting systems.
  • Explain the operation and advantages of different management access mechanisms. How to implement out of band access to all devices in a network. What should be considered when defining secure access to routers. Recognize when and where a design will result in failure.
  • Explain the operation and use of network management protocols. Differences between the versions of SNMP. Knowledge of puts, gets, operations (read, write), Use of SNMP in SLA management, Identify when use of CMIP is appropriate, Identify when use of TMN is appropriate
  • Identify network management tools and their uses. Recognize tools used for SLA management Identify use of Generic On-Line Diagnostics (GOLD) Identify and Classify tools for Event Management
  • State rules for use of Syslog, Knowledge of where to place Netflow Collectors, Identify Services required for flow collection, Recognize Port number for Netflow, Identify services required for event correlation
  • Identify auditable factors in a network. Identify auditable factors in a network
  • Explain traffic management concepts and actions based on traffic statistics. What is a traffic matrix. When to upgrade a link or re-route traffic. Interpretation of historical data to predict future growth and needs
  • Recognise configuration management tools and best practices.Recognize uses of templating tools. Identify best practices for configuration management (i.e. logging config changes, auditing "as running" vs "as configured," consistent feature application, etc.)# Describe role-based configuration access


  • Explain the impact of security availability design in the characteristics of a network. OOB Access, Decoupling, Paul Baran Model Compartmentalization, Use available tools in a network security design to address identity, monitoring and correlation aspects. SNMP, Netflow Syslog, RMON, DNS, Radius/AAA, Full Packet Classifiers
  • Explain the impact of control plane design decisions on the security of a network; implement security mechanisms to protect the control plane. Use and impact of addressing. Use and impact of area (flooding domain/summary points) placement. Route/Topology/Link Hiding Adjacency Protection (MD5, GTSM, etc.), Route Validation, Route Filtering, Routing Plan, Other routing techniques.
  • Explain the impact of data plane design decisions on the security of a network; implement security mechanisms to protect the data plane. Infrastructure Protection, Policy Enforcement (QoS, BCP38)
  • Prepare and explain security incident preparation and response strategies in a network. Reaction Tools (Identification and Classification), Traceback Tools, Remotely-Triggered Black Holes (RTBH) (destination, source, rate limit, etc.), Sink Holes, Reactive ACLs
Classroom Training
Modality: C

Duration 5 days

Price (excl. VAT)
  • Eastern Europe: 2,490.- €
Enroll now

Currently there are no training dates scheduled for this course.  Enquire a date


Accessing our website tells us you are happy to receive all our cookies. However you can change your cookie settings at any time. Find out more.   Got it!