Professional Documents
Culture Documents
CCIE RS 5.0 Learning Matrix
CCIE RS 5.0 Learning Matrix
. The goal of this learning matrix is to help you attain your goal to become certified by providing study resources tailo
. It is intended to be used as a reference, and not to provide a complete list of all resources available. The matrix focu
. These widely available preparation resources can be in the form of specific chapters of books, Cisco Validated Desig
webinars, VoDs, SRNDs, white papers, case studies, design guides, Design TechNotes, reference guides, etc.
. The evolving technologies domain is shared between tracks, the leraning matrix for this domain can be found here
Disclaimer
. There is no guarantee that you will be able to pass the exam by only referring to material provided within this matr
. There are a lot of other resources (both internal and external) that cover the same exam topics. You are encouraged to use an
. This matrix should be considered a living document and taking into account the sheer amount of possible relevant content, th
. We encourage you to participate and engage with us, so if you have any suggestions for further content or any comments reg
1.5. Pass?
Did you pass? Great! Did you not? Do not despair, do a lessons learned review and update your self-evaluation.
viding study resources tailored to your own needs.
es available. The matrix focusses primarely on Cisco and Cisco Press content.
ooks, Cisco Validated Design documents (CVDs), Cisco Live 365 presentations, courses,
rence guides, etc.
domain can be found here
l provided within this matrix. But it will certainly improve your skills, which will serve as the foundation you need to build upon.
You are encouraged to use any other resources at your own discretion during your exam preparation.
f possible relevant content, the objective here is to refine and improve this compilation of resources over time, so please refer to it frequen
content or any comments regards to the current content, please let us know.
ral options might be provided to prepare to each topic, you might not need all of them.
e your self-evaluation.
on you need to build upon.
Sub Domain
Domain
Task
ID
1 Network Principles
1.1 Network theory
1.1.a Describe basic software architecture differences between IOS and IOS XE
1.1.a [i]
1.1.a [ii]
1.1.a [iii]
1.1.b [ii]
1.1.b [iii]
1.1.c [ii]
1.1.c [iii]
1.1.c [iv]
1.1.d [ii]
1.1.d [iii]
1.1.d [iv]
1.1.d [v]
1.1.e [ii]
1.1.e [iii]
1.1.e [iv]
1.1.e [v]
1.1.e [vi]
1.1.e [vii]
1.1.f [ii]
1.1.f [iii]
1.2.a [ii]
1.2.a [iii]
1.2.a [iv]
1.2.a [v]
1.2.a [vi]
1.3.a [ii]
1.3.a [iii]
1.3.a [iv]
1.3.b [ii]
1.3.b [iii]
1.3.c [ii]
2 Layer 2 Technologies
2.1 LAN switching technologies
2.1.a Implement and troubleshoot switch administration
2.1.a [i]
2.1.a [ii]
2.1.a [iii]
2.1.b [ii]
2.1.c [ii]
2.1.c [iii]
2.1.d Implement and troubleshoot trunking
2.1.d [i]
2.1.d [ii]
2.1.d [iii]
2.1.d [iv]
2.1.e [ii]
2.1.e [iii]
2.1.e [iv]
2.1.f [ii]
2.1.f [iii]
2.1.f [iv]
2.1.h [ii]
2.1.h [iii]
2.1.h [iv]
2.1.h [v]
2.1.i [ii]
2.2.a [ii]
2.2.a [iii]
2.2.a [iv]
2.2.a [v]
2.3.b [ii]
2.3.b [iii]
2.3.c [ii]
3 Layer 3 Technologies
3.1 Addressing technologies
3.3.c [ii]
3.3.c [iii]
3.3.m [ii]
3.3.m [iii]
3.3.n [ii]
3.3.n [iii]
3.3.n [iv]
3.3.n [v]
3.7 BGP
4 VPN Technologies
4.1 Tunneling
4.1.a Implement and troubleshoot MPLS operations
4.1.a [i]
4.1.a [ii]
4.1.a [iii]
4.1.b [ii]
4.1.c [ii]
4.1.c [iii]
4.1.d [ii]
4.1.d [iii]
4.1.d [iv]
4.1.e [ii]
4.1.e [iii]
4.1.e [iv]
4.1.g [ii]
4.1.h [ii]
4.2 Encryption
4.2.a Implement and troubleshoot IPsec with preshared key
4.2.a [i]
4.2.a [ii]
4.2.a [iii]
5 Infrastructure Security
5.1 Device security
5.2.a [ii]
5.2.a [iii]
5.2.a [iv]
5.2.a [v]
5.2.a [vi]
5.2.a [vii]
5.2.b [ii]
5.2.b [iii]
5.2.c [ii]
5.2.c [iii]
5.2.c [iv]
5.2.c [v]
5.2.c [vii]
5.2.c [viii]
5.2.d [ii]
6 Infrastructure Services
Written or Both exams
ning Matrix
sub-task
Principles W
work theory W
Unicast flooding W
Asymmetric routing W
Explain IP operations W
TTL W
IP MTU W
MSS W
Latency W
Windowing W
Global synchronization W
Options W
Starvation W
Latency W
RTP/RTCP concepts W
work troubleshooting B
Performance monitor B
Diagnose the root cause of networking issue [analyze symptoms, identify and describe root cause] B
echnologies B
switching technologies B
errdisable recovery B
L2 MTU B
CDP, LLDP B
UDLD B
Access ports B
VLAN database B
dot1Q B
Native VLAN B
Manual pruning B
Layer 2, layer 3 B
Load-balancing B
PVST+/RPVST+/MST B
loopguard, rootguard B
Multichassis B
VSS concepts B
Alternative to STP B
Stackwise B
er 2 multicast B
IGMP snooping B
IGMP querier B
IGMP filter B
IGMP proxy B
Explain MLD W
PPPoE B
MLPPP B
echnologies B
ressing technologies B
er 3 multicast B
Distance vector B
Link state B
Path vector B
Implement, optimize and troubleshoot manual and auto summarization with any routingB
Implement, optimize and troubleshoot policy-based routing B
Split horizon B
Route poisoning B
MD5 B
Key-chain B
hnologies B
LDP B
GRE B
Dynamic GRE B
NHRP B
QoS profile B
Pre-classify B
6in4, 6to4 W
ISATAP W
6RD W
6PE/6VPE W
cture Security B
ice security B
work security B
VACL, PACL B
Stormcontrol B
DHCP snooping B
IP source-guard B
port-security B
Private VLAN B
RA guard B
DHCP guard B
Binding table B
Device tracking B
ND inspection/snooping B
Source guard B
PACL B
Describe 802.1x W
802.1x, EAP, RADIUS W
cture Services B
Cisco.com
Cisco Documentation
How to Choose the Best Router Switching Path for Your Network
Troubleshooting Incomplete Adjacencies with CEF
Load Balancing with CEF
CEF Polarization
TCP/IP Overview
When Are ICMP Redirects Sent?
IPv6 Extension Headers Review and Considerations
Resolve IP Fragmentation, MTU, MSS, and PMTUD Issues with GRE and IPSEC
TTL Expiry Attack Identification and Mitigation
UDP Broadcast Flooding A Cisco Guide to Defending Against Distributed Denial of Service Attacks
Chapter: QoS Bandwidth Estimation
Internetwork Design Guide -Cisco Catalyst 3560 Series Switches Design Guides
Customizing IGMP
Ethernet Access for Next Generation Metro and Wide Area Networks
Ethernet Access for Next Generation Metro and Wide Area Networks
Access Lists
IPv6 Traffic Filtering Access List Configuration Example
Understanding Unicast Reverse Path Forwarding
DocWikil: IPv6 FHS
IOS 15.3M/T
Chapter: Configuring
Chapter: IPv6 MTU PathTCP
Discovery
Chapter: Troubleshooting
Chapter: EIGRP
Chapter: EIGRP/SAF HMAC-SHA-256 Authentication
Chapter: OSPFv2 Cryptographic Authentication
Chapter: OSPFv3 IPSec ESP Encryption and Authentication
Session Library
BRKIPM-1261 - IntroductionBRKIPM-2264
t - Multicast Troubleshooting
BRKRST-2331 - Troubleshoo
BRKRST-2336 - EIGRP Deployment in Modern Network
BRKCCIE-3253 - Tunnels (IPsec, VTI & GRE) for Route & Switching CCIE Candidates
BRKMPL-1100 - Introduction to MPLS
BRKMPL-3124 - Troubleshooting End-to-End MPLS
BRKCCIE-3345 - The CCIE Candidate's Introduction to MPLS L3VPN Networks
BRKCRT-2601 - VRF, MPLS and MPBGP Fundamentals
Source Guard
S Release 15M&T
Authentication
Authentication
Authentication
Ciscopress
: Software Architecture) IP Routing on Cisco IOS, IOS XE, and IOS XR: An Essential Guide to Underst
Vol1 Chapter 2
Vol1 Chapter 3
System (VSS)
Vol2 Chapter 6
Vol1 Chapter 4
Vol1 Chapter 11 IP Routing on Cisco IOS, IOS XE, and IOS XR: An Essential Guide to Underst
IP Routing on Cisco IOS, IORouting TCP/IP, Volume 1, 2nd Edition Chapter 3
Routing TCP/IP, Volume 1, 2nd Edition Chapter 12
Routing TCP/IP, Volume 1, 2nd Edition Chapter 4
Vol2 Chapter 11
Routing TCP/IP, Volume 1, 2nd Edition Chapter 13
Routing TCP/IP, Volume 1, 2nd Edition Chapter 11
Vol1 Chapter 8 IP Routing on Cisco IOS, IORouting TCP/IP, Volume 1, 2nd Edition Chapter 7
Vol1 Chapter 10 IP Routing on Cisco IOS, IORouting TCP/IP, Volume 1, 2nd Edition Chapter 10
Candidates
Vol2 Chapter 11 MPLS Fundamentals Part 1
Vol2 Chapter 11
MPLS Fundamentals Chapter 7
Vol2 Chapter 10
Vol2 Chapter 10
Vol2 Chapter 10
Vol2 Chapter 10
Vol2 Part 5