IT Certification and Career Paths

352-001 CCDE

CCDE Design Written Exam

Exam Number 352-001 CCDE
Associated Certifications CCDE
Duration 120 minutes (90 - 110 questions)
Available Languages English
Register Pearson VUE
Exam Policies Read current policies and requirements
Exam Tutorial Review type of exam questions

Cisco CCDE Written Exam will validate that professionals have the expertise to gather and clarify network functional requirements, develop network designs to meet functional specifications, develop an implementation plan, convey design decisions and their rationale, and possess expert-level network infrastructure knowledge.

Exam Topics

The exam is closed book, and no outside reference materials are allowed. The following topics are general guidelines for the content that is likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines that follow may change at any time without notice.

  • 26%     1.0   Layer 2 Control Plane

      • 1.1   Describe fast convergence techniques and mechanisms
        • 1.1a   Down detection
        • 1.1b   Interface dampening
           
      • 1.2   Describe loop detection and mitigation protocols
        • 1.2a   Spanning tree types
        • 1.2b   Spanning tree tuning techniques
           
      • 1.3   Describe mechanisms that are available for creating loop-free
                topologies
        • 1.3a   REP
        • 1.3b   Multipath
        • 1.3c   Switch clustering
        • 1.3d   Flex links
        • 1.3e   Loop detection and mitigation
           
      • 1.4   Describe the effect of transport mechanisms and their interaction
                with routing protocols over different types of links
         
      • 1.5   Describe multicast routing concepts
         
      • 1.6   Describe the effect of fault isolation and resiliency on network design
        • 1.6a   Fault isolation
        • 1.6b   Fate sharing
        • 1.6c   Redundancy
        • 1.6d   Virtualization
        • 1.6e   Segmentation
           
  • 37%     2.0   Layer 3 Control Plane

      • 2.1   Describe route aggregation concepts and techniques
        • 2.1a   Purpose of route aggregation
        • 2.1b   When to leak routes / avoid suboptimal routing
        • 2.1c   Determine aggregation location and techniques
           
      • 2.2   Describe the theory and application of network topology layering
        • 2.2a   Layers and their purposes in various environments
           
      • 2.3   Describe the theory and application of network topology abstraction
        • 2.3a   Purpose of link state topology summarization
        • 2.3b   Use of link state topology summarization
           
      • 2.4   Describe the effect of fault isolation and resiliency on network design
                or network reliability
        • 2.4a   Fault isolation
        • 2.4b   Fate sharing
        • 2.4c   Redundancy
           
      • 2.5   Describe metric-based traffic flow and modification
        • 2.5a   Metrics to modify traffic flow
        • 2.5b   Third-party next hop
           
      • 2.6   Describe fast convergence techniques and mechanisms
        • 2.6a   Protocol timers
        • 2.6b   Loop-free alternates
           
      • 2.7   Describe factors affecting convergence
        • 2.7a   Recursion
        • 2.7b   Microloops
        • 2.7c   Transport
           
      • 2.8   Describe unicast routing protocol operation (OSPF, EIGRP, ISIS,
                BGP, and RIP) in relation to network design
        • 2.8a   Neighbor relationships
        • 2.8b   Loop-free paths
        • 2.8c   Flooding domains and stubs
        • 2.8d   iBGP scalability
           
      • 2.9   Analyze operational costs and complexity
        • 2.9a   Routing policy
        • 2.9b   Redistribution methods
           
      • 2.10   Describe the interaction between routing protocols and topologies
         
      • 2.11   Describe generic routing and addressing concepts
        • 2.11a   Policy-based routing
        • 2.11b   NAT
        • 2.11c   Subnetting
        • 2.11d   RIB-FIB relationships
           
      • 2.12   Describe multicast routing concepts
        • 2.12a   General multicast concepts
        • 2.12b   Source specific
        • 2.12c   MSDP / anycast
        • 2.12d   PIM
        • 2.12e   mVPN
           
      • 2.13   Describe IPv6 concepts and operation
        • 2.13a   General IPv6 concepts
        • 2.13b   IPv6 security
        • 2.13c   IPv6 transition techniques
           
  • 17%     3.0   Network Virtualization

      • 3.1   Describe Layer 2 and Layer 3 tunnelling technologies
        • 3.1a   Tunnelling for security
        • 3.1b   Tunnelling for network extension
        • 3.1c   Tunnelling for resiliency
        • 3.1d   Tunnelling for protocol integration
        • 3.1e   Tunnelling for traffic optimization
           
      • 3.2   Analyze the implementation of tunnelling
        • 3.2a   Tunnelling technology selection
        • 3.2b   Tunnelling endpoint selection
        • 3.2c   Tunnelling parameter optimization of end-user applications
        • 3.2d   Effects of tunnelling on routing
        • 3.2e   Routing protocol selection and tuning for tunnels
           
  • 20%     4.0   Design Considerations

      • 4.1   Analyze various QoS performance metrics
        • 4.1a   Application requirements
        • 4.1b   Performance metrics
           
      • 4.2   Describe types of QoS techniques
        • 4.2a   Classification and marking
        • 4.2b   Shaping
        • 4.2c   Policing
        • 4.2d   Queuing
           
      • 4.3   Identify QoS strategies based on customer requirements
        • 4.3a   DiffServ
        • 4.3b   IntServ
           
      • 4.4   Identify network management requirements
         
      • 4.5   Identify network application reporting requirements
         
      • 4.6   Describe technologies, tools, and protocols that are used for network
                management
         
      • 4.7   Describe the reference models and processes that are used in
                network management, such as FCAPS, ITIL®), and TOGAF
         
      • 4.8   Describe best practices for protecting network infrastructure
        • 4.8a   Secure administrative access
        • 4.8b   Control plane protection
           
      • 4.9   Describe best practices for protecting network services
        • 4.9a   Deep packet inspection
        • 4.9b   Data plane protection
           
      • 4.10   Describe tools and technologies for identity management
         
      • 4.11   Describe tools and technologies for IEEE 802.11 wireless
                  deployment
         
      • 4.12   Describe tools and technologies for optical deployment
         
      • 4.13   Describe tools and technologies for SAN fabric deployment
  • Courses listed are offered by Cisco Learning Partners-the only authorized source for Cisco IT training delivered exclusively by Certified Cisco Instructors. Check the List of Learning Partners for a Cisco Learning Partner nearest you

    A variety of Cisco Press titles may be available for this exam. These titles can be purchased through the Cisco Marketplace Bookstore, directly from Cisco Press.

          Register at Pearson VUE      

    Cisco Learning Network

    Get valuable IT training resources for all Cisco certifications. Access study tools, CCNA practice tests, IT salaries, and find IT jobs.

    Go Now

    Cisco Training Tools

    Use the following tools to assist in your certification journey.

    Cisco Learning Locator Self Assessment Tool Certification Tracking System Certifications & Communities Online Support

    Cisco Learning Labs

    Get hands-on routing / switching lab experience using Cisco IOS on UNIX.

    Learn More