CCIE Collaboration 400-051 V1.1 Written Exam Topics Breakdown
CCIE Collaboration 400-051 V1.1 went live about two months ago. There are no major changes from v1.0 except that Evolving Technologies have become part of CCIE Collaboration written exam.
We have finally launched our brand new CCIE Collaboration 400-051 V1.1 Exam Cert Guide and Practice Quizzes. It is available within the products.
Please refer to the table below for complete exam topics breakdown.
|1.0 Cisco Collaboration Infrastructure||10%||9 to 11|
|2.0 Telephony Standards and Protocols||12%||11 to 13|
|3.0 Cisco Unified Communications Manager [CUCM]||22%||20 to 24|
|4.0 Cisco IOS UC Applications and Features||16%||14 to 18|
|5.0 Quality of Service and Security in Cisco Collaboration Solutions||12%||11 to 13|
|6.0 Cisco Unity Connection||8%||7 to 9|
|7.0 Cisco Unified Contact Center Express||4%||4|
|8.0 Cisco Unified IM and Presence||6%||5 to 7|
|6.0 Evolving Technologies||10%||9 to 11||-InterCloud Fabric, SDN and IoT are added.|
5 (1) The United States is home to the world’s most iconic cybersecurity companies such as Palo Alto Networks, Fortinet, FireEye, CrowdStrike, McAfee, Tanium and I can go on and on but here is the point. Despite being at the cutting edge of cybersecurity technologies, US enterprises and the government get successfully targeted and hacked […]
5 (1) If you need more reasons to dive into a Cybersecurity career, here are a few pieces of information to consider. Gartner says that the cybersecurity spending is expected to reach $123 billion and continue to grow at about 10% each year for another 8 years. Just for context. At 10,000 feet, the cybersecurity […]
5 (1) The global Cybersecurity market is worth $202B today and is expected to reach a whopping $433B by 2030. The cyber security market consists of five major segments and those are network security and endpoint, threat detection and intelligence, identity access management or IAM, data and cloud security, encryption, and cryptography, and a few […]
5 (1) If you didn’t know, the SolarWinds hack was not one of, but the most sophisticated software supply chain attack to ever occur. SolarWinds hackers enjoyed unfettered access to thousands of SolarWinds customers worldwide for 9 months. They could have continued it for even longer if not for the unforced error on their part […]
5 (1) Another week, and another hack. If the SolarWinds and Microsoft Exchange hacks were not enough, F5 to the rescue. With a high-severity vulnerability, a patch-ASAP-grade, you can bet attackers reacted like sharks that smell blood in the water. Just for some historical context, a similarly critical remote code execution or RCE vulnerability in […]