وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

200-901 DEVASC – Zero To Hero

سرفصل های دوره

Developing Applications and Automating Workflows using Cisco Platforms (DEVASC)


1. Section 1.0 - Software Development & Design 15%
  • 1. Introduction
  • 2. Lecture 1 Notes.html
  • 3. Data Format - XML JSON YAML
  • 4. Data Format - XML JSON YAML - Notes.html
  • 5. 1.2 Describe parsing of common data format (XML, JSON, and YAML) to Python data
  • 6. Describe parsing of common data format (XML, JSON, and YAML) to Python data Note.html
  • 7. 1.3 Describe the concepts of test-driven development
  • 8. Notes Describe the concepts of test-driven development.html
  • 9. 1.4 Compare software development methods (agile, lean, and waterfall)
  • 10. 1.4 Compare software development methods (agile, lean, and waterfall) - Notes.html
  • 11. 06 1.5 Explain the benefits of organizing code into methods functions, classes
  • 12. Explain the benefits of organizing code into methods functions, classes Notes.html
  • 13. 1.6 Identify the advantages of common design patterns (MVC and Observer)
  • 14. 1.7 Explain the advantages of version control
  • 15. Explain the advantages of version control - Notes.html
  • 16. 1.8 Utilize common version control operations with Git Theory
  • 17. 1.8 Utilize common version control operations with Git Lab
  • 18. Utilize common version control operations with Git - Notes.html

  • 2. 2.0 Understanding and Using APIs 20%
  • 1. 2.1 Construct a REST API request to accomplish a task given API documentation
  • 2. Construct a REST API request Postman & SD-WAN vManage
  • 3. Construct a REST API request Postman & SD-WAN vManage Notes.html
  • 4. 2.2 Describe common usage patterns related to webhooks
  • 5. Describe common usage patterns related to webhooks.html
  • 6. 2.3 Identify the constraints when consuming APIs
  • 7. 2.3 Identify the constraints when consuming APIs Notes.html
  • 8. 2.4 Explain common HTTP response codes associated with REST APIs
  • 9. Explain common HTTP response codes associated with REST APIs Notes.html
  • 10. 2.5 Troubleshoot a problem given the HTTP response code, request and API
  • 11. 2.5 Troubleshoot a problem given the HTTP response code, request and API Notes.html
  • 12. 2.6 Identify the parts of an HTTP response (response code, headers, body)
  • 13. 2.6 Identify the parts of an HTTP response (response code, headers, body) Notes.html
  • 14. 2.7 Utilize common API authentication mechanisms basic, custom token, and API
  • 15. Notes Utilize common API authentication mechanisms basic, custom token, and API.html
  • 16. 2.8 Compare common API styles (REST, RPC, synchronous, and asynchronous)
  • 17. Notes Compare common API styles (REST, RPC, synchronous, and asynchronous).html
  • 18. 2.9 Construct a Python script that calls a REST API using the requests library
  • 19. DNAC-API-01
  • 20. DNAC-API-02
  • 21. DNAC First API Lab Get Token
  • 22. Notes Construct a Python Script that calls a REST API using the requests library.html

  • 3. 3.0 Cisco Platforms and Development - 15%
  • 1. 3.1 Construct a Python script that uses a Cisco SDK given SDK documentation
  • 2. Construct a Python script that uses a Cisco SDK given SDK documentation Notes.html
  • 3. Describe the capabilities of Cisco network management Meraki, Cisco DNA
  • 4. Describe the capabilities of Cisco network management platforms and APIs - Notes.html
  • 5. Cisco compute management platforms and APIs (UCS Manager and Intersight)
  • 6. Cisco compute management platforms and APIs (UCS Manager and Intersight) - Notes.html
  • 7. Describe the capabilities of Cisco collaboration platforms and APIs
  • 8. Notes Describe the capabilities of Cisco collaboration platforms and APIs.html
  • 9. Describe the capabilities of Cisco security platforms and APIs
  • 10. Notes Describe the capabilities of Cisco security platforms and APIs.html
  • 11. Describe the device level APIs and dynamic interfaces for IOS XE and NX-OS
  • 12. Notes - Describe the device level APIs and dynamic interfaces for IOS XE & NX-OS.html
  • 13. identify the appropriate DevNet resource for a given scenario
  • 14. Notes -Identify the appropriate DevNet resource for a given scenario.html
  • 15. Construct code to perform a specific operation based on a set of requirements
  • 16. Notes - Construct code to perform a specific operation.html
  • 17. 3.9.a Obtain a list of network devices by using Meraki, Cisco DNA Center, ACI
  • 18. Notes -- Obtain a list of network devices by using Meraki, Cisco DNA Center, ACI.html
  • 19. 3.9.b Manage spaces, participants, and messages in Webex
  • 20. Manage Space, Participants and messages in WebEx.html
  • 21. Obtain a list of clients hosts seen on a network using Meraki or Cisco DNA
  • 22. Notes Obtain a list of clients hosts seen on a network using MerakiCisco DNA.html

  • 4. Application Deployment & Security - 15 %
  • 1. Describe benefits of edge computing
  • 2. Describe benefits of edge computing.html
  • 3. Identify attributes of different application deployment models
  • 4. Identify attributes of different application deployment models.html
  • 5. 37 4.3 Identify the attributes of these application deployment types
  • 6. Identify the attributes of these application deployment types - Notes.html
  • 7. 38 4.4 Describe components for a CICD pipeline in application deployments
  • 8. Describe components for a CICD pipeline in application deployments - Notes.html
  • 9. 39 4.5 Construct a Python unit test
  • 10. Construct a Python unit test - Notes.html
  • 11. 40 4.6 Interpret contents of a Dockerfile
  • 12. Notes - Interpret contents of a Dockerfile.html
  • 13. 41 4.7 Utilize Docker images in local developer environment
  • 14. Notes -- Utilize Docker images in local developer environment.html
  • 15. 42 Identify application security issues related to secret protection, encryption
  • 16. Notes - Identify application security issues related to secret protection.html
  • 17. 43 Explain firewall, DNS, load balancers, and reverse proxy in application
  • 18. Notes - Explain firewall, DNS, load balancers, and reverse proxy in application.html
  • 19. Describe top OWASP threats (such as XSS, SQL injections, and CSRF)
  • 20. Notes - Describe top OWASP threats (such as XSS, SQL injections, and CSRF).html
  • 21. 45 4.11 Utilize Bash commands
  • 22. Notes - 45 4.11 Utilize Bash commands.html
  • 23. Navigating Linux File System
  • 24. Linux Distribution & Package Manager
  • 25. Working with Files & Directory Part 01
  • 26. Working with Files & Directory Part 02
  • 27. File Permissions & Linux Process
  • 28. 51 Linux Process
  • 29. 52 4.12 Identify the principles of DevOps practices
  • 30. Notes - Identify the principles of DevOps.html

  • 5. 5.0 Infrastructure and Automation
  • 1. Section 5.0 introduction
  • 2. 5.1 Describe the value of model driven programmability for infrastructure
  • 3. 5.1 Describe the value of model driven programmability for infrastructure
  • 4. Compare controller-level to device-level management.html
  • 5. 56 5.2 Compare controller-level to device-level management
  • 6. Notes -Describe the value of model driven programmability for infrastructure.html
  • 7. 57 5.3 Describe the use and roles of network simulation and test tools
  • 8. 58 5.4 and 5.5 5.5 Describe principles of infrastructure as code
  • 9. IaC Notes.html
  • 10. 59 5.6 Describe the capabilities of automation tools such as Ansible, Terraform
  • 11. Notes - Capabilities of automation tools such as Ansible, Terraform.html
  • 12. 60 5.14 Interpret sequence diagram that includes API calls
  • 13. Notes - Interpret Sequence diagram that includes API Calls.html
  • 14. 61 5.10 Interpret the results of a RESTCONF or NETCONF query
  • 15. Notes - Interpret the results of a RESTCONF or NETCONF query.html
  • 16. 62 5.7 Identify the workflow being automated by a Python script
  • 17. Notes - Identify the workflow being automated by a Python script.html
  • 18. 63 4.5b DNAC Template
  • 19. 64 5.8 Identify the workflow being automated by an Ansible playbook
  • 20. 65 5.9 Identify the workflow being automated by a bash script
  • 21. Notes -- Identify the workflow being automated by a bash script.html
  • 22. 66 5.12 Interpret a unified diff
  • 23. Notes - Interpret a unified Diff.html
  • 24. 67 5.13 Describe the principles and benefits of a code review process
  • 25. Notes - Describe the principles and benefits of a code review process.html
  • 26. 6.1 Describe the purpose and usage of MAC addresses and VLANs
  • 27. Describe the purpose and usage of IP addresses, routes, subnet mask prefix
  • 28. Describe the function of common networking components
  • 29. Interpret a basic network topology diagram with elements such as switches
  • 30. Describe the function of management, data, and control planes in a network
  • 31. Describe the functionality of these IP Services DHCP, DNS, NAT, SNMP, NTP
  • 32. 6.7 Recognize common protocol port values (such as, SSH, Telnet, HTTP, HTTPS
  • 33. Identify cause of application connectivity issues (NAT problem, Transport Port
  • 34. 6.9 Explain the impacts of network constraints on applications

  • 6. Python
  • 1. Agenda of the training
  • 2. Data Type Part 01
  • 3. Data Types String & List
  • 4. Variable Expression statement comment operator
  • 5. Module Function Flow With Examples
  • 6. user defined function examples
  • 7. Practice examples
  • 8. if & if else
  • 9. While & For loop
  • 10. Break Continue Pass conditions
  • 11. Unit 3 - Return function & global & local variable
  • 12. Recursive Function String Slicing
  • 13. String Modules & array
  • 14. Unit IV - List Operations
  • 15. List operations & Tuple
  • 16. Dictionaries
  • 17. Unit V Files & Exceptional handling
  • 18. Error Handling
  • 19. Python Import & Packages
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 39498
    حجم: 6160 مگابایت
    مدت زمان: 876 دقیقه
    تاریخ انتشار: 22 مرداد 1403
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید