وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
1

200-901 DEVASC – Zero To Hero

سرفصل های دوره

Developing Applications and Automating Workflows using Cisco Platforms (DEVASC)


1. Section 1.0 - Software Development & Design 15%
  • 1. Introduction
  • 2. Lecture 1 Notes.html
  • 3. Data Format - XML JSON YAML
  • 4. Data Format - XML JSON YAML - Notes.html
  • 5. 1.2 Describe parsing of common data format (XML, JSON, and YAML) to Python data
  • 6. Describe parsing of common data format (XML, JSON, and YAML) to Python data Note.html
  • 7. 1.3 Describe the concepts of test-driven development
  • 8. Notes Describe the concepts of test-driven development.html
  • 9. 1.4 Compare software development methods (agile, lean, and waterfall)
  • 10. 1.4 Compare software development methods (agile, lean, and waterfall) - Notes.html
  • 11. 06 1.5 Explain the benefits of organizing code into methods functions, classes
  • 12. Explain the benefits of organizing code into methods functions, classes Notes.html
  • 13. 1.6 Identify the advantages of common design patterns (MVC and Observer)
  • 14. 1.7 Explain the advantages of version control
  • 15. Explain the advantages of version control - Notes.html
  • 16. 1.8 Utilize common version control operations with Git Theory
  • 17. 1.8 Utilize common version control operations with Git Lab
  • 18. Utilize common version control operations with Git - Notes.html

  • 2. 2.0 Understanding and Using APIs 20%
  • 1. 2.1 Construct a REST API request to accomplish a task given API documentation
  • 2. Construct a REST API request Postman & SD-WAN vManage
  • 3. Construct a REST API request Postman & SD-WAN vManage Notes.html
  • 4. 2.2 Describe common usage patterns related to webhooks
  • 5. Describe common usage patterns related to webhooks.html
  • 6. 2.3 Identify the constraints when consuming APIs
  • 7. 2.3 Identify the constraints when consuming APIs Notes.html
  • 8. 2.4 Explain common HTTP response codes associated with REST APIs
  • 9. Explain common HTTP response codes associated with REST APIs Notes.html
  • 10. 2.5 Troubleshoot a problem given the HTTP response code, request and API
  • 11. 2.5 Troubleshoot a problem given the HTTP response code, request and API Notes.html
  • 12. 2.6 Identify the parts of an HTTP response (response code, headers, body)
  • 13. 2.6 Identify the parts of an HTTP response (response code, headers, body) Notes.html
  • 14. 2.7 Utilize common API authentication mechanisms basic, custom token, and API
  • 15. Notes Utilize common API authentication mechanisms basic, custom token, and API.html
  • 16. 2.8 Compare common API styles (REST, RPC, synchronous, and asynchronous)
  • 17. Notes Compare common API styles (REST, RPC, synchronous, and asynchronous).html
  • 18. 2.9 Construct a Python script that calls a REST API using the requests library
  • 19. DNAC-API-01
  • 20. DNAC-API-02
  • 21. DNAC First API Lab Get Token
  • 22. Notes Construct a Python Script that calls a REST API using the requests library.html

  • 3. 3.0 Cisco Platforms and Development - 15%
  • 1. 3.1 Construct a Python script that uses a Cisco SDK given SDK documentation
  • 2. Construct a Python script that uses a Cisco SDK given SDK documentation Notes.html
  • 3. Describe the capabilities of Cisco network management Meraki, Cisco DNA
  • 4. Describe the capabilities of Cisco network management platforms and APIs - Notes.html
  • 5. Cisco compute management platforms and APIs (UCS Manager and Intersight)
  • 6. Cisco compute management platforms and APIs (UCS Manager and Intersight) - Notes.html
  • 7. Describe the capabilities of Cisco collaboration platforms and APIs
  • 8. Notes Describe the capabilities of Cisco collaboration platforms and APIs.html
  • 9. Describe the capabilities of Cisco security platforms and APIs
  • 10. Notes Describe the capabilities of Cisco security platforms and APIs.html
  • 11. Describe the device level APIs and dynamic interfaces for IOS XE and NX-OS
  • 12. Notes - Describe the device level APIs and dynamic interfaces for IOS XE & NX-OS.html
  • 13. identify the appropriate DevNet resource for a given scenario
  • 14. Notes -Identify the appropriate DevNet resource for a given scenario.html
  • 15. Construct code to perform a specific operation based on a set of requirements
  • 16. Notes - Construct code to perform a specific operation.html
  • 17. 3.9.a Obtain a list of network devices by using Meraki, Cisco DNA Center, ACI
  • 18. Notes -- Obtain a list of network devices by using Meraki, Cisco DNA Center, ACI.html
  • 19. 3.9.b Manage spaces, participants, and messages in Webex
  • 20. Manage Space, Participants and messages in WebEx.html
  • 21. Obtain a list of clients hosts seen on a network using Meraki or Cisco DNA
  • 22. Notes Obtain a list of clients hosts seen on a network using MerakiCisco DNA.html

  • 4. Application Deployment & Security - 15 %
  • 1. Describe benefits of edge computing
  • 2. Describe benefits of edge computing.html
  • 3. Identify attributes of different application deployment models
  • 4. Identify attributes of different application deployment models.html
  • 5. 37 4.3 Identify the attributes of these application deployment types
  • 6. Identify the attributes of these application deployment types - Notes.html
  • 7. 38 4.4 Describe components for a CICD pipeline in application deployments
  • 8. Describe components for a CICD pipeline in application deployments - Notes.html
  • 9. 39 4.5 Construct a Python unit test
  • 10. Construct a Python unit test - Notes.html
  • 11. 40 4.6 Interpret contents of a Dockerfile
  • 12. Notes - Interpret contents of a Dockerfile.html
  • 13. 41 4.7 Utilize Docker images in local developer environment
  • 14. Notes -- Utilize Docker images in local developer environment.html
  • 15. 42 Identify application security issues related to secret protection, encryption
  • 16. Notes - Identify application security issues related to secret protection.html
  • 17. 43 Explain firewall, DNS, load balancers, and reverse proxy in application
  • 18. Notes - Explain firewall, DNS, load balancers, and reverse proxy in application.html
  • 19. Describe top OWASP threats (such as XSS, SQL injections, and CSRF)
  • 20. Notes - Describe top OWASP threats (such as XSS, SQL injections, and CSRF).html
  • 21. 45 4.11 Utilize Bash commands
  • 22. Notes - 45 4.11 Utilize Bash commands.html
  • 23. Navigating Linux File System
  • 24. Linux Distribution & Package Manager
  • 25. Working with Files & Directory Part 01
  • 26. Working with Files & Directory Part 02
  • 27. File Permissions & Linux Process
  • 28. 51 Linux Process
  • 29. 52 4.12 Identify the principles of DevOps practices
  • 30. Notes - Identify the principles of DevOps.html

  • 5. 5.0 Infrastructure and Automation
  • 1. Section 5.0 introduction
  • 2. 5.1 Describe the value of model driven programmability for infrastructure
  • 3. 5.1 Describe the value of model driven programmability for infrastructure
  • 4. Compare controller-level to device-level management.html
  • 5. 56 5.2 Compare controller-level to device-level management
  • 6. Notes -Describe the value of model driven programmability for infrastructure.html
  • 7. 57 5.3 Describe the use and roles of network simulation and test tools
  • 8. 58 5.4 and 5.5 5.5 Describe principles of infrastructure as code
  • 9. IaC Notes.html
  • 10. 59 5.6 Describe the capabilities of automation tools such as Ansible, Terraform
  • 11. Notes - Capabilities of automation tools such as Ansible, Terraform.html
  • 12. 60 5.14 Interpret sequence diagram that includes API calls
  • 13. Notes - Interpret Sequence diagram that includes API Calls.html
  • 14. 61 5.10 Interpret the results of a RESTCONF or NETCONF query
  • 15. Notes - Interpret the results of a RESTCONF or NETCONF query.html
  • 16. 62 5.7 Identify the workflow being automated by a Python script
  • 17. Notes - Identify the workflow being automated by a Python script.html
  • 18. 63 4.5b DNAC Template
  • 19. 64 5.8 Identify the workflow being automated by an Ansible playbook
  • 20. 65 5.9 Identify the workflow being automated by a bash script
  • 21. Notes -- Identify the workflow being automated by a bash script.html
  • 22. 66 5.12 Interpret a unified diff
  • 23. Notes - Interpret a unified Diff.html
  • 24. 67 5.13 Describe the principles and benefits of a code review process
  • 25. Notes - Describe the principles and benefits of a code review process.html
  • 26. 6.1 Describe the purpose and usage of MAC addresses and VLANs
  • 27. Describe the purpose and usage of IP addresses, routes, subnet mask prefix
  • 28. Describe the function of common networking components
  • 29. Interpret a basic network topology diagram with elements such as switches
  • 30. Describe the function of management, data, and control planes in a network
  • 31. Describe the functionality of these IP Services DHCP, DNS, NAT, SNMP, NTP
  • 32. 6.7 Recognize common protocol port values (such as, SSH, Telnet, HTTP, HTTPS
  • 33. Identify cause of application connectivity issues (NAT problem, Transport Port
  • 34. 6.9 Explain the impacts of network constraints on applications

  • 6. Python
  • 1. Agenda of the training
  • 2. Data Type Part 01
  • 3. Data Types String & List
  • 4. Variable Expression statement comment operator
  • 5. Module Function Flow With Examples
  • 6. user defined function examples
  • 7. Practice examples
  • 8. if & if else
  • 9. While & For loop
  • 10. Break Continue Pass conditions
  • 11. Unit 3 - Return function & global & local variable
  • 12. Recursive Function String Slicing
  • 13. String Modules & array
  • 14. Unit IV - List Operations
  • 15. List operations & Tuple
  • 16. Dictionaries
  • 17. Unit V Files & Exceptional handling
  • 18. Error Handling
  • 19. Python Import & Packages
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 39498
    حجم: 6160 مگابایت
    مدت زمان: 876 دقیقه
    تاریخ انتشار: ۲۲ مرداد ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید