CCIE DevNet v1.0 Training

Price: 799$
5/5

CCIE DevNet v1.0 Bootcamp & Training

Iproute provides CCIE Devnet Bootcamp & Training in one center, learn from the expert and professional who have cleared Cisco Exam and having good number of experienced. Achieving Cisco Certified DevNet Expert certification validates your expert knowledge and proficiency in network automation, programmability, and secure automation tools. To earn Cisco Certified DevNet Expert certification, you pass two exams: a qualifying exam that covers core software and automation development and design for Cisco platforms as well as a hands-on lab exam that covers software-driven network automation solutions through the entire network lifecycle, from designing and deploying to operating and optimizing.

CCIE Devnet v1.0 Course Syllabus

  • 1.1 Design a solution based on an on-premises, hybrid, or public cloud deployment, considering these factors:
    1. Deployment: maintainability, modularity (e.g., containers, VM, orchestration, automation, components, and infrastructure requirements)
    2. Reliability: high availability and resiliency
    3. Performance: scalability, latency, and rate limiting
    4. Infrastructure: monitoring, observability, and metrics (e.g., instrument placement and instrument deployment)
  • 1.2 Recommend a deployment strategy to mitigate risk and impact on service availability, for a given scenario
  • 1.3 Modify an existing network automation solution based on business and technical requirements (includes gap analysis)
  • 1.4 Use Git in a CI/CD development workflow
  • 1.5 Troubleshoot issues with a CI/CD pipeline (e.g., code-based failures, pipeline issues, and tool incompatibility)
  • 2.1 Make authenticated calls to AWS services.
    1. Communicate required policy based on least privileges required by application.
    2. Assume an IAM role to access a service
    3. Use the software development kit (SDK) credential provider on-premises or in the cloud to access AWS services (local credentials vs. instance roles)
  • 2.2 Implement encryption using AWS services.
    1. Encrypt data at rest (client side; server side; envelope encryption) using AWS services
    2. Encrypt data in transit
  • 2.3 Implement application authentication and authorization
    1. Add user sign-up and sign-in functionality for applications with Amazon Cognito identity or user pools
    2. Use Amazon Cognito-provided credentials to write code that access AWS services
    3. Use Amazon Cognito sync to synchronize user profiles and data
    4. Use developer-authenticated identities to interact between end user devices, backend authentication, and Amazon Cognito
  • 3.1 Create, modify, and troubleshoot scripts by using Python libraries and SDK documentation to automate against APIs (ACI, AppDynamics, DNA Center, FDM, Intersight, IOS XE, Meraki, NSO, Webex)
    1. 3.2 Automate the configuration of a Cisco IOS XE network device (based on a provided architecture and configuration), including these components:
    2. 3.2.a Interfaces
    3. 3.2.b Static routes
    4. 3.2.c VLANs
    5. 3.2.d Access control lists
    6. 3.2.e BGP peering
    7. 3.2.f BGP and OSPF routing tables
    8. 3.2.g BGP and OSPF neighbors
  • 3.3 Deploy an application on a Cisco IOS XE device by leveraging the technologies of Guest Shell and application hosting
    1. 3.4 Modify and troubleshoot an automated test by using pyATS to meet requirements
    2. 3.4.a Create a testbed file for connecting to Cisco IOS, IOS XE, or NX-OS devices
    3. 3.4.b Gather current configuration and operational state from devices using the Genie parsers and models included with pyATS
    4. 3.4.c Develop and execute test jobs and scripts using AEtest to verify network health
  • 3.5 Design a model-driven telemetry solution based on given business and technical requirements by using gNMI dial-in, gRPC dial-out, and NETCONF dial-in
  • 3.6 Create YANG model-driven telemetry subscriptions
    1. 3.6.a Identify model elements and cadence
    2. 3.6.b On-change or event drive
    3. 3.6.c Optimize frequency
    4. 3.6.d Dial-out subscription
    5. v3.6.e Secure telemetry streams
    6. 3.6.f Confirm data transmission
    7. 3.6.g Identify network issues and make changes
  •  
  • 4.1 Create a Docker image (including Dockerfile)
    1. 4.1.a From a provided image
    2. 4.1.b Expose ports
    3. 4.1.c Add or copy files
    4. 4.1.d Run commands during image build
    5. 4.1.e Manipulate entry point and initial commands
    6. 4.1.f Establish working directories
    7. 4.1.g Environment variables as part of a definition to control an application
    8. 4.1.h Docker ignore file
    9. 4.1.i Volumes
  • 4.2 Package and deploy a solution by using Docker Compose
    1. 4.2.a Deploy and manage containers
    2. 4.2.b Define services, networks, volumes, and links
  • 4.3 Package and deploy a solution by using Kubernetes
    1. 4.3.a Use deployments, secrets, services, ingress, volumes, namespaces, and replicas
    2. 4.3.b Manage the lifecycle of pods (e.g., scale up, scale down, help status, logs)
    3. 4.3.c Monitor pods by building health checks
    4. 4.3.d Use the kubectl interface
  • 4.4 Create, consume, and troubleshoot a Docker host and bridge-based networks and integrate them with external networks
  • 5.1 Leverage OWASP secure coding practices into all solutions to meet given requirements
    1. 5.1.a Input validation
    2. 5.1.b Authentication and password management
    3. 5.1.c Access control
    4. 5.1.d Cryptographic practices
    5. 5.1.e Error handling and logging
    6. 5.1.f Communication security
  • 5.2 Create a certificate signing request (CSR) by using OpenSSL; send CSR to a provided certificate authority; and use the certificate to secure a web application
  • 5.3 Use OAuth2+ to obtain an authentication token
  • 5.4 Use a secret management system to secure an application
  • 5.5 Use tokens, headers, and secrets to secure a REST API