Companies Home Search Profile

CCIE DevNet Expert (v1.0) - Technical Classes

Focused View

Ratnesh K - 45,000+ Students Worldwide

8:10:22

176 View
  • 1 - Welcome.mp4
    00:24
  • 2 - CCIE Prep Pre Videos.mp4
    01:17
  • 3 - CCNP Encor Understand the Change.mp4
    11:08
  • 4 - Hire the talent CCNA to CCIE Journey.mp4
    10:02
  • 5 - Market Expectation.mp4
    06:49
  • 6 - market expectation Continue.mp4
    06:03
  • 7 - CCIE New Format.mp4
    06:18
  • 8 - Section 11 till 13 Starts.mp4
    02:27
  • 9 - The concepts of frontend backend and load balancing.mp4
    08:21
  • 10 - NSXT Load Balancer.mp4
    07:20
  • 11 - Application design considering scalability and modularity.mp4
    06:27
  • 12 - ACI Object Model.mp4
    07:49
  • 13 - Evaluate an application design considering high availability and resiliency.mp4
    11:23
  • 14 - Application design considering latency and rate limiting.mp4
    12:17
  • 15 - Application design and implementation considering maintainability.mp4
    08:37
  • 16 - Evaluate an application design and implementation considering observability.mp4
    08:34
  • 17 - Problems with an application given logs related to an event.mp4
    00:28
  • 18 - Architectural patters monolithic service-oriented.mp4
    10:02
  • 19 - Microservices & Event-Driven Architecture EDA.mp4
    10:15
  • 20 - Section 14 Starts.mp4
    00:44
  • 21 - Introduction to GIT.mp4
    06:39
  • 22 - Lab using GNS3.mp4
    09:18
  • 23 - Git Lab.mp4
    04:39
  • 24 - Git Architecture & GitHub.mp4
    05:09
  • 25 - Describe the concept of DevSecOps CICD Pipeline.mp4
    08:43
  • 26 - CICD Pipeline Lab task 01.mp4
    06:07
  • 27 - 25 CICD Pipeline Lab task 02.mp4
    06:20
  • 28 - 25 CICD Pipeline Lab Failed Scenario.mp4
    06:01
  • 29 - Section 20 Starts.mp4
    02:53
  • 30 - API Part 1.mp4
    07:14
  • 31 - API Part 2 REST API.mp4
    08:55
  • 32 - DNACAPI01.mp4
    05:57
  • 33 - DNACAPI02.mp4
    05:10
  • 34 - DNAC First API Lab Get Token.mp4
    11:38
  • 35 - DNAC Site APIs.mp4
    16:54
  • 36 - Section 23 Starts.mp4
    01:15
  • 37 - SDWAN Setting Lab via Automation tool.mp4
    07:11
  • 38 - SDWAN Lab Topology quick review.mp4
    05:44
  • 39 - SDWAN Use of Automation Script.mp4
    14:47
  • 40 - Section 22 DNAC APP example.mp4
    05:06
  • 41 - Section 25 27 Starts.mp4
    00:42
  • 42 - Data Models.mp4
    04:31
  • 43 - Yet Another Next Generation YANG.mp4
    06:04
  • 44 - Restconf.mp4
    06:46
  • 45 - Utilize RESTCONF to configure a network device including interfaces static rout.mp4
    11:33
  • 46 - Netconf Lab setup.mp4
    07:00
  • 47 - Construct a Python script using NETCONF with YDK.mp4
    12:07
  • 48 - xPath Filter option.mp4
    05:19
  • 49 - Section 28 Starts.mp4
    01:03
  • 50 - Ansible Basics using Ansible configure IOSXE.mp4
    06:50
  • 51 - Install Ansible Centos.mp4
    05:29
  • 52 - Ansible IOSXE Lab.mp4
    09:45
  • 53 - Section 28 rest of videos.mp4
    00:27
  • 54 - Enable NXAPI via Python.mp4
    08:22
  • 55 - Ansible create VLAN.mp4
    04:47
  • 56 - Conditions Add description over Interfaces.mp4
    14:43
  • 57 - Loops to assign IP over VLAN interfaces.mp4
    14:27
  • 58 - Nexus NETCONF Lab.mp4
    06:27
  • 59 - Section 210 Starts.mp4
    01:12
  • 60 - 1 NSO What is NSO.mp4
    07:14
  • 61 - NSO Components.mp4
    03:29
  • 62 - NSO Installation Process.mp4
    03:37
  • 63 - NSO Configuration.mp4
    05:43
  • 64 - NSO Install and load CiscoIOS NED.mp4
    07:38
  • 65 - NSO ADD Device to NSO.mp4
    02:44
  • 66 - NSO Create Auth group.mp4
    07:57
  • 67 - NSO Syslog.mp4
    05:53
  • 68 - NSO Netsim Example.mp4
    06:24
  • 69 - NSO L3VPN lab Part 01.mp4
    17:16
  • 70 - NSO L3VPN lab Part 02.mp4
    12:28
  • Description


    With Ratnesh K 2xCCIE #61380

    What You'll Learn?


    • Software Design, Development, and Deployment
    • Infrastructure as Code
    • Network Programmability and Automation
    • Create a Docker image (including Dockerfile)
    • Security Automation

    Who is this for?


  • Security engineers
  • Network administrators
  • Senior network automation engineer
  • Consulting systems engineers
  • Technical solutions architect
  • More details


    Description

    About The Certification


    Achieving Cisco Certified DevNet Expert certification validates your expert knowledge and proficiency in network automation, programmability, and secure automation tools.


    To earn Cisco Certified DevNet Expert certification, you pass two exams: a qualifying exam that covers core software and automation development and design for Cisco platforms as well as a hands-on lab exam that covers software-driven network automation solutions through the entire network lifecycle, from designing and deploying to operating and optimizing.


    Steps To CCIE DevNet Certification


    To earn CCIE DevtNet, you pass two exams: a qualifying exam and hands-on lab exam:

    Step 1: For Qualifying exam, pass the below recommended training and exam:

    1. Developing Applications using Cisco Core Platforms and APIs (350-901 DEVCOR)


    Step 2: Pass the Lab exam:

    1. DevNet Expert-level lab (8-hour lab)


    Topics :

    1.1 Design a solution based on an on-premises, hybrid, or public cloud deployment,considering these factors:

    1.1.a Deployment: maintainability, modularity (e.g., containers, VM, orchestration, automation, components, and infrastructure requirements)

    1.1.b Reliability: high availability and resiliency

    1.1.c Performance: scalability, latency, and rate limiting

    1.1.d Infrastructure: monitoring, observability, and metrics (e.g., instrument placement and instrument deployment)

    1.2 Recommend a deployment strategy to mitigate risk and impact on service availability, for a given scenario

    1.3 Modify an existing network automation solution based on business and technical requirements (includes gap analysis)

    1.4 Use Git in a CI/CD development workflow

    1.5 Troubleshoot issues with a CI/CD pipeline (e.g., code-based failures, pipeline issues, and tool incompatibility)


    2.1 Create a scalable solution for infrastructure automation (considering areas such as network impact, risk, and tool selection)

    2.2 Build, manage, and operate a Python-based REST API with a web application framework (endpoints, HTTP request, and response)

    2.3 Build, manage, and operate a Python-based CLI application to use a REST API

    2.4 Consume and use a new REST API, given the documentation

    2.5 Create a RESTCONF or NETCONF payload based on a given YANG module, and interpret the response

    2.6 Create a NETCONF filter by using XPath

    2.7 Configure network devices on an existing infrastructure by using NETCONF or RESTCONF, given YANG analysis tools

    2.8 Create and use a role by utilizing Ansible to manage infrastructure, given support documentation

    2.8.a Loop control

    2.8.b Conditionals

    2.8.c Use of variables and templating

    2.8.d Use of connection plug-ins such as network CLI, HTTPAPI, and NETCONF


    3.1 Create, modify, and troubleshoot scripts by using Python libraries and SDK documentation to automate against APIs (ACI, AppDynamics, DNA Center, FDM, Intersight, IOS XE, Meraki, NSO, Webex)

    3.2 Automate the configuration of a Cisco IOS XE network device (based on a provided architecture and configuration), including these components:

    3.2.a Interfaces

    3.2.b Static routes

    3.2.c VLANs

    3.2.d Access control lists

    3.2.e BGP peering

    3.2.f BGP and OSPF routing tables

    3.2.g BGP and OSPF neighbors

    3.3 Deploy an application on a Cisco IOS XE device by leveraging the technologies of Guest Shell and application hosting

    3.4 Modify and troubleshoot an automated test by using pyATS to meet requirements

    3.4.a Create a testbed file for connecting to Cisco IOS, IOS XE, or NX-OS devices

    3.4.b Gather current configuration and operational state from devices using the Genie parsers and models included with pyATS

    3.4.c Develop and execute test jobs and scripts using AEtest to verify network health

    3.5 Design a model-driven telemetry solution based on given business and technical requirements by using gNMI dial-in, gRPC dial-out, and NETCONF dial-in

    3.6 Create YANG model-driven telemetry subscriptions

    3.6.a Identify model elements and cadence

    3.6.b On-change or event drive

    3.6.c Optimize frequency

    3.6.d Dial-out subscription

    3.6.e Secure telemetry streams

    3.6.f Confirm data transmission

    3.6.g Identify network issues and make changes


    4.1 Create a Docker image (including Dockerfile)

    4.1.a From a provided image

    4.1.b Expose ports

    4.1.c Add or copy files

    4.1.d Run commands during image build

    4.1.e Manipulate entry point and initial commands

    4.1.f Establish working directories

    4.1.g Environment variables as part of a definition to control an application

    4.1.h Docker ignore file

    4.1.i Volumes


    4.2 Package and deploy a solution by using Docker Compose

    4.2.a Deploy and manage containers

    4.2.b Define services, networks, volumes, and links


    4.3 Package and deploy a solution by using Kubernetes

    4.3.a Use deployments, secrets, services, ingress, volumes, namespaces, and replicas

    4.3.b Manage the lifecycle of pods (e.g., scale up, scale down, help status, logs)

    4.3.c Monitor pods by building health checks)

    4.3.d Use the kubectl interface

    4.4 Create, consume, and troubleshoot a Docker host and bridge-based networks and integrate them with external networks


    5.1 Leverage OWASP secure coding practices into all solutions to meet given requirements

    5.1.a Input validation

    5.1.b Authentication and password management

    5.1.c Access control

    5.1.d Cryptographic practices

    5.1.e Error handling and logging

    5.1.f Communication security

    5.2 Create a certificate signing request (CSR) by using OpenSSL; send CSR to a provided certificate authority; and use the certificate to secure a web application

    5.3 Use OAuth2+ to obtain an authentication token

    5.4 Use a secret management system to secure an application

    5.5 Use tokens, headers, and secrets to secure a REST API


    Who this course is for:

    • Security engineers
    • Network administrators
    • Senior network automation engineer
    • Consulting systems engineers
    • Technical solutions architect

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Ratnesh K - 45,000+ Students Worldwide
    Ratnesh K - 45,000+ Students Worldwide
    Instructor's Courses
    "Small step towards the Knowledge is Big step towards the Success"I am Technical Trainer having 2xCCIE #61380(Data Center & Security )"Knowledge is Power"In this competitive world, we need to be updated with the latest technologies.That's the main reason I am providing online training related to the Latest technologies.With my Videos on the latest technologies, I always try to fill the gap of what is used in Enterprise vs. what type of training is available in the Market.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 70
    • duration 8:10:22
    • Release Date 2022/12/13