Cisco - Certified DevNet Professional

Varaktighet

Varaktighet:

Bara 4 dagar

Metod

Metod:

Klassrum / Uppkopplad / Hybrid

Nästa datum

Nästa datum:

24/6/2024 (Måndag)

Overview

On this accelerated Cisco Certified DevNet Professional the first-of-its-kind at Cisco, the DevNet certification program validates the skills of professional-level software developers, DevOps engineers, automation specialists, and other software professionals. The program certifies key emerging technical skills for a new kind of IT professional, empowering organizations to embrace the potential of applications, automation, and infrastructure for the network, Internet of Things (IoT), DevOps, and Webex.

Whether you’re a software developer, networking professional, or some of both, DevNet certifications give you the know-how you need and industry recognition that translates into jobs and possibilities. With DevNet training and certifications, you can master the art of designing applications that leverage Cisco platforms—all the way from designing, implementing, and running the infrastructure, to writing the code that brings that infrastructure to life.

In just 4 days, you’ll learn to harness the power of Cisco technology in your applications and user experiences. You’ll also learn how to:

  • Build your career with Cisco by certifying your in-demand software and networking automation skills
  • Build your business with Cisco no matter how technology evolves
  • Join the Cisco ecosystem of innovation and set yourself apart from other developers and networkers

At the end of this course, you’ll sit the Cisco exam, and achieve your Certified DevNet Professional certification.

Through Firebrand’s Lecture | Lab | Review methodology, you’ll get certified at twice the speed of the traditional training and get access to courseware, learn from certified instructors, and train in a distraction-free environment.

Audience

This course is ideal for:

  • Developers who have at least three to five years of experience designing and implementing applications.

Sju anledningar till varför du bör välja din kurs med Firebrand Training

  1. Två utbildningsalternativ. Välj mellan boende på plats med klassrumsundervisning eller onlinekurser
  2. Du blir certifierad snabbt. Hos oss blir du utbildad rekordsnabbt
  3. Vår kurs är heltäckande. En engångsavgift täcker alla kursmaterial, examina**, boende* och måltider*. Inga dolda extra kostnader.
  4. Godkänn första gången eller träna om gratis. Detta är vår garanti. Vi är övertygade om att du kommer klara kursen på första försöket. Men om inte, kom tillbaka inom ett år och betala endast för boende, examina och tillkommande kostnader
  5. Du kommer lära dig mer. En dag med en traditionell utbildningsleverantör brukar generellt pågå från kl. 9 till 17, med en lång paus för lunch. Med Firebrand Training får du minst 12 timmar/dag av kvalitativ inlärningstid med din instruktör
  6. Du kommer lära dig snabbare. Sannolikheten är att du har en annan inlärningsstil än de omkring dig. Vi kombinerar visuella, auditiva och taktila stilar för att leverera materialet på ett sätt som säkerställer att du lär dig snabbare och enklare
  7. Du kommer studera med de bästa. Vi har varit med på Training Industrys lista "Top 20 IT Training Companies of the Year" varje år sedan 2010. Förutom många fler utmärkelser har vi utbildat och certifierat över 100 000 yrkesverksamma
  • * Endast för boende på plats. Gäller inte för onlinekurser
  • ** Vissa undantag gäller. Vänligen se Exam Track eller prata med våra experter

Curriculum

Module 1: Fundamentals 20%

  • Interpret the components within a playbook
  • Determine the tools needed based on a playbook scenario
  • Apply the playbook for a common scenario (for example, unauthorized elevation of privilege, DoS and DDoS, website defacement)
  • Infer the industry for various compliance standards (for example, PCI, FISMA, FedRAMP, SOC, SOX, PCI, GDPR, Data Privacy, and ISO 27101)
  • Describe the concepts and limitations of cyber risk insurance
  • Analyse elements of a risk analysis (combination asset, vulnerability, and threat)
  • Apply the incident response workflow
  • Describe characteristics and areas of improvement using common incident response metrics
  • Describe types of cloud environments (for example, IaaS platform)
  • Compare security operations considerations of cloud platforms (for example, IaaS, PaaS)

Module 2: Techniques 30%

  • Recommend data analytic techniques to meet specific needs or answer specific questions
  • Describe the use of hardening machine images for deployment
  • Describe the process of evaluating the security posture of an asset
  • Evaluate the security controls of an environment, diagnose gaps, and recommend improvement
  • Determine resources for industry standards and recommendations for hardening of systems
  • Determine patching recommendations, given a scenario
  • Recommend services to disable, given a scenario
  • Apply segmentation to a network
  • Utilize network controls for network hardening
  • Determine SecDevOps recommendations (implications)
  • Describe use and concepts related to using a Threat Intelligence Platform (TIP) to automate intelligence
  • Apply threat intelligence using tools
  • Apply the concepts of data loss, data leakage, data in motion, data in use, and data at rest based on common standards
  • Describe the different mechanisms to detect and enforce data loss prevention techniques
  • Host-based
  • Network-based
  • Application-based
  • Cloud-based
  • Recommend tuning or adapting devices and software across rules, filters, and policies
  • Describe the concepts of security data management
  • Describe use and concepts of tools for security data analytics
  • Recommend workflow from the described issue through escalation and the automation needed for resolution
  • Apply dashboard data to communicate with technical, leadership, or executive stakeholders
  • Analyse anomalous user and entity behaviour (UEBA)
  • Determine the next action based on user behaviour alerts
  • Describe tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools)
  • Evaluate artifacts and streams in a packet capture file
  • Troubleshoot existing detection rules
  • Determine the tactics, techniques, and procedures (TTPs) from an attack
  • Module 3: Processes 30%

    • Prioritize components in a threat model
    • Determine the steps to investigate the common types of cases
    • Apply the concepts and sequence of steps in the malware analysis process:
    • Extract and identify samples for analysis (for example, from packet capture or packet analysis tools)
    • Perform reverse engineering
    • Perform dynamic malware analysis using a sandbox environment
    • Identify the need for additional static malware analysis
    • Perform static malware analysis
    • Summarize and share results
    • Interpret the sequence of events during an attack based on analysis of traffic patterns
    • Determine the steps to investigate potential endpoint intrusion across a variety of platform types (for example, desktop, laptop, IoT, mobile devices)
    • Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs), given a scenario
    • Determine IOCs in a sandbox environment (includes generating complex indicators)
    • Determine the steps to investigate potential data loss from a variety of vectors of modality (for example, cloud, endpoint, server, databases, application), given a scenario
    • Recommend the general mitigation steps to address vulnerability issues
    • Recommend the next steps for vulnerability triage and risk analysis using industry scoring systems (for example, CVSS) and other techniques

    Module 4: Automation 20%

    • Compare concepts, platforms, and mechanisms of orchestration and automation
    • Interpret basic scripts (for example, Python)
    • Modify a provided script to automate a security operations task
    • Recognize common data formats (for example, JSON, HTML, CSV, XML)
    • Determine opportunities for automation and orchestration
    • Determine the constraints when consuming APIs (for example, rate limited, timeouts, and payload)
    • Explain the common HTTP response codes associated with REST APIs
    • Evaluate the parts of an HTTP response (response code, headers, body)
    • Interpret API authentication mechanisms: basic, custom token, and API keys
    • Utilize Bash commands (file management, directory navigation, and environmental variables)
    • Describe components of a CI/CD pipeline
    • Apply the principles of DevOps practices
    • Describe the principles of Infrastructure as Cod

    Exam Track

    At the end of this accelerated course, you’ll sit the following exam at the Firebrand Training centre, covered by your Certification Guarantee:

    Cisco Certified DevNet Professional

    To earn DevNet Professional, you pass two exams, a core exam and a concentration exam of your choice:

    The core exam focuses on your knowledge of software development and design including using APIs, Cisco platforms, application deployment and security, and infrastructure and automation. The core exam earns a specialist certification, so you get recognized for your accomplishments along the way. Concentration exams focus on emerging and industry-specific topics such as enterprise automation, collaboration automation, data center automation, service provider automation, security automation, DevOps automation, IoT, and Cloud.

    Cisco Certified DevNet Professional

    • Duration: 120 minutes

    What's Included

    Prerequisites

    Before attending this accelerated course, you should have:

    • You should have a good understanding of the exam topics before taking the exam.
    • Ideally, DevNet Professional candidates will also have three to five years of experience with software development including Python programming.

    Är du redo för din Firebrand kurs?

    Vi intervjuar alla potentiella deltagare om deras bakgrund, utbildning, certifiering och personliga inställning. Om du kommer igenom denna process så har du riktigt goda möjligheter att klara din certifiering.

    Firebrand Training erbjuder en ambitiös utbildningsmiljö som förutsätter att du verkligen dedikerar dig till kursen. Ovanstående förkunskaper är endast vägledande, många deltagare med mindre erfarenhet men med en annan bakgrund eller kunskap har framgångsrikt genomfört sin utbildning hos Firebrand Training.

    Om du funderar på huruvida du uppfyller rekommenderade förkunskaper vänligen ring oss på (0)8 44 68 27 85 och prata med en av våra utbildningsrådgivare som kan hjälpa dig.

    Kundreferenser

    Här är Firebrand Training recension avsnittet. Sedan 2001 har vi utbildat exakt 134.561 studenter och proffs och bett dem alla att recensera vår Accelerated Learning. För närvarande har, 96,41% sagt att Firebrand överträffade deras förväntningar.

    Läs recensioner från avslutade accelereradekurser nedan eller besök Firebrand Stories för skriftliga och videointervjuer med våra tidigare alumni.


    "Really enjoyed the course. It was thoroughly taught and in depth. Made sure there was plenty of opportunities to ask questions and then spent time explaining the answers to the questions making sure everyone understood the content both online and in person."
    Anonymous. (9/10/2023 (Måndag) till 14/10/2023 (Lördag))

    "Easy to connect and follow on distance. Almost feels like I'm in the classroom. The camera and the sharing screen interacts very well. No matter the exam result. Thank you tutor!"
    IG. (9/10/2023 (Måndag) till 14/10/2023 (Lördag))

    "Great teacher, very knowledgeable in all areas of Networking, his way of instructing is truly unique, explaining things in great details to the enth degree is what you need on a course like the and the tutor exceeded expectations, I would definitely recommend the Firebrand CCNA training to any of my fellow IT colleagues."
    Cameron Tonkin, Semperian. (9/10/2023 (Måndag) till 14/10/2023 (Lördag))

    "The organisation of the course was very professional. The course was well delivered, and included detailed explanation of all topics."
    CF. (9/10/2023 (Måndag) till 14/10/2023 (Lördag))

    "Patient, knowledgeable, humorous and great instructor. It's a long course, but he made it much more manageable with regular breaks, a mix of slides and whiteboards, and real-world examples and analogies."
    JP. (9/10/2023 (Måndag) till 14/10/2023 (Lördag))

    Kursdatum

    Startar

    Slutar

    Tillgänglighet

    Plats

    Registrera

    19/2/2024 (Måndag)

    22/2/2024 (Torsdag)

    Avslutad - Lämna feedback

    -

     

    24/6/2024 (Måndag)

    27/6/2024 (Torsdag)

    Väntelista

    Rikstäckande

     

    5/8/2024 (Måndag)

    8/8/2024 (Torsdag)

    Begränsat antal platser

    Rikstäckande

     

    16/9/2024 (Måndag)

    19/9/2024 (Torsdag)

    Platser tillgängliga

    Rikstäckande

     

    28/10/2024 (Måndag)

    31/10/2024 (Torsdag)

    Platser tillgängliga

    Rikstäckande

     

    9/12/2024 (Måndag)

    12/12/2024 (Torsdag)

    Platser tillgängliga

    Rikstäckande

     

    Senaste recensioner från våra studenter