Developing Applications using Cisco Core Platforms and APIs (DEVCOR 300-901)
Developing Applications using Cisco Core Platforms and APIs v1.0 (DEVCOR 300-901) is a core course associated with the DevNet Professional Certification. This course provides the student with knowledge of software development and design including using APIs, Cisco platforms, application deployment and security, and infrastructure and automation. This course, Developing Applications using Cisco Core Platforms and APIs helps candidates to prepare for the DEVCOR 300-901 certification exam.
The DevNet certification program validates the skills of software developers, DevOps engineers, automation specialists, and other software professionals. The program certifies key emerging technical skills for a new kind of IT professional, empowering organizations to embrace the potential of applications, automation, and infrastructure for the network, IoT, DevOps, and Cloud.
This course focuses on your knowledge of software development and design including using APIs, Cisco platforms, application deployment and security, and infrastructure and automation. The core exam earns a specialist certification, so you get recognized for your accomplishments along the way.
Developing Applications using Cisco Core Platforms and APIs v1.0 (DEVCOR 300-901) is a core course associated with the DevNet Professional Certification. This course provides the student with knowledge of software development and design including using APIs, Cisco platforms, application deployment and security, and infrastructure and automation. This course, Developing Applications using Cisco Core Platforms and APIs helps candidates to prepare for the DEVCORE certification exam.
- Understanding and using APIs
- Cisco platforms and development
- Application development and security
- Infrastructure and automation
1.0 Software Development and Design1.1 Describe distributed applications related to the concepts of front-end, back-end, and load balancing 1.2 Evaluate an application design considering scalability and modularity 1.3 Evaluate an application design considering high-availability and resiliency (including on-premises, hybrid, and cloud) 1.4 Evaluate an application design considering latency and rate limiting 1.5 Evaluate an application design and implementation considering maintainability 1.6 Evaluate an application design and implementation considering observability 1.7 Diagnose problems with an application given logs related to an event 1.8 Evaluate choice of database types with respect to application requirements (such as relational, document, graph, columnar, and Time Series) 1.9 Explain architectural patterns (monolithic, services oriented, microservices, and event driven) 1.10 Utilize advanced version control operations with Git
- 1.10.a Merge a branch
- 1.10.b Resolve conflicts
- 1.10.c git reset
- 1.10.d git checkout
- 1.10.e git revert
2.0 Using APIs2.1 Implement robust REST API error handling for time outs and rate limits 2.2 Implement control flow of consumer code for unrecoverable REST API errors 2.3 Identify ways to optimize API usage through HTTP cache controls 2.4 Construct an application that consumes a REST API that supports pagination 2.5 Describe the steps in the OAuth2 three-legged authorization code grant flow
3.0 Cisco Platforms3.1 Construct API requests to implement chatops with Webex Teams API 3.2 Construct API requests to create and delete objects using Firepower device management (FDM) 3.3 Construct API requests using the Meraki platform to accomplish these tasks
- 3.3.a Use Meraki Dashboard APIs to enable an SSID
- 3.3.b Use Meraki location APIs to retrieve location data
4.0 Application Deployment and Security4.1 Diagnose a CI/CD pipeline failure (such as missing dependency, incompatible versions of components, and failed tests) 4.2 Integrate an application into a prebuilt CD environment leveraging Docker and Kubernetes 4.3 Describe the benefits of continuous testing and static code analysis in a CI pipeline 4.4 Utilize Docker to containerize an application 4.5 Describe the tenets of the “12-factor app” 4.6 Describe an effective logging strategy for an application 4.7 Explain data privacy concerns related to storage and transmission of data 4.8 Identify the secret storage approach relevant to a given scenario 4.9 Configure application specific SSL certificates 4.10 Implement mitigation strategies for OWASP threats (such as XSS, CSRF, and SQL injection) 4.11 Describe how end-to-end encryption principles apply to APIs
5.0 Infrastructure and Automation5.1 Explain considerations of model-driven telemetry (including data consumption and data storage) 5.2 Utilize RESTCONF to configure a network device including interfaces, static routes, and VLANs (IOS XE only) 5.3 Construct a workflow to configure network parameters with:
- 5.3.a Ansible playbook
- 5.3.b Puppet manifest
- Instructor led online training is an ideal vehicle for delivering training to individuals anywhere in the world at any time.
- This innovative approach presents live content with instructor delivering the training online.
- Candidates will be performing labs remotely on our labs on cloud in presence of an online instructor.
- Rstforum uses microsoft lync engine to deliver instructor led online training.
- Advances in computer network technology, improvements in bandwidth, interactions, chat and conferencing, and realtime audio and video offers unparalleled training opportunities.
- Instructor led online training can helps today’s busy professionals to perform their jobs and upgrade knowledge by integrating self-paced instructor led online training in their daily routines.
Labs on cloud