Exam Description:
15% | 1.0 | Software Development and Design |
---|---|---|
1.1 | Compare data formats (XML, JSON, and YAML) | |
1.2 | Describe parsing of common data format (XML, JSON, and YAML) to Python data structures | |
1.3 | Describe the concepts of test-driven development | |
1.4 | Compare software development methods (agile, lean, and waterfall) | |
1.5 | Explain the benefits of organizing code into methods / functions, classes, and modules | |
1.6 | Identify the advantages of common design patterns (MVC and Observer) | |
1.7 | Explain the advantages of version control | |
1.8 | Utilize common version control operations with Git 1.8.a Clone 1.8.b Add/remove 1.8.c Commit 1.8.d Push / pull 1.8.e Branch 1.8.f Merge and handling conflicts 1.8.g diff |
|
20% | 2.0 | Understanding and Using APIs |
2.1 | Construct a REST API request to accomplish a task given API documentation | |
2.2 | Describe common usage patterns related to webhooks | |
2.3 | Identify the constraints when consuming APIs | |
2.4 | Explain common HTTP response codes associated with REST APIs | |
2.5 | Troubleshoot a problem given the HTTP response code, request and API documentation | |
2.6 | Identify the parts of an HTTP response (response code, headers, body) | |
2.7 | Utilize common API authentication mechanisms: basic, custom token, and API keys | |
2.8 | Compare common API styles (REST, RPC, synchronous, and asynchronous) | |
2.9 | Construct a Python script that calls a REST API using the requests library | |
15% | 3.0 | Cisco Platforms and Development |
3.1 | Construct a Python script that uses a Cisco SDK given SDK documentation | |
3.2 | Describe the capabilities of Cisco network management platforms and APIs (Meraki, Cisco DNA Center, ACI, Cisco SD-WAN, and NSO) | |
3.3 | Describe the capabilities of Cisco compute management platforms and APIs (UCS Manager, UCS Director, and Intersight) | |
3.4 | Describe the capabilities of Cisco collaboration platforms and APIs (Webex Teams, Webex devices, Cisco Unified Communication Manager including AXL and UDS interfaces, and Finesse) | |
3.5 | Describe the capabilities of Cisco security platforms and APIs (Firepower, Umbrella, AMP, ISE, and ThreatGrid) | |
3.6 | Describe the device level APIs and dynamic interfaces for IOS XE and NX-OS | |
3.7 | Identify the appropriate DevNet resource for a given scenario (Sandbox, Code Exchange, support, forums, Learning Labs, and API documentation) | |
3.8 | Apply concepts of model driven programmability (YANG, RESTCONF, and NETCONF) in a Cisco environment | |
3.9 | Construct code to perform a specific operation based on a set of requirements and given API reference documentation such as these: 3.9.a Obtain a list of network devices by using Meraki, Cisco DNA Center, ACI, Cisco SD-WAN, or NSO 3.9.b Manage spaces, participants, and messages in Webex Teams 3.9.c Obtain a list of clients / hosts seen on a network using Meraki or Cisco DNA Center |
|
15% | 4.0 | Application Deployment and Security |
4.1 | Describe benefits of edge computing | |
4.2 | Identify attributes of different application deployment models (private cloud, public cloud, hybrid cloud, and edge) | |
4.3 | Identify the attributes of these application deployment types 4.3.a Virtual machines 4.3.b Bare metal 4.3.c Containers |
|
4.4 | Describe components for a CI/CD pipeline in application deployments | |
4.5 | Construct a Python unit test | |
4.6 | Interpret contents of a Dockerfile | |
4.7 | Utilize Docker images in local developer environment | |
4.8 | Identify application security issues related to secret protection, encryption (storage and transport), and data handling | |
4.9 | Explain how firewall, DNS, load balancers, and reverse proxy in application deployment | |
4.10 | Describe top OWASP threats (such as XSS, SQL injections, and CSRF) | |
4.11 | Utilize Bash commands (file management, directory navigation, and environmental variables) | |
4.12 | Identify the principles of DevOps practices | |
20% | 5.0 | Infrastructure and Automation |
5.1 | Describe the value of model driven programmability for infrastructure automation | |
5.2 | Compare controller-level to device-level management | |
5.3 | Describe the use and roles of network simulation and test tools (such as VIRL and pyATS) | |
5.4 | Describe the components and benefits of CI/CD pipeline in infrastructure automation | |
5.5 | Describe principles of infrastructure as code | |
5.6 | Describe the capabilities of automation tools such as Ansible, Puppet, Chef, and Cisco NSO | |
5.7 | Identify the workflow being automated by a Python script that uses Cisco APIs including ACI, Meraki, Cisco DNA Center, or RESTCONF | |
5.8 | Identify the workflow being automated by an Ansible playbook (management packages, user management related to services, basic service configuration, and start/stop) | |
5.9 | Identify the workflow being automated by a bash script (such as file management, app install, user management, directory navigation) | |
5.10 | Interpret the results of a RESTCONF or NETCONF query | |
5.11 | Interpret basic YANG models | |
5.12 | Interpret a unified diff | |
5.13 | Describe the principles and benefits of a code review process | |
5.14 | Interpret sequence diagram that includes API calls | |
15% | 6.0 | Network Fundamentals |
6.1 | Describe the purpose and usage of MAC addresses and VLANs | |
6.2 | Describe the purpose and usage of IP addresses, routes, subnet mask / prefix, and gateways | |
6.3 | Describe the function of common networking components (such as switches, routers, firewalls, and load balancers) | |
6.4 | Interpret a basic network topology diagram with elements such as switches, routers, firewalls, load balancers, and port values | |
6.5 | Describe the function of management, data, and control planes in a network device | |
6.6 | Describe the functionality of these IP Services: DHCP, DNS, NAT, SNMP, NTP | |
6.7 | Recognize common protocol port values (such as, SSH, Telnet, HTTP, HTTPS, and NETCONF) | |
6.8 | Identify cause of application connectivity issues (NAT problem, Transport Port blocked, proxy, and VPN) | |
6.9 | Explain the impacts of network constraints on applications |