Cisco

CCNA DevNet Study Guide – Describe parsing of common data format (XML, JSON, YAML) to Python data structures

This is the second post in a series about the new CCNA DevNet certification (Previous Post Here). In this post, we will look at how to manage in Python the three formats that we previously discussed. Example of XML parsing in Python from __future__ import print_function import xml.etree.ElementTree as ET def main(): # create element… Continue reading CCNA DevNet Study Guide – Describe parsing of common data format (XML, JSON, YAML) to Python data structures

Cisco

CCNA DevNet Study Guide – Part 1

I will start a series of posts on the new CCNA DevNet certification. I will keep my SOP of going through the curriculum and google the concepts for you. I will try to include Youtube videos of some of the topics that have more hands-on exercises. The certification name is Cisco Certified DevNet Associate. The… Continue reading CCNA DevNet Study Guide – Part 1

Cisco

CCNA Cyber Ops – 6.0 Attack Methods

This is the last of a series of posts about the CCNA Cyber Ops certification, you can find the fifth part here. 6.1 Compare and contrast an attack surface and vulnerability: The attack surface of a software environment is the sum of the different points (the “attack vectors”) where an unauthorized user (the “attacker”) can… Continue reading CCNA Cyber Ops – 6.0 Attack Methods

Cisco

CCNA Cyber Ops – 5.0 Security Monitoring

This is part five of a series of posts about the CCNA Cyber Ops certification, you can find the fourth part here. This post presents a few concepts used to help us secure our systems. 5.1 Identify the types of data provided by these technologies 5.1.a TCP Dump: a tool that displays network traffic 5.1.b… Continue reading CCNA Cyber Ops – 5.0 Security Monitoring

Cisco

CCNA Cyber Ops – 3.0 Cryptography

This is part three of a series of posts about the CCNA Cyber Ops certification, you can find the second part here. Essentially in this post, we summarize the basic concepts about cryptography, hash, signatures and algorithms. 3.1 Describe the uses of a hash algorithm A hash function is any function that can be used… Continue reading CCNA Cyber Ops – 3.0 Cryptography

Cisco

UCS B-Series Configuration using the UCS SDK and Python

The Cisco UCS B-Series is a powerful system. I admit that it has a little learning curve to it, but in time I’ve learned to appreciate the way it works. The thing is that after a few deployments you wonder, when are the Cisco engineers going to take usability into consideration? Well, luckily there is… Continue reading UCS B-Series Configuration using the UCS SDK and Python

Cisco

CCNA Cyber Ops – 2.0 Security Concepts

This is part two of a series of posts about the CCNA Cyber Ops certification, you can find the first part here. Essentially in this post, we summarize the basic security concepts needed to understand and become competent with this topic. 2.0 Security Concepts 2.1 Describe the principles of the defense in depth strategy: Defense… Continue reading CCNA Cyber Ops – 2.0 Security Concepts