Lesson 1SNMP deep dive: versions v1/v2c/v3, MIBs, OIDs, walk/get/bulk, traps and informsGo deep into SNMP for watching and some control. Compare SNMP versions, know MIBs and OIDs, use walk, get, and bulk actions, and set up traps and informs in a safe way for better network monitoring.
SNMP v1, v2c, and v3 security differencesMIB structure, OID naming, and browsingUsing get, get-next, walk, and bulkgetConfiguring traps and informs on devicesScaling SNMP polling and rate controlLesson 2Infrastructure automation tools: Ansible networking modules, module vs. connection plugins, idempotence and playbook patternsUnderstand how infrastructure automation tools handle network devices. You will work with Ansible networking modules and connection plugins, use idempotent ways, and arrange playbooks for safe, growing configuration changes in real setups.
Network inventory and host variable designNetwork-specific connection plugins overviewIdempotent configuration patterns in playbooksValidating changes with check and diff modesError handling and rollback strategiesLesson 3Choosing protocols for mixed-vendor environments: trade-offs (read-only vs config), security, performance, vendor supportLearn to choose management protocols in mixed-vendor networks. Compare read-only and setup workflows, security ways, performance effects, and vendor help to build strong, easy-to-keep automation plans for daily use.
Read-only vs configuration change workflowsSecurity models and credential handlingLatency, throughput, and scaling considerationsVendor feature coverage and roadmap riskOperational standardization across vendorsLesson 4SSH fundamentals for network devices: key-based auth, session management, command execution, terminal settingsLook at SSH basics as used by network devices. Learn key-based login, session life, command running models, terminal setups, and security strengthening for automated access in secure environments.
Key generation, storage, and rotationSSH ciphers, MACs, and protocol versionsInteractive shells vs exec channelsTerminal length, paging, and promptsJump hosts, bastions, and proxy commandsLesson 5REST APIs on network gear: common vendor endpoints, authentication (token, basic, OAuth), JSON/XML payloadsLearn how REST APIs are shown on network devices. You will check common endpoints, login methods, JSON or XML data formats, versions, and ways for safe, idempotent setup changes in practical tools.
Resource modeling for interfaces and VLANsToken, basic, and OAuth authenticationJSON request and response payload designError handling and HTTP status mappingAPI versioning and backward compatibilityLesson 6gNMI and streaming telemetry: subscription models, protobuf/JSON encodings, push vs pollDive into gNMI and streaming telemetry for modern watching. Learn subscription ways, protobuf and JSON codes, push versus poll choices, and how to fit telemetry streams into monitoring lines for better insights.
gNMI service model and RPC operationsOn-change, sample, and once subscriptionsProtobuf message schemas and toolingJSON encoding and translation to metricsScaling collectors and buffering strategiesLesson 7Network automation libraries: Netmiko, Paramiko, Napalm, PyATS/Genie — capabilities, drivers, limitationsLook at Python network automation libraries and their choices. Compare Netmiko, Paramiko, Napalm, and PyATS or Genie in terms of skills, drivers, simple ideas, testing help, and work limits for real projects.
Paramiko SSH primitives and channelsNetmiko device drivers and send_commandNapalm getters and configuration mergePyATS and Genie parsing and testingLibrary selection and interoperabilityLesson 8Debugging and testing connections: connectivity checks, timeouts, retries, logging best practicesLook at useful ways to check and fix network connections. You will plan connectivity checks, adjust timeouts and retries, arrange logs, and build repeatable test flows for automated and hand operations in networks.
Designing health and connectivity checksTimeout tuning and retry backoff strategiesStructured logging and correlation IDsCapturing and analyzing protocol tracesBuilding repeatable connection test playbooksLesson 9NETCONF and YANG: RPC model, capabilities, data modeling with YANG, XML/JSON encodingsStudy NETCONF and YANG as main standards for network programming. You will learn the RPC model, skill talks, YANG data planning, and XML or JSON codes used for setup and state handling in systems.
NETCONF sessions, locks, and RPC workflowCapability discovery and server feature setsYANG modules, trees, and data typesXML and JSON encodings for YANG dataModel-driven configuration workflowsLesson 10Vendor-specific programmatic interfaces: Cisco IOS-XE/IOS-XR/JunOS RESTCONF, Arista eAPI, Fortinet/Checkpoint APIsCheck vendor-specific APIs that add to standard ones. Compare Cisco, Juniper, Arista, Fortinet, and Check Point offers, focusing on login, data plans, rate limits, and fitting ways for smooth integration.
Cisco IOS-XE and IOS-XR RESTCONF usageJunOS REST APIs and JSON data modelsArista eAPI transport and command formatsFortinet and Check Point firewall APIsHandling rate limits and vendor quirks