View
12
Download
0
Category
Preview:
Citation preview
January 19th 2018
The Learning Experience @ Cisco Networking Academy
2© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
1984...
“The real voyage of discovery consists not in seeking new landscapes, but in having new eyes” Proust
To look with new eyes…
“the world’s biggest problems are the world’s biggest markets.”
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
7.26.8 7.6
Rapid Adoption rate of digital infrastructure:
5X faster than electricity and telephony
500Billion“Smart Objects”2025
50
2010 2015 2020
0
40
30
20
10
Bill
ions o
f devic
es
25
12.5
Inflectionpoint
Timeline
Source: Cisco IBSG,
Lightbulb or…. Sensor-Platform?
“Companies become Digital Platforms”
11© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
About prediction
About Prediction
12© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
13© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
An analogy: IOT versus music
Master the technique
for the instrument.
Know everything and
be able to address any
situation with the
instrument.
Expand to few other
instruments.
Know the music theory
and how to play the
notes on the instrument
14© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
15© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
16© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
When the machine take care of repetitive, error prone tasks, you have time to put creativity at work.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Connected
Plant
Connected
Baby
Connected
Home
Connected
Fish PondConnect Care
Connected Toothbrush Barcelona Connected Cows
MANUFACTURING SMART CITIES AGRICULTURE
Create your own IoT project and Connect the Unconnected
Global INsecurity
Industrialisation of Hacking - $1T
Request
of Ransom
Encryption
of Files
C2 Comms &
Asymmetric Key
Exchange
Typical Ransomware Infection
Problem: Customers can be taken hostage by malware that locks up critical resources
Infection
Vector
Ransomware
frequently uses
web and email
Ransomware takes control
of targeted systems
Ransomware holds those
systems ‘hostage’
Owner/company agrees to
pay the ‘ransom’ (bitcoins)
to free the system
Privacy
24© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CISCO NETWORKING ACADEMY. 20 Years of Changing Worlds.
CISCO NETWORKING ACMY. 20 Years of Changing Worlds.
Since it’s founding 20 years ago, Cisco Networking Academy has had a world-changing impact.
On the lives and career prospects of its students.
On the Cisco employees, educators and academies
who support it.
On the businesses who hire and promote our students.
On the local communities and economies they drive
with their innovations and ambition.
On the world at large.
27© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Skills-to-Jobs Learning Experience
Simulations HackathonsSupports Personalized
InstructionHands-On
What Students Learn
• Networking
• Security and Cybersecurity
• IoT
• Programming
• Linux and General IT
How Students Learn
• Learning by doing
• Problem-solving
• Project-based learning
• Initiative and leadership
• Real-world experiences
How Students Think
• Customer-centric mindset
• Critical thinking
• Personal and social responsibility
• Business context
Courses in
20+ LanguagesFlexible Delivery
28© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Networking Academy Learning PortfolioCollaborate for Impact
* Available within 12 months
November 2017
Aligns to Certification
Mobility Fundamentals
CCNA R&S: Introduction to Networks, R&S
Essentials, Scaling Networks, Connecting
Networks
CCNP R&S: Switch, Route, TShoot
Introduction to Cybersecurity
Introduction to IoT
CCNA SecurityCybersecurity Essentials
CCNA Cyber Ops*
Exploratory Foundational Career-Ready
Networking Essentials
Networking
Security
IoT & Analytics
Be Your Own Boss EntrepreneurshipBusiness
Get ConnectedDigital Literacy
NDG Linux UnhatchedNDG Linux Essentials
IT Essentials
Programming
OS & IT
CLP: Advanced Programming in C*
CPP: Advanced Programming in C++
NDG Linux II
Current & Planned
CLA: Programming Essentials in C
CPA: Programming Essentials in C++
NDG Linux I
Emerging Tech Workshop: Experimenting
with REST APIs Using Cisco Spark*
IoT Fundamentals:
Connecting Things, Big Data & Analytics
Hackathon Playbook, IoT Security*
Emerging Tech Workshop: Network
Programmability Using Cisco APIC-EM*
Self-paced
PCA: Programming Essentials in Python*
InternshipsPrototyping LabHackathonsPacket
Tracer
Introduction to
Packet Tracer
• Cloud and distributed computing
• Statistical analysis and data mining
• Mobile development
• Network and information security
• Middleware and integration software
• User interface design
• Algorithm design
• Java development
• Web architecture and development frameworks
LinkedIn's Top 25 Most In-Demand Career Skills
30© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
July 2017
31© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Program:09h15 – 9h30 Accueil
09h30 – Introduction à la journée de travail
1130 – 12h00 Cisco demonstation
SESSIONS
A – Session pour tous les participants
11h00 – 12h00 Nouveaux cours et formations offerts par Cisco Networking
Academy
Repas de midi offert au restaurant Cisco
B – Session pour instructeurs CCNA expérimentés
13h00 – 17h00 Workshop technologies émergentes : SDN (Software Defined
Networking), Devnet & Python
32© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Recommended