The Learning Experience @ Cisco Networking Academy · The Networking Academy Learning Portfolio...

32
23 November 2017 The Learning Experience @ Cisco Networking Academy

Transcript of The Learning Experience @ Cisco Networking Academy · The Networking Academy Learning Portfolio...

23 November 2017

The Learning Experience @ Cisco Networking Academy

• Networking Academy Program, Rik

• Cisco trends, Franc

• Academy programma's en leerpaden secundair onderwijs en CVO's, Joeri

• Nieuwe ontwikkeligen hoger onderwijs, Joeri, Yvan

• Opleidingsaanbod Oracla, Yvan

• Aanbod van CompTIA, Hans

• Waar informatie omtrent voorwaarden, ondersteuning en opleidingen, Yvan

• Mogelijkheden handboeken en uitgevers, Brinckman, Kenan

Programma:

3© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

CISCO NETWORKING ACADEMY. 20 Years of Changing Worlds.

Microsoft

acquires

Hotmail

Netflix

is

established

Amazon

books

rapidly

growingGoogle.com

domain

registered

Ebayname is

born

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

6© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

The Skills-to-Jobs Learning Experience

Simulations HackathonsSupports Personalized

InstructionHands-On

What Students Learn

• Networking

• Security and Cybersecurity

• IoT

• Programming

• Linux and General IT

How Students Learn

• Learning by doing

• Problem-solving

• Project-based learning

• Initiative and leadership

• Real-world experiences

How Students Think

• Customer-centric mindset

• Critical thinking

• Personal and social responsibility

• Business context

Courses in

20+ LanguagesFlexible Delivery

7© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

The Networking Academy Learning PortfolioCollaborate for Impact

* Available within 12 months

November 2017

Aligns to Certification

Mobility Fundamentals

CCNA R&S: Introduction to Networks, R&S

Essentials, Scaling Networks, Connecting

Networks

CCNP R&S: Switch, Route, TShoot

Introduction to Cybersecurity

Introduction to IoT

CCNA SecurityCybersecurity Essentials

CCNA Cyber Ops*

Exploratory Foundational Career-Ready

Networking Essentials

Networking

Security

IoT & Analytics

Be Your Own Boss EntrepreneurshipBusiness

Get ConnectedDigital Literacy

NDG Linux UnhatchedNDG Linux Essentials

IT Essentials

Programming

OS & IT

CLP: Advanced Programming in C*

CPP: Advanced Programming in C++

NDG Linux II

Current & Planned

CLA: Programming Essentials in C

CPA: Programming Essentials in C++

NDG Linux I

Emerging Tech Workshop: Experimenting

with REST APIs Using Cisco Spark*

IoT Fundamentals:

Connecting Things, Big Data & Analytics

Hackathon Playbook, IoT Security*

Emerging Tech Workshop: Network

Programmability Using Cisco APIC-EM*

Self-paced

PCA: Programming Essentials in Python*

InternshipsPrototyping LabHackathonsPacket

Tracer

Introduction to

Packet Tracer

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

About Talent Bridge

Networking Academy Talent Bridge connects Cisco and

partner employers with world-class NetAcad talent for

the digital economy workforce of the future.

Our new Matching Engine

automates and systematizes

the linkage between supply

and demand to accelerate hiring

Offers qualified candidates

employment connections based

on achievement, geographic

location, and job roles

NetAcad candidates

are best suited for

entry-level job roles

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

that automates

your ability to identify,

based on job requirements

Search for candidates

around the world based on

Post your open entry-level positions within

the tool, then quickly access

and contact qualified candidates in real time. The

,

accelerating your hiring process

10© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11

7.26.8 7.6

Rapid Adoption rate of digital infrastructure:

5X faster than electricity and telephony

500Billion“Smart Objects”2025

50

2010 2015 2020

0

40

30

20

10

Bill

ions o

f devic

es

25

12.5

Inflectionpoint

Timeline

Source: Cisco IBSG,

12© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

About prediction

About Prediction

16© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

About prediction

About Prediction

17© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

18© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

19© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

An analogy: IOT versus music

Master the technique

for the instrument.

Know everything and

be able to address any

situation with the

instrument.

Expand to few other

instruments.

Know the music theory

and how to play the

notes on the instrument

20© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

21© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

22© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

When the machine take care of repetitive, error prone tasks, you have time to put creativity at work.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23

Connected

Plant

Connected

Baby

Connected

Home

Connected

Fish PondConnect Care

Connected Toothbrush Barcelona Connected Cows

MANUFACTURING SMART CITIES AGRICULTURE

Create your own IoT project and Connect the Unconnected

Global INsecurity

Industrialisation of Hacking - $1T

Request

of Ransom

Encryption

of Files

C2 Comms &

Asymmetric Key

Exchange

Typical Ransomware Infection

Problem: Customers can be taken hostage by malware that locks up critical resources

Infection

Vector

Ransomware

frequently uses

web and email

Ransomware takes control

of targeted systems

Ransomware holds those

systems ‘hostage’

Owner/company agrees to

pay the ‘ransom’ (bitcoins)

to free the system

Privacy

30© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

31© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

32© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential