Career in Network Automation: 10 Domains of Knowledge for Network Automation Engineering (Part 2)
In this article, I discuss ten domains of knowledge essential for a career in network automation engineering, i.e. roles such as Network Automation Engineer, Network DevOps (NetDevOps), and NRE.
A deeper look into Network Automation Engineer, the NetDevOps, and NRE roles
We discussed the shifting landscape of the network engineering career earlier and why you must take an action now. In this article, I want to dig deeper into the Network Automation Engineer, the NetDevOps, and NRE roles and double click into the related domains of knowledge or the building blocks. Hang in there. Be right back. So, here is the lay of the land.
In the previous articles, we discussed the ten domains of knowledge that you really need to master to become a network automation expert. OS FUNDAMENTALS is another critical skill you must learn.
The role of Linux
The good news is that pretty much all DevOps tools run on Linux, what am I talking about? The Git, build server, configuration management tools such as Ansible, and the list goes on and on. Linux has multiple distributions, and they are somewhat different when it comes to package managers, the desktop environment, the user-land environment and services, default packages, and so on.
For network automation roles, I would suggest you consider Ubuntu, Debian, and CentOS distributions. As an OPS person, you also need to understand shell scripting like Bash shell, Linux file system, text editors, and manipulation tools such as Vim, grep, awk, head and tail, etc. There are also system performance and process monitoring tools that are worth knowing. Yet another area is Linux networking concepts, commands, and virtualization tools such as KVM hypervisor and Linux containers or LXCs. OS fundamentals are mostly relevant to Network DevOps and NRE roles, and they are only covered in the Cisco DEVASC exam.
SECURITY is yet another knowledge area worth considering if you are looking to be a NetDevOps or NRE. It is about learning application security like how to create secure software, infrastructure security which is about securing infrastructure whether that’s hardware, software, or cloud.
When it comes to the network, security can be implemented in the form of firewalls, IPS, proxies, etc. Understanding commonly used security technologies and protocols such as SSL, or SSL over HTTP, SSH, and things like control plane policing. Understanding the threat landscape is supercritical, at the very least learn everything about the OWASP Top 10 threats which includes threats such as SQL injection, cross-site scripting, insufficient logging, and monitoring. Finally, API security such as an end to end encryption, generation and use of certificates, and oAuth protocol for authorization. Security is applicable to all network automation roles and is referred to in just about all Cisco DevNet Associate and Professional exams.
If you find our content helpful, please help us propagate it to the next person by Liking it or dropping a Comment. Thank you!
Author:Muhammad Afaq Khan, CCIE #9070
0 (0) Today, we live in a world where there is nothing, and I mean nothing, off the limits for cyberattacks and particularly ransomware attacks. Our hospitals, our universities, oil pipelines, and now even our meat is under cyberattack. The cyberattack that flattened the IT operations at JBS Foods over the weekend turns out was […]
0 (0) Ransomware has been a growing menace for years, but there has been a marked increase, during the recent months, in sophistication and level of innovation in this portion of the cybercrime underbelly. If you didn’t know, cybercrime comes in many different types, such as email and internet fraud, identity theft, financial theft like […]
0 (0) It’s time to check your Pulse. I mean your Pulse Connect Secure VPN appliance. Hackers have been exploiting several previously known and one zero-day vulnerabilities affecting Pulse Connect Secure aka PCS VPN appliances. They are targeting defense, government, and financial organizations around the world. According to FireEye, several threat actors have been exploiting […]
5 (1) OK, we now have another supply chain attack that could become the next big hack. When April fools’ jokes were being published online, one company known as Codecov discovered something that was far from a joke. So, who is Codecov? Codecov is one of the many DevOps tools out there. It provides hosted […]
5 (1) So, what is Ethical Hacking? Well, it is hacking ethically. OK, that was not helpful. There are two types of hacking, white hat hacking, black hat hacking. They use similar tools and have similar goals, so then what is the difference. Well, there is one big difference and that has to do with […]