300-915: Developing Solutions using Cisco IoT and Edge Platforms (DEVIOT)

300-915: Developing Solutions using Cisco IoT and Edge Platforms (DEVIOT)

The Developing Solutions Using Cisco IoT & Edge Platforms v1.0 (DEVIOT 300-915) exam is a 90-minute exam that is associated with the Cisco Certified DevNet Professional and Cisco Certified DevNet Specialist - IoT certifications. This exam tests a candidate's IoT application development knowledge as it pertains to Cisco IoT edge compute and network architecture including Cisco IOx and Cisco EFM, IoT Data Visualization, and security methods. The course, Developing Solutions using Cisco IoT & Edge Platforms, helps candidates to prepare for this exam.

This exam tests a candidate's IoT application development knowledge as it pertains to Cisco IoT edge compute and network architecture including Cisco IOx and Cisco EFM, IoT Data Visualization, and security methods.

300-915: Developing Solutions using Cisco IoT and Edge Platforms (DEVIOT)


Cisco 300-915 Exam Overview:

Exam NameCisco Certified DevNet Specialist IoT
Exam Number 300-915 DEVIOT
Exam Number $300 USD
Duration 90 minutes
Number of Questions 55-65
Passing Score Variable (750-850 / 1000 Approx.)
Recommended Training Developing Solutions using Cisco IoT & Edge Platforms (DEVIOT)
Sample Questions Cisco 300-915 Sample Questions
Practice Exam Cisco Certified DevNet Specialist IoT Practice Test


Cisco 300-915 Exam Topics:


Section Weight  Objectives
Cisco Network IoT Architecture 20%

- Interpret the data flow of a topology that includes:

◉ gateways
◉ access points
◉ firewalls (including industrial firewalls)
◉ routers
◉ switches

- Describe the purpose, functionality, and use of these operational technology components:

◉ PLCs and operations
◉ embedded microcontrollers
◉ RTOS systems
◉ Cisco interfaces (serial, sensors, I2C, and USC)
◉ communication protocols (BLE, WiFi, Ethernet, and LoraWAN)
◉ communication standards (DDS, OPC UA, MT Connect, and Open PLC)

- Describe IoT requirements related to networking and device configuration policies (including configuring IOS commands to enable IOx, port and protocol needs of an application, and security and prioritization of data)
- Construct a workflow to connect a sensor
- Troubleshoot sensor connectivity issue

Compute and Analysis 10% - Compare the characteristics, capabilities, and use of edge devices to generic compute devices
- Determine the use of cloud or specific edge devices for a given application scenario
- Analyze application resource usage information to determine any required changes to the application or hardware
- Construct a Python script to deploy an application at the edge using FND and GMM APIs
- Troubleshoot application resources usage and network connectivity issues when using FND and GMM APIs
- Determine data handling procedure and action to take with edge data based on business requirements
Cisco IOx IoT Software 20% - Describe the capabilities of a Cisco IOx application
- Troubleshoot a Dockerfile for Cisco IOx
- Describe the process to build applications for Cisco IOx
- Identify the troubleshooting approaches for a deployed application for Cisco IOx
- Describe the process to deploy an Cisco IOx application into a CI/CD on platforms (such as FND, Kinetic GMM, or Directly to IOx)
- Construct a Cisco IOx application to meet requirements given SDK documentation Replace this text with content of your own.
Cisco Edge Data IoT Software 15% - Describe characteristics of edge data services
- Analyze a DSLink (extracting data from a sensor)
- Identify the process to send data to a public cloud provider
Open Source IoT Software 10% - Evaluate the flow and processing of data from sensor to cloud in a given scenario
- Compare characteristics and usage of MQTT and AMQP
- Determine the output from given messages and subscription details
- Identify broker QoS level for messages in a given scenario
- Diagnose issues with broker deployment and application connection
IoT Data Visualization 10% - Describe the characteristics and capabilities of data visualization tools (such as Freeboard, Grafanna, and Kibana)
- Identify the data visualization technique to meet business requirements
- Interpret visualized data
Security 15%

- Identify methods to implement a secure software development life cycle
- Identify methods to secure an application and infrastructure during production and testing in a CI/CD pipeline
- Describe risk management (including security challenges in IT and operational technology)
- Describe the concepts related to confidentiality, integrity, and availability
- Describe the capabilities of:

◉ ISE and ISE integration
◉ pxGRID
◉ AMP for Endpoints proxy
◉ Cisco Tetration
◉ StealthWatch (Enterprise and Cloud)
◉ Cisco Cloudlock

0 comments:

Post a Comment