• Networking Academy Program, Rik
• Cisco trends, Franc
• Academy programma's en leerpaden secundair onderwijs en CVO's, Joeri
• Nieuwe ontwikkeligen hoger onderwijs, Joeri, Yvan
• Opleidingsaanbod Oracla, Yvan
• Aanbod van CompTIA, Hans
• Waar informatie omtrent voorwaarden, ondersteuning en opleidingen, Yvan
• Mogelijkheden handboeken en uitgevers, Brinckman, Kenan
Programma:
3© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Microsoft
acquires
Hotmail
Netflix
is
established
Amazon
books
rapidly
growingGoogle.com
domain
registered
Ebayname is
born
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
6© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Skills-to-Jobs Learning Experience
Simulations HackathonsSupports Personalized
InstructionHands-On
What Students Learn
• Networking
• Security and Cybersecurity
• IoT
• Programming
• Linux and General IT
How Students Learn
• Learning by doing
• Problem-solving
• Project-based learning
• Initiative and leadership
• Real-world experiences
How Students Think
• Customer-centric mindset
• Critical thinking
• Personal and social responsibility
• Business context
Courses in
20+ LanguagesFlexible Delivery
7© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Networking Academy Learning PortfolioCollaborate for Impact
* Available within 12 months
November 2017
Aligns to Certification
Mobility Fundamentals
CCNA R&S: Introduction to Networks, R&S
Essentials, Scaling Networks, Connecting
Networks
CCNP R&S: Switch, Route, TShoot
Introduction to Cybersecurity
Introduction to IoT
CCNA SecurityCybersecurity Essentials
CCNA Cyber Ops*
Exploratory Foundational Career-Ready
Networking Essentials
Networking
Security
IoT & Analytics
Be Your Own Boss EntrepreneurshipBusiness
Get ConnectedDigital Literacy
NDG Linux UnhatchedNDG Linux Essentials
IT Essentials
Programming
OS & IT
CLP: Advanced Programming in C*
CPP: Advanced Programming in C++
NDG Linux II
Current & Planned
CLA: Programming Essentials in C
CPA: Programming Essentials in C++
NDG Linux I
Emerging Tech Workshop: Experimenting
with REST APIs Using Cisco Spark*
IoT Fundamentals:
Connecting Things, Big Data & Analytics
Hackathon Playbook, IoT Security*
Emerging Tech Workshop: Network
Programmability Using Cisco APIC-EM*
Self-paced
PCA: Programming Essentials in Python*
InternshipsPrototyping LabHackathonsPacket
Tracer
Introduction to
Packet Tracer
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
About Talent Bridge
Networking Academy Talent Bridge connects Cisco and
partner employers with world-class NetAcad talent for
the digital economy workforce of the future.
Our new Matching Engine
automates and systematizes
the linkage between supply
and demand to accelerate hiring
Offers qualified candidates
employment connections based
on achievement, geographic
location, and job roles
NetAcad candidates
are best suited for
entry-level job roles
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
that automates
your ability to identify,
based on job requirements
Search for candidates
around the world based on
Post your open entry-level positions within
the tool, then quickly access
and contact qualified candidates in real time. The
,
accelerating your hiring process
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
7.26.8 7.6
Rapid Adoption rate of digital infrastructure:
5X faster than electricity and telephony
500Billion“Smart Objects”2025
50
2010 2015 2020
0
40
30
20
10
Bill
ions o
f devic
es
25
12.5
Inflectionpoint
Timeline
Source: Cisco IBSG,
12© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
About prediction
About Prediction
16© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
About prediction
About Prediction
19© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
An analogy: IOT versus music
Master the technique
for the instrument.
Know everything and
be able to address any
situation with the
instrument.
Expand to few other
instruments.
Know the music theory
and how to play the
notes on the instrument
22© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
When the machine take care of repetitive, error prone tasks, you have time to put creativity at work.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Connected
Plant
Connected
Baby
Connected
Home
Connected
Fish PondConnect Care
Connected Toothbrush Barcelona Connected Cows
MANUFACTURING SMART CITIES AGRICULTURE
Create your own IoT project and Connect the Unconnected
Request
of Ransom
Encryption
of Files
C2 Comms &
Asymmetric Key
Exchange
Typical Ransomware Infection
Problem: Customers can be taken hostage by malware that locks up critical resources
Infection
Vector
Ransomware
frequently uses
web and email
Ransomware takes control
of targeted systems
Ransomware holds those
systems ‘hostage’
Owner/company agrees to
pay the ‘ransom’ (bitcoins)
to free the system
31© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Top Related