Cisco DevNet

March 21, 2022

DEVELOPER

Policy as Code and the Open Policy Agent

See how policy-as-code plays out in Kubernetes — what comes built-in with Kubernetes, and how the Open Policy Agent with Gatekeeper helps Kubernetes operators take policy enforcement further.

March 15, 2022

DEVELOPER

Use “Scorecards” to Check on Security of Your Open Source Projects

Watch the Snack Minute interview with Stephen Augustus, Head of Open Source at Cisco, about Scorecard and how you use them to improve the security of your project.

March 14, 2022

DEVELOPER

Run Your IoT Applications on an IP67 Industrial Router

Try out all the programmability features of the Cisco IoT gateway, Industrial Router IR8140, in the DevNet Sandbox.

March 10, 2022

DEVELOPER

Take a Look at Cisco ThousandEyes for Cloud Developers

Learn about Cisco ThousandEyes, a SaaS solution for monitoring availability, latency, loss, and user experience with your web-based application in a distributed environment.

March 9, 2022

DEVELOPER

Try Automating a YubiKey Button Press

YubiKey is a device that enables two-factor authentication using a single button, by generating unique codes that confirm your identity. Here's a fun challenge you can try to automate a YubiKey.

March 7, 2022

DEVELOPER

Cisco Cloud Native Security – Part 3, GitOps and CI/CD

Learn how to deploy Infrastructure as Code (IaC) using GitOps as an operational framework that applies DevOps best practices to infrastructure automation.

March 7, 2022

DEVELOPER

Explore Secure DDoS Edge Protection with new Sandbox and Learning Labs

Learn how to protect a mobile edge network environment from malicious attacks hidden inside GTP packets. Then use the sandbox to test your solution.

March 3, 2022

DEVELOPER

Cisco Cloud Native Security – Part 2, Provisioning the Infrastructure

See how to set up your dev environment and provision your Infrastructure as Code (IaC) using Terraform, Ansible, Jenkins, and GitHub.

March 1, 2022

DEVELOPER

Cisco Cloud Native Security – Part 1, Going Up the Stack from Infrastructure to Application

Going up the stack from infrastructure to application - Learn what tools are needed, and how you can secure these environments using Cisco security technologies.