Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

SISE - Implementing and Configuring Cisco Identity Services Engine v4.1

The Implementing and Configuring Cisco Identity Services Engine (SISE) course teaches you to deploy and use Cisco® Identity Services Engine (ISE) v3.x, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and virtual private network (VPN) connections. This hands-on training provides you with the knowledge and skills to implement and apply Cisco ISE capabilities to support use cases for Zero Trust security posture. These use cases include tasks such as policy enforcement, profiling services, web authentication and guest access services, Bring Your Own Device (BYOD), endpoint compliance services, and Terminal Access Controller Access Control Server (TACACS+) device administration. Through hands-on practice via lab exercises, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.

This training prepares you for 300-715 SISE v1.1 exam. If passed, you earn the Cisco Certified Specialist – Security Identity Management Implementation certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Security certification. This training also earns you 40 Continuing Education (CE) credits toward recertification.

(469)

GK# 4879 Vendor# SISE 4.1
Vendor Credits:
  • Global Knowledge Delivered Course
  • Training Exclusives
No matching courses available.
Start learning as soon as today! Click Add To Cart to continue shopping or Buy Now to check out immediately.
Access Period:
Scheduling a custom training event for your team is fast and easy! Click here to get started.

THIS COURSE HAS A CLC-APPROVED CLASS

To enroll, contact your account manager, call us at 1.800.268.7737 or visit our approved class list to find the session and self-enroll.  

$
Your Selections:
Location:
Access Period:
No available dates

Who Should Attend?

  • Network Security Engineers
  • Administrators

What You'll Learn

Upon successful completion of this course, you should be able to:

  • Describe the Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture
  • Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages
  • Describe concepts and configure components related authentication, identity management, and certificate services
  • Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization
  • Describe third-party Network Access Devices (NADs), Cisco TrustSec, and Easy Connect
  • Configure web authentication and guest services, including guest access components and various guest access scenarios
  • Describe and configure Cisco ISE profiling services
  • Understand how to monitor these services to enhance endpoint security and ensure secure edge
  • Describe BYOD challenges, solutions, processes, and portals
  • Configure a BYOD solution and describe the relationship between BYOD processes and their related configuration components
  • Describe and configure various certificates related to a BYOD solution
  • Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE
  • Describe the fundamentals of Identity and Access Management (IAM) by leveraging TACACS+
  • Configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets
  • Understand the role of TACACS+ within the Authentication, Authorization, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols

Course Outline

Section 1: Introducing Cisco ISE Architecture

  • Cisco ISE as a Network Access Policy Engine
  • Cisco ISE Use Cases
  • Cisco ISE Core Functions

Section 2: Introducing Cisco ISE Deployment

  • Cisco ISE Deployment Models
  • Cisco ISE Licensing and Network Requirements
  • Cisco ISE Context Visibility F
  • New Features in Cisco ISE 3.X

Section 3: Introducing Cisco ISE Policy Enforcement Components

  • 802.1X for Wired and Wireless Access
  • MAC Authentication Bypass for Wired and Wireless Access
  • Identity Management
  • Active Directory Identity Source
  • Additional Identity Sources
  • Certificate Services

Section 4: Introducing Cisco ISE Policy Configuration

  • Cisco ISE Policy
  • Cisco ISE Authentication Rules
  • Cisco ISE Authorization Rules

Section 5: Troubleshooting Cisco ISE Policy and Third-Party NAD Support

  • Cisco ISE Third-Party Network Access Device Support
  • Troubleshooting Cisco ISE Policy Configuration

Section 6: Exploring Cisco TrustSec

  • Cisco TrustSec Overview
  • Cisco TrustSec Enhancements
  • Cisco TrustSec Configuration

Section 7: Introducing Web Authentication and Guest Services

  • Web Access with Cisco ISE
  • Guest Access Components
  • Guest Access Settings

Section 8: Configuring Hotspots and Guest Portals

  • Sponsor and Guest Portals Configuration

Section 9: Configuring Cisco ISE BYOD

  • Cisco ISE BYOD Solution Overview
  • Cisco ISE BYOD Flow
  • My Devices Portal Configuration
  • Using Cisco ISE as a lightweight PKI

Section 10: Working with Network Access Devices

  • Reviewing AAA
  • Cisco ISE TACACS+ Device Administration
  • Configuring TACACS+ Device Administration
  • TACACS+ Device Administration Guidelines and Best Practices
  • Migration from Cisco ACS to Cisco ISE

Section 11: Introducing the Cisco ISE Profiler

  • ISE Profiler Overview
  • Cisco ISE Probes
  • Profiling Policy

Section 12: Introducing Profiling Best Practices and Reporting

  • Profiling Best Practices

Section 13: Introducing Cisco ISE Endpoint Compliance Services

  • Endpoint Compliance Services Overview

Section 14: Configuring Client Posture Services and Compliance

  • Client Posture Services and Provisioning Configuration
BUY NOW

Labs Outline

  • Initial Configuration and Certificate Usage
  • Integration with Active Directory
  • AAA Policy for MAB
  • AAA Policy for 802.1X
  • Cisco TrustSec
  • Guest Access Settings
  • Hotspot and Self-Registered Guest Access
  • Sponsor-Approved and Fully Sponsored Guest Access
  • Guest Reporting
  • Cisco ISE BYOD
  • Lost or Stolen BYOD Devices
  • TACACS+ Basic Device Administration
  • TACACS+ Command Authorization
  • Cisco ISE Profiling Configuration
  • Profiling Customization
  • Profiling Reports
  • Cisco ISE Compliance Services
  • Client Provisioning
  • Posture Policies
  • Compliance-Based Access
BUY NOW

Prerequisites

There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:

  • Familiarity with the Cisco IOS® Software Command-Line Interface (CLI) for wired and wireless devices
  • Familiarity with Cisco Secure Client
  • Familiarity with Microsoft Windows operating systems
  • Familiarity with 802.1X

These skills can be found in the following Cisco Learning Offering:

Vendor Credits

This course can be purchased with Cisco Learning Credits (CLCs).

BUY NOW