CCNP Security Cisco Identify Services Engine SISE 300-715

CCNP Security Cisco Identify Services Engine SISE 300-715

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 18h 43m | 6.74 GB

CCNP Security Management (SISE) 300-715 Complete Video Course focuses on implementing and configuring Cisco Identity Services Engine for preparation for the SISE 300-715 certification, and providing the necessary skills for real-world deployment scenarios.

CCNP Security Management (SISE) 300-715 Complete Video Course focuses on a blend of the real-world experience and best practices mixed with the requirements for the CCNP SISE 300-715 exam. The goal of the course is to not only cover the objectives for the SISE 300-715, but also provide a solid learning resource for mastering key concepts regarding planning and delivering a Cisco ISE solution. Topics include how to develop an ISE architecture; what to consider during the crawl, walk, and run phases of a deployment; and how to support a mature ISE deployment. The course walks you through a successful deployment and elaborates on how to avoid common pitfalls. The course includes many examples and demos of how to configure the technology, so the viewer can follow along with their own lab to master each concept.

Learn How To

  • Understand ISE architecture, node types, and deployment models
  • Understand the fundamentals of network access control and the Cisco ISE offering
  • Be able to develop ISE policies for users, guests, BYOD, and headless devices
  • Develop deployment strategies for ISE with various third party integrations
  • Prepare for the SISE 300-715 certification exam

Module 1, “ISE fundamentals,” introduces the ISE key concepts you will need to know before moving on to other topics. In this course, we will cover the requirements for the SISE exam as well as recommendations and best practices we have learned from deploying ISE for various customers. By the end of this module, you should have a general understanding of Cisco ISE core concepts as well as know how to develop a plan to deploy each phase of an ISE engagement.

Module 2, “Policies,” moves into the specifics of how the solution works. This module reviews how to build ISE policies, which includes managing identities of users and devices. Policies are the essential backbone of an ISE deployment, so having a good understanding of the different types of policies and components is essential to a successful implementation.

Module 3, “Device Identification and Onboarding,” will look at three important deployment concepts that are usually encountered during an ISE deployment. First, guest access is covered, and then onto profiling, which is how to fingerprint devices. The module rounds out with BYOD.

Module 4, “Compliance and Network Device Control,” dives into endpoint compliance, and adding and managing network access devices. Another term for endpoint compliance is posture, which tends to be part of the later phases of an ISE deployment. ISE uses NADs or network devices to enforce policies, so it is important to understand how to add and manage NADs to successfully deploy a ISE solution.

Table of Contents

1 CCNP Security Cisco Identity Services Engine SISE 300-715 – Introduction
2 Module introduction
3 Learning objectives
4 1.1 Introducing ISE
5 1.2 Understanding ISE deployment options–Part 1
6 1.3 Understanding ISE deployment options–Part 2
7 1.4 Understanding ISE deployment options–Part 3
8 1.5 Understanding ISE and certificates–Part 1
9 1.6 Understanding ISE and certificates–Part 2
10 1.7 Understanding and configuring ISE personas
11 1.8 How people and process impact ISE deployments
12 Module introduction
13 Learning objectives
14 2.1 Introducing ISE policies–Part 1
15 2.2 Introducing ISE policies–Part 2
16 2.3 Introducing ISE policies–Part 3
17 2.4 Fundamentals of AAA
18 2.5 Configuring native Active Directory (AD)–Part 1
19 2.6 Configuring native Active Directory (AD)–Part 2
20 2.7 Configuring LDAP
21 2.8 Troubleshooting AD
22 2.9 Understanding ISE Identity Store
23 2.10 Identity Store options–Part 1
24 2.11 Identity Store options–Part 2
25 2.12 Troubleshooting ISE Identity Stores
26 Learning objectives
27 3.1 Configuring 802.1x wired_wireless network access–Part 1
28 3.2 Configuring 802.1x wired_wireless network access–Part 2
29 3.3 Configuring 802.1x wired_wireless network access–Part 23
30 3.4 Configuring 802.1x wired_wireless network access–Part 4
31 3.5 Understanding phased deployments for 802.1x–Part 1
32 3.6 Understanding phased deployments for 802.1x–Part 2
33 3.7 Understanding Network Access Device (NAD)
34 3.8 Configuring NAD
35 3.9 Troubleshooting NAD
36 3.10 Understanding MAC Address Bypass (MAB)
37 3.11 Configuring MAB–Part 1
38 3.12 Configuring MAB–Part 2
39 3.13 Troubleshooting MAB
40 Learning objectives
41 4.1 Introducing TrustSec
42 4.2 Cisco TrustSec overview and devices configuration–Part 1
43 4.3 Cisco TrustSec overview and devices configuration–Part 2
44 4.4 Cisco TrustSec overview and devices configuration–Part 3
45 4.5 Cisco TrustSec policy configuration for ISE–Part 1
46 4.6 Cisco TrustSec policy configuration for ISE–Part 2
47 4.7 Troubleshooting TrustSec and ISE
48 Module introduction
49 Learning objectives
50 5.1 Planning guest services
51 5.2 Onboarding guests
52 5.2 Configuring guest services–Part 1
53 5.4 Configuring guest services–Part 2
54 5.3 Configuring guest services–Part 23
55 5.6 Configuring sponsor and guest portals–Part 1
56 5.7 Configuring sponsor and guest portals–Part 2
57 5.8 Configuring sponsor and guest portals–Part 3
58 5.9 Troubleshooting guest services–Part 1
59 5.10 Troubleshooting guest services–Part 2
60 Learning objectives
61 6.1 Introducing profiling
62 6.2 Profiling interworkings–Part 1
63 6.3 Profiling interworkings–Part 2
64 6.4 Implementing profiling services–Part 1
65 6.5 Implementing profiling services–Part 2
66 6.6 Implementing profiling services–Part 3
67 6.7 Configuring switches for profiling services
68 6.8 Profiling reports
69 6.9 Implementing probes
70 6.10 Probe overview
71 6.11 Profiling best practices
72 6.12 Implementing Change of Authorization (CoA)
73 6.13 Configuring endpoint identity management–Part 1
74 6.14 Configuring endpoint identity management–Part 2
75 6.15 Troubleshooting profiling
76 Learning objectives
77 7.1 Introducing BYOD–Part 1
78 7.2 Introducing BYOD–Part 2
79 7.3 Selling BYOD to endusers
80 7.4 Planning BYOD–Part 1
81 7.5 Planning BYOD–Part 2
82 7.6 Planning BYOD–Part 3
83 7.7 Overview of Cisco BYOD functionality–Part 1
84 7.8 Overview of Cisco BYOD functionality–Part 2
85 7.9 Configuring BYOD on-boarding using internal CA–Part 1
86 7.10 Configuring BYOD on-boarding using internal CA–Part 2
87 7.11 Configuring BYOD on-boarding using internal CA–Part 3
88 7.12 Onboarding mobile device management
89 7.13 Configuring certificates for BYOD
90 7.14 Configuring blacklist_whitelist–Part 1
91 7.15 Configuring blacklist_whitelist–Part 2
92 7.16 Troubleshooting BYOD
93 Module introduction
94 Learning objectives
95 8.1 Introducing endpoint compliance
96 8.2 Understanding endpoint compliance, posture services, and client provisioning
97 8.3 Understanding posture conditions and policy
98 8.4 Understanding client provisioning
99 8.5 Understanding compliance modules
100 8.6 Understanding ISE posture agents and operational modes–Part 1
101 8.7 Understanding ISE posture agents and operational modes–Part 2
102 8.8 Understanding ISE posture agents and operational modes–Part 2 3
103 8.9 Understanding Supplicants–Part 1
104 8.10 Understanding Supplicants–Part 2
105 8.11 Troubleshooting ISE posture–Part 1
106 8.12 Troubleshooting ISE posture–Part 2
107 Learning objectives
108 9.1 Introducing NAD administration
109 9.2 Configuring TACACS+ devices–Part 1
110 9.3 Configuring TACACS+ devices–Part 2
111 9.4 Understanding command authorization–Part 1
112 9.5 Understanding command authorization–Part 2
113 9.6 Troubleshooting network device administration
114 Learning objectives
115 10.1 Course overview
116 CCNP Security Cisco Identity Services Engine SISE 300-715 – Summary