Implementing and Configuring Cisco® Identity Services Engine – Course Outline

**Includes Extra BYOD Content**

Description

Duration: 05 days
The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco® Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.

Objectives
Upon completion of this course, you will be able to:

Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages.

Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services.

Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization.

Describe third-party network access devices (NADs), Cisco TrustSec®, and Easy Connect.

Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios.

Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment.

Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution.

Describe the value of the My Devices portal and how to configure this portal.

Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE.

Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the authentication, authentication, and accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols.

Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool.

Prerequisites
It is recommended, but not required, to have the following skills and knowledge before attending this course:

Familiarity with the Cisco IOS® Software command-line interface (CLI)

Familiarity with Cisco AnyConnect® Secure Mobility Client

Familiarity with Microsoft Windows operating systems

Familiarity with 802.1X

Who Should Attend
Network Security Engineers

ISE Administrators

Wireless Network Security Engineers

Cisco Integrators and Partners

What’s included?

  • Authorized Courseware
  • Intensive Hands on Skills Development with an Experienced Subject Matter Expert
  • Hands on practice on real Servers and extended lab support 1.800.482.3172
  • Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
  • Academy Code of Honor: Test Pass Guarantee
  • Optional: Package for Hotel Accommodations, Lunch and Transportation

Training Solutions

With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.

Methods

  • Instructor-Led (the best training format we offer)
  • Live Online Classroom – Online Instructor-Led
  • Self-Paced Video

Speak to an Admissions Representative for complete details

StartFinishPublic PricePublic Enroll Private PricePrivate Enroll
12/25/202312/29/2023
1/15/20241/19/2024
2/5/20242/9/2024
2/26/20243/1/2024
3/18/20243/22/2024
4/8/20244/12/2024
4/29/20245/3/2024
5/20/20245/24/2024
6/10/20246/14/2024
7/1/20247/5/2024
7/22/20247/26/2024
8/12/20248/16/2024
9/2/20249/6/2024
9/23/20249/27/2024
10/14/202410/18/2024
11/4/202411/8/2024
11/25/202411/29/2024
12/16/202412/20/2024
1/6/20251/10/2025

Curriculum

Section 1: Introducing Cisco ISE Architecture and Deployment

Section 2: Cisco ISE Policy Enforcement

Section 3: Web Auth and Guest Services

Section 4: Cisco ISE Profiler

Section 5: Cisco ISE BYOD

Section 6: Cisco ISE Endpoint Compliance Services

Section 7: Working with Network Access Devices

Lab Outline

Discovery 1: Access the SISE Lab and Install ISE 2.4

Discovery 2: Configure Initial Cisco ISE Setup, GUI Familiarization, and System Certificate Usage

Discovery 3: Integrate Cisco ISE with Active Directory

Discovery 4: Configure Cisco ISE Policy

Discovery 5: Configure Access Policy for Easy Connect

Discovery 6: Configure Guest Access

Discovery 7: Configure Guest Access Operations

Discovery 8: Create Guest Reports

Discovery 9: Configure Profiling

Discovery 10: Customize the Cisco ISE Profiling Configuration

Discovery 11: Create Cisco ISE Profiling Reports

Discovery 12: Configure BYOD

Discovery 13: Blacklisting a Device

Discovery 14: Configure Cisco ISE Compliance Services

Discovery 15: Configure Client Provisioning

Discovery 16: Configure Posture Policies

Discovery 17: Test and Monitor Compliance Based Access

Discovery 18: Test Compliance Policy

Discovery 19: Configure Cisco ISE for Basic Device Administration

Discovery 20: Configure TACACS+ Command Authorization