Course Outline

Introduction to Cisco ISE

  • Understanding Network Access Control (NAC)
  • Overview of Cisco ISE
  • Role of Cisco ISE in network security

Cisco ISE Implementation

  • Deployment modes
  • Hardware and software requirements
  • Initial configuration and setup
  • Integration with network devices

Authentication with Cisco ISE

  • Authentication methods and protocols
  • Configuring 802.1X authentication
  • MAC authentication bypass (MAB)
  • Web authentication
  • EAP-TLS and certificate-based authentication

Authorization and Access Control

  • Role-based access control (RBAC)
  • Policies and policy sets
  • Enforcement profiles
  • Authorization rules and conditions
  • Access control lists (ACLs)

Network Profiling

  • Device profiling and attributes
  • Creating profiling policies
  • Dynamic VLAN assignment
  • Profiling reports and dashboards

Endpoint Compliance and Posture Assessment

  • Configuring posture policies
  • Remediation actions
  • Compliance modules
  • Monitoring compliance

Using Guest Access with Cisco ISE

  • Guest services and portals
  • Guest access policies
  • Customizing guest portals
  • Self-service guest management

High Availability and Redundancy

  • ISE deployment modes for high availability
  • Failover and load balancing
  • Backup and restore

Monitoring and Reporting

  • Logging and event viewer
  • Real-time monitoring
  • Reporting and custom report generation
  • Alerts and notifications

Troubleshooting Cisco ISE

  • Troubleshooting tools and techniques
  • Common issues and solutions
  • Debugging and logging

Best Practices and Security Considerations

  • Security hardening of Cisco ISE
  • Compliance and regulatory considerations
  • Scalability and performance optimization

Integration with Other Cisco Security Solutions

  • Integration with Cisco ASA
  • Integration with Cisco AnyConnect VPN
  • Integration with Cisco Stealthwatch

Cisco ISE Upgrades and Maintenance

  • Software upgrades
  • Patch management
  • Ongoing maintenance best practices

Summary and Next Steps

Requirements

  • Basic understanding of networking concepts and security fundamentals

Audience

  • Network administrators
  • IT security professionals
 28 Hours

Number of participants



Price per participant

Testimonials (4)

Related Categories