Get in Touch

Course Outline

Introduction to Cisco ISE

  • Understanding Network Access Control (NAC).
  • Overview of Cisco ISE.
  • The role of Cisco ISE in network security.

Cisco ISE Implementation

  • Deployment modes.
  • Hardware and software requirements.
  • Initial configuration and setup.
  • Integration with network devices.

Authentication with Cisco ISE

  • Authentication methods and protocols.
  • Configuring 802.1X authentication.
  • MAC authentication bypass (MAB).
  • Web authentication.
  • EAP-TLS and certificate-based authentication.

Authorization and Access Control

  • Role-based access control (RBAC).
  • Policies and policy sets.
  • Enforcement profiles.
  • Authorization rules and conditions.
  • Access control lists (ACLs).

Network Profiling

  • Device profiling and attributes.
  • Creating profiling policies.
  • Dynamic VLAN assignment.
  • Profiling reports and dashboards.

Endpoint Compliance and Posture Assessment

  • Configuring posture policies.
  • Remediation actions.
  • Compliance modules.
  • Monitoring compliance.

Using Guest Access with Cisco ISE

  • Guest services and portals.
  • Guest access policies.
  • Customizing guest portals.
  • Self-service guest management.

High Availability and Redundancy

  • ISE deployment modes for high availability.
  • Failover and load balancing.
  • Backup and restore.

Monitoring and Reporting

  • Logging and event viewer.
  • Real-time monitoring.
  • Reporting and custom report generation.
  • Alerts and notifications.

Troubleshooting Cisco ISE

  • Troubleshooting tools and techniques.
  • Common issues and solutions.
  • Debugging and logging.

Best Practices and Security Considerations

  • Security hardening of Cisco ISE.
  • Compliance and regulatory considerations.
  • Scalability and performance optimization.

Integration with Other Cisco Security Solutions

  • Integration with Cisco ASA.
  • Integration with Cisco AnyConnect VPN.
  • Integration with Cisco Stealthwatch.

Cisco ISE Upgrades and Maintenance

  • Software upgrades.
  • Patch management.
  • Ongoing maintenance best practices.

Summary and Next Steps

Requirements

  • Foundational knowledge of networking concepts and security fundamentals.

Target Audience

  • Network administrators.
  • IT security professionals.
 28 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories