Video description
8+ Hours of Video Instruction
CCNP Security Management (SISE) 300-715 Complete Video Course focuses on implementing and configuring Cisco Identity Services Engine for preparation for the SISE 300-715 certification, and providing the necessary skills for real-world deployment scenarios.
Overview
CCNP Security Management (SISE) 300-715 Complete Video Course focuses on a blend of the real-world experience and best practices mixed with the requirements for the CCNP SISE 300-715 exam. The goal of the course is to not only cover the objectives for the SISE 300-715, but also provide a solid learning resource for mastering key concepts regarding planning and delivering a Cisco ISE solution. Topics include how to develop an ISE architecture; what to consider during the crawl, walk, and run phases of a deployment; and how to support a mature ISE deployment. The course walks you through a successful deployment and elaborates on how to avoid common pitfalls. The course includes many examples and demos of how to configure the technology, so the viewer can follow along with their own lab to master each concept.
Topics Include:
Module 1: ISE Fundamentals
Module 2: Policies
Module 3: Device Identification and Onboarding
Module 4: Compliance and Network Device Control
About the Instructors
Joseph Muniz is an architect at Cisco Systems and a security researcher. He has extensive experience in designing security solutions and architectures for the top Fortune 500 corporations and the U.S. government. Joseph’s current role gives him visibility into the latest trends in cybersecurity, from both leading vendors and customers. Examples of Joseph’s research include his RSA talk titled Social Media Deception, which has been quoted by many sources (search for Emily Williams Social Engineering), as well as his articles in PenTest Magazine regarding various security topics.
Joseph runs The Security Blogger website, a popular resource for security, hacking, and product implementation. He is the author and contributor of several publications covering various penetration testing and security topics. Joseph has been involved with planning and delivering Cisco NAC appliance and Identity Services Engine deployments for more than 10 years for various types of customers around the world. You can follow Joseph at thesecurityblogger.com and @SecureBlogger @SecureBlogger.
Kevin Tigges is a consulting security engineer at Cisco Systems focusing on large enterprise accounts. He has more than 25 years of experience in small and large enterprises designing network and security solutions. Kevin worked in the healthcare industry for a number of years and enjoys focusing on helping other healthcare customers understand how Cisco ISE can provide a secure access platform. Kevin has deployed ISE as a customer and has a deep understanding of considerations and caveats of a successful deployment. In his spare time, he enjoys time with his wife of 28 years, his 2 boys, being outside, and target archery.
Skill Level
- Intermediate
Learn How To
- Understand ISE architecture, node types, and deployment models
- Understand the fundamentals of network access control and the Cisco ISE offering
- Be able to develop ISE policies for users, guests, BYOD, and headless devices
- Develop deployment strategies for ISE with various third party integrations
- Prepare for the SISE 300-715 certification exam
Who Should Take This Course
This course is designed for anybody interested in learning about access control best practices and how to use Cisco Identity Services Engine. This includes those looking to study for the SISE 300-715 exam, as well as those responsible for an organization’s security, looking to deploy network access control using Cisco ISE.
Course Requirements
Students should have a basic understanding of how networks function including routing and switching concepts. Experience with designing and deploying networks is a plus. A basic understand of security requirements is also beneficial.
Lesson Descriptions
Module 1, "ISE fundamentals," introduces the ISE key concepts you will need to know before moving on to other topics. In this course, we will cover the requirements for the SISE exam as well as recommendations and best practices we have learned from deploying ISE for various customers. By the end of this module, you should have a general understanding of Cisco ISE core concepts as well as know how to develop a plan to deploy each phase of an ISE engagement.
Module 2, "Policies," moves into the specifics of how the solution works. This module reviews how to build ISE policies, which includes managing identities of users and devices. Policies are the essential backbone of an ISE deployment, so having a good understanding of the different types of policies and components is essential to a successful implementation.
Module 3, "Device Identification and Onboarding," will look at three important deployment concepts that are usually encountered during an ISE deployment. First, guest access is covered, and then onto profiling, which is how to fingerprint devices. The module rounds out with BYOD.
Module 4, "Compliance and Network Device Control," dives into endpoint compliance, and adding and managing network access devices. Another term for endpoint compliance is posture, which tends to be part of the later phases of an ISE deployment. ISE uses NADs or network devices to enforce policies, so it is important to understand how to add and manage NADs to successfully deploy a ISE solution.
About Pearson Video Training
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Table of contents
- Introduction
- Module 1: ISE Fundamentals
-
Lesson 1: NAC architecture and deployment strategies
- Learning objectives
- 1.1 Introducing ISE
- 1.2 Understanding ISE deployment options--Part 1
- 1.3 Understanding ISE deployment options--Part 2
- 1.4 Understanding ISE deployment options--Part 3
- 1.5 Understanding ISE and certificates--Part 1
- 1.6 Understanding ISE and certificates--Part 2
- 1.7 Understanding and configuring ISE personas
- 1.8 How people and process impact ISE deployments
- Module 2: Policies
-
Lesson 2: Identity Management
- Learning objectives
- 2.1 Introducing ISE policies--Part 1
- 2.2 Introducing ISE policies--Part 2
- 2.3 Introducing ISE policies--Part 3
- 2.4 Fundamentals of AAA
- 2.5 Configuring native Active Directory (AD)--Part 1
- 2.6 Configuring native Active Directory (AD)--Part 2
- 2.7 Configuring LDAP
- 2.8 Troubleshooting AD
- 2.9 Understanding ISE Identity Store
- 2.10 Identity Store options--Part 1
- 2.11 Identity Store options--Part 2
- 2.12 Troubleshooting ISE Identity Stores
-
Lesson 3: 802.1x and MAC Address Bypass (MAB)
- Learning objectives
- 3.1 Configuring 802.1x wired/wireless network access--Part 1
- 3.2 Configuring 802.1x wired/wireless network access--Part 2
- 3.3 Configuring 802.1x wired/wireless network access--Part 23
- 3.4 Configuring 802.1x wired/wireless network access--Part 4
- 3.5 Understanding phased deployments for 802.1x--Part 1
- 3.6 Understanding phased deployments for 802.1x--Part 2
- 3.7 Understanding Network Access Device (NAD)
- 3.8 Configuring NAD
- 3.9 Troubleshooting NAD
- 3.10 Understanding MAC Address Bypass (MAB)
- 3.11 Configuring MAB--Part 1
- 3.12 Configuring MAB--Part 2
- 3.13 Troubleshooting MAB
-
Lesson 4: TrustSec
- Learning objectives
- 4.1 Introducing TrustSec
- 4.2 Cisco TrustSec overview and devices configuration--Part 1
- 4.3 Cisco TrustSec overview and devices configuration--Part 2
- 4.4 Cisco TrustSec overview and devices configuration--Part 3
- 4.5 Cisco TrustSec policy configuration for ISE--Part 1
- 4.6 Cisco TrustSec policy configuration for ISE--Part 2
- 4.7 Troubleshooting TrustSec and ISE
- Module 3: Device Identification and Onboarding
-
Lesson 5: Guest Services
- Learning objectives
- 5.1 Planning guest services
- 5.2 Onboarding guests
- 5.2 Configuring guest services--Part 1
- 5.4 Configuring guest services--Part 2
- 5.3 Configuring guest services--Part 23
- 5.6 Configuring sponsor and guest portals--Part 1
- 5.7 Configuring sponsor and guest portals--Part 2
- 5.8 Configuring sponsor and guest portals--Part 3
- 5.9 Troubleshooting guest services--Part 1
- 5.10 Troubleshooting guest services--Part 2
-
Lesson 6: Profiling overview
- Learning objectives
- 6.1 Introducing profiling
- 6.2 Profiling interworkings--Part 1
- 6.3 Profiling interworkings--Part 2
- 6.4 Implementing profiling services--Part 1
- 6.5 Implementing profiling services--Part 2
- 6.6 Implementing profiling services--Part 3
- 6.7 Configuring switches for profiling services
- 6.8 Profiling reports
- 6.9 Implementing probes
- 6.10 Probe overview
- 6.11 Profiling best practices
- 6.12 Implementing Change of Authorization (CoA)
- 6.13 Configuring endpoint identity management--Part 1
- 6.14 Configuring endpoint identity management--Part 2
- 6.15 Troubleshooting profiling
-
Lesson 7: Bring Your own Device (BYOD) overview
- Learning objectives
- 7.1 Introducing BYOD--Part 1
- 7.2 Introducing BYOD--Part 2
- 7.3 Selling BYOD to endusers
- 7.4 Planning BYOD--Part 1
- 7.5 Planning BYOD--Part 2
- 7.6 Planning BYOD--Part 3
- 7.7 Overview of Cisco BYOD functionality--Part 1
- 7.8 Overview of Cisco BYOD functionality--Part 2
- 7.9 Configuring BYOD on-boarding using internal CA--Part 1
- 7.10 Configuring BYOD on-boarding using internal CA--Part 2
- 7.11 Configuring BYOD on-boarding using internal CA--Part 3
- 7.12 Onboarding mobile device management
- 7.13 Configuring certificates for BYOD
- 7.14 Configuring blacklist/whitelist--Part 1
- 7.15 Configuring blacklist/whitelist--Part 2
- 7.16 Troubleshooting BYOD
- Module 4: Compliance and Network Device Control
-
Lesson 8: Endpoint compliance
- Learning objectives
- 8.1 Introducing endpoint compliance
- 8.2 Understanding endpoint compliance, posture services, and client provisioning
- 8.3 Understanding posture conditions and policy
- 8.4 Understanding client provisioning
- 8.5 Understanding compliance modules
- 8.6 Understanding ISE posture agents and operational modes--Part 1
- 8.7 Understanding ISE posture agents and operational modes--Part 2
- 8.8 Understanding ISE posture agents and operational modes--Part 2 3
- 8.9 Understanding Supplicants--Part 1
- 8.10 Understanding Supplicants--Part 2
- 8.11 Troubleshooting ISE posture--Part 1
- 8.12 Troubleshooting ISE posture--Part 2
- Lesson 9: Network Access Device (NAD) administration
- Lesson 10: Closing items
- Summary
Product information
- Title: CCNP Security Cisco Identify Services Engine SISE 300-715
- Author(s):
- Release date: February 2020
- Publisher(s): Pearson
- ISBN: 0136677207
You might also like
book
Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and …
book
Cisco Software-Defined Access
The definitive Cisco SD-Access resource, from the architects who train Ciscos own engineers and partners This …
video
Cisco CCNA 200-301: The Complete Guide to Getting Certified
This course offers a comprehensive guide to mastering Cisco's CCNA 200-301 certification, a crucial step for …
book
CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and …