Cisco DoD Comply-to-Connect (C2C) v1.0

Course Details

Price:

$4,995.00

Days:

1

Location:

Virtual

Course Overview

– • Define DoD C2C, including its steps and alignment with ISE features/functions and Zero Trust
– • Describe Cisco Identity-Based Networking Services
– • Explain 802.1X extensible authentication protocol (EAP)
– • Configure devices for 802.1X operation
– • Configure access for non-supplicant devices
– • Describe the Cisco Identity Services Engine
– • Explain Cisco ISE deployment
– • Describe Cisco ISE policy enforcement concepts
– • Describe Cisco ISE policy configuration
– • Explain PKI fundamentals, technology, components, roles, and software supplicants
– • Troubleshoot Cisco ISE policy and third-party network access device (NAD) support
– • Describe Cisco ISE TrustSec configurations
– • Describe the Cisco ISE profiler service
– • Describe profiling best practices and reporting
– • Configure endpoint compliance
– • Configure client posture services
– • Configure Cisco ISE device administration
– • Describe the four main use cases within C2C

No specific prerequisites are required for this course. Basic computer literacy and familiarity with fundamental concepts in the subject area are recommended for the best learning experience.

• C2C Fundamentals
• C2C Fundamentals
• C2C Fundamentals
• Cisco Identity-Based Networking Services
• Cisco Identity-Based Networking Services
• Cisco Identity-Based Networking Services
• 802.1X EAP Authentication
• 802.1X EAP Authentication
• 802.1X EAP Authentication
• Configure Devices for 802.1X Operation
• Configure Devices for 802.1X Operation
• Configure Devices for 802.1X Operation
• Configure Access for Non-Supplicant Devices
• Configure Access for Non-Supplicant Devices
• Configure Access for Non-Supplicant Devices
• Introducing Cisco ISE Architecture
• Introducing Cisco ISE Architecture
• Introducing Cisco ISE Architecture
• Introducing Cisco ISE Deployment
• Introducing Cisco ISE Deployment
• Introducing Cisco ISE Deployment
• Introducing Cisco ISE Policy Enforcement Components
• Introducing Cisco ISE Policy Enforcement Components
• Introducing Cisco ISE Policy Enforcement Components
• Introducing Cisco ISE Policy Configuration
• Introducing Cisco ISE Policy Configuration
• Introducing Cisco ISE Policy Configuration
• PKI and Advanced Supplicants
• PKI and Advanced Supplicants
• PKI and Advanced Supplicants
• Troubleshooting Cisco ISE Policy and Third-Party NAD Support
• Troubleshooting Cisco ISE Policy and Third-Party NAD Support
• Troubleshooting Cisco ISE Policy and Third-Party NAD Support
• Exploring Cisco TrustSec
• Exploring Cisco TrustSec
• Exploring Cisco TrustSec
• Introducing the Cisco ISE Profiler
• Introducing the Cisco ISE Profiler
• Introducing the Cisco ISE Profiler
• Introducing Profiling Best Practices and Reporting
• Introducing Profiling Best Practices and Reporting
• Introducing Profiling Best Practices and Reporting
• Introducing Cisco ISE Endpoint Compliance Services
• Introducing Cisco ISE Endpoint Compliance Services
• Introducing Cisco ISE Endpoint Compliance Services
• Configuring Client Posture Services and Compliance
• Configuring Client Posture Services and Compliance
• Configuring Client Posture Services and Compliance
• Working with Network Access Devices
• Working with Network Access Devices
• Working with Network Access Devices
• C2C Use Cases
• C2C Use Cases
• C2C Use Cases
• Lab Outline
• Lab Outline
• Lab Outline
• C2C Fundamentals
• C2C Fundamentals
• C2C Fundamentals
• Cisco Identity-Based Networking Services
• Cisco Identity-Based Networking Services
• Cisco Identity-Based Networking Services
• Introducing Cisco ISE Architecture
• Introducing Cisco ISE Architecture
• Introducing Cisco ISE Architecture
• Introducing Cisco ISE Deployment
• Introducing Cisco ISE Deployment
• Introducing Cisco ISE Deployment
• Introducing Cisco ISE Policy Enforcement Components
• Introducing Cisco ISE Policy Enforcement Components
• Introducing Cisco ISE Policy Enforcement Components
• Introducing Cisco ISE Policy Configuration
• Introducing Cisco ISE Policy Configuration
• Introducing Cisco ISE Policy Configuration
• PKI and Advanced Supplicants
• PKI and Advanced Supplicants
• PKI and Advanced Supplicants
• Introducing the Cisco ISE Profiler
• Introducing the Cisco ISE Profiler
• Introducing the Cisco ISE Profiler
• Introducing Cisco ISE Endpoint Compliance Services
• Introducing Cisco ISE Endpoint Compliance Services
• Introducing Cisco ISE Endpoint Compliance Services
• Configuring Client Posture Services and Compliance
• Configuring Client Posture Services and Compliance
• Configuring Client Posture Services and Compliance
• Introducing Profiling Best Practices and Reporting
• Introducing Profiling Best Practices and Reporting
• Introducing Profiling Best Practices and Reporting
• C2C Use Cases
• C2C Use Cases
• C2C Use Cases
• Troubleshooting Cisco ISE Policy and Third-Party NAD Support
• Troubleshooting Cisco ISE Policy and Third-Party NAD Support
• Troubleshooting Cisco ISE Policy and Third-Party NAD Support
• Exploring Cisco TrustSec
• Exploring Cisco TrustSec
• Exploring Cisco TrustSec
• Working with Network Access Devices
• Working with Network Access Devices
• Working with Network Access Devices
• Lab Outline
• Lab Outline
• Lab Outline

Class Dates & Times
Filters Sort results
Reset Apply
6/23/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$4,995.00
8/25/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$4,995.00
10/27/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$4,995.00
12/15/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$4,995.00
— Questions?

Information Request

— Empower Change

Invest in Skills & Equality

Support Diversity, Equity, and Inclusion with Every Purchase.

Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.