Price:
$4,995.00
Days:
1
Virtual
– • Define DoD C2C, including its steps and alignment with ISE features/functions and Zero Trust
– • Describe Cisco Identity-Based Networking Services
– • Explain 802.1X extensible authentication protocol (EAP)
– • Configure devices for 802.1X operation
– • Configure access for non-supplicant devices
– • Describe the Cisco Identity Services Engine
– • Explain Cisco ISE deployment
– • Describe Cisco ISE policy enforcement concepts
– • Describe Cisco ISE policy configuration
– • Explain PKI fundamentals, technology, components, roles, and software supplicants
– • Troubleshoot Cisco ISE policy and third-party network access device (NAD) support
– • Describe Cisco ISE TrustSec configurations
– • Describe the Cisco ISE profiler service
– • Describe profiling best practices and reporting
– • Configure endpoint compliance
– • Configure client posture services
– • Configure Cisco ISE device administration
– • Describe the four main use cases within C2C
No specific prerequisites are required for this course. Basic computer literacy and familiarity with fundamental concepts in the subject area are recommended for the best learning experience.
• C2C Fundamentals
• C2C Fundamentals
• C2C Fundamentals
• Cisco Identity-Based Networking Services
• Cisco Identity-Based Networking Services
• Cisco Identity-Based Networking Services
• 802.1X EAP Authentication
• 802.1X EAP Authentication
• 802.1X EAP Authentication
• Configure Devices for 802.1X Operation
• Configure Devices for 802.1X Operation
• Configure Devices for 802.1X Operation
• Configure Access for Non-Supplicant Devices
• Configure Access for Non-Supplicant Devices
• Configure Access for Non-Supplicant Devices
• Introducing Cisco ISE Architecture
• Introducing Cisco ISE Architecture
• Introducing Cisco ISE Architecture
• Introducing Cisco ISE Deployment
• Introducing Cisco ISE Deployment
• Introducing Cisco ISE Deployment
• Introducing Cisco ISE Policy Enforcement Components
• Introducing Cisco ISE Policy Enforcement Components
• Introducing Cisco ISE Policy Enforcement Components
• Introducing Cisco ISE Policy Configuration
• Introducing Cisco ISE Policy Configuration
• Introducing Cisco ISE Policy Configuration
• PKI and Advanced Supplicants
• PKI and Advanced Supplicants
• PKI and Advanced Supplicants
• Troubleshooting Cisco ISE Policy and Third-Party NAD Support
• Troubleshooting Cisco ISE Policy and Third-Party NAD Support
• Troubleshooting Cisco ISE Policy and Third-Party NAD Support
• Exploring Cisco TrustSec
• Exploring Cisco TrustSec
• Exploring Cisco TrustSec
• Introducing the Cisco ISE Profiler
• Introducing the Cisco ISE Profiler
• Introducing the Cisco ISE Profiler
• Introducing Profiling Best Practices and Reporting
• Introducing Profiling Best Practices and Reporting
• Introducing Profiling Best Practices and Reporting
• Introducing Cisco ISE Endpoint Compliance Services
• Introducing Cisco ISE Endpoint Compliance Services
• Introducing Cisco ISE Endpoint Compliance Services
• Configuring Client Posture Services and Compliance
• Configuring Client Posture Services and Compliance
• Configuring Client Posture Services and Compliance
• Working with Network Access Devices
• Working with Network Access Devices
• Working with Network Access Devices
• C2C Use Cases
• C2C Use Cases
• C2C Use Cases
• Lab Outline
• Lab Outline
• Lab Outline
• C2C Fundamentals
• C2C Fundamentals
• C2C Fundamentals
• Cisco Identity-Based Networking Services
• Cisco Identity-Based Networking Services
• Cisco Identity-Based Networking Services
• Introducing Cisco ISE Architecture
• Introducing Cisco ISE Architecture
• Introducing Cisco ISE Architecture
• Introducing Cisco ISE Deployment
• Introducing Cisco ISE Deployment
• Introducing Cisco ISE Deployment
• Introducing Cisco ISE Policy Enforcement Components
• Introducing Cisco ISE Policy Enforcement Components
• Introducing Cisco ISE Policy Enforcement Components
• Introducing Cisco ISE Policy Configuration
• Introducing Cisco ISE Policy Configuration
• Introducing Cisco ISE Policy Configuration
• PKI and Advanced Supplicants
• PKI and Advanced Supplicants
• PKI and Advanced Supplicants
• Introducing the Cisco ISE Profiler
• Introducing the Cisco ISE Profiler
• Introducing the Cisco ISE Profiler
• Introducing Cisco ISE Endpoint Compliance Services
• Introducing Cisco ISE Endpoint Compliance Services
• Introducing Cisco ISE Endpoint Compliance Services
• Configuring Client Posture Services and Compliance
• Configuring Client Posture Services and Compliance
• Configuring Client Posture Services and Compliance
• Introducing Profiling Best Practices and Reporting
• Introducing Profiling Best Practices and Reporting
• Introducing Profiling Best Practices and Reporting
• C2C Use Cases
• C2C Use Cases
• C2C Use Cases
• Troubleshooting Cisco ISE Policy and Third-Party NAD Support
• Troubleshooting Cisco ISE Policy and Third-Party NAD Support
• Troubleshooting Cisco ISE Policy and Third-Party NAD Support
• Exploring Cisco TrustSec
• Exploring Cisco TrustSec
• Exploring Cisco TrustSec
• Working with Network Access Devices
• Working with Network Access Devices
• Working with Network Access Devices
• Lab Outline
• Lab Outline
• Lab Outline
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.
Give your organization the skills edge it needs. Our corporate training experts will work with you to design, deliver, and support a customized IT program that drives real business results.