Cisco Identity Services Engine (ISE) 2.7 Training Part-22

Cisco Identity Services Engine (ISE) 2.7 Training Part-2/2

Description

This course is designed to teach you everything you need to know to get up and running with ISE quickly. This course is structured and designed to teach the “how to” of Cisco Identity Services Engine and to give students  understanding of ISE deployment/configuration. In this course you will learn about ISE deployment scenarios, ISE installation and bootstrapping, configuration of authentication and authorization policies, profiling, posture check, admin access and many more.

The Cisco Identity Services Engine (ISE) is your one-stop solution to streamline security policy management and reduce operating costs. With ISE, you can see users and devices controlling access across wired, wireless, and VPN connections to the corporate network.

A critical component of any zero-trust strategy is securing the workplace that everyone and everything connects to. Cisco Identity Services Engine (ISE) enables a dynamic and automated approach to policy enforcement that simplifies the delivery of highly secure network access control. ISE empowers software-defined access and automates network segmentation within IT and OT environments.

Gain visibility with context and control

Know who, what, where, and how endpoints and devices are connecting. Look deep into devices to ensure compliance and limit risk–with or without an agent.

How to deploy and use Cisco Identity Services Engine (ISE) v2.7, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.

Leave a Reply