دوره امنیتی سیسکو CCNP Security Cisco Identify Services Engine SISE 300-715، پیاده سازی و بکارگیری پلتفرم کنترل دسترسی به شبکه براساس احراز هویت و نحوه اجرای پالیسی های سیسکو Cisco Identity Services Engine (ISE)، که سبب سهولت سازگاری ، کنترل دسترسی و امنیت بالا در ارتباطات سیمی، وایرلس و VPN ، دانش و مهارت لازم در استقرار Cisco ISE شامل اجرای Policy enforcement ، سرویس های profiling ، سرویس های تأیید هویت تحت وب و دسترسی مهمان، BYOD، سرویس های انطباق پذیری endpoint ها و مدیریت دیوایس ها با استفاده از پروتکل +TACACS، قابلیت مانیتورینگ شبکه در تمامی سطوح ، بهبود مدیریت policy های امنیتی و کارآیی عملکرد را از طریق آموزش های تخصصی و تمرین های عملی به شما آموزش می دهد. این دوره یک منبع جامع جهت آمادگی شرکت در آزمون سیسکو CCNP SISE 300-715 می باشد.
لینک دانلود دوره آموزشی سیسکو CCNP Security Cisco Identify Services Engine SISE 300-715
حجم: 6.30 گیگابایت
رمز فایل: technet24.ir
Cisco ISE Configuring 802.1x wired_wireless Network Access
- Copyright 2020
- Price: $399.99
- Edition: 1st
- ISBN-10: 0-13-667717-7
- ISBN-13: 978-0-13-667717-8
- By: Joseph Muniz, Kevin Tigges
- Published: Feb 28, 2020
- By: Pearson IT Certification
- Part of the LiveLessons series
8+ Hours of Video Instruction
CCNP Security Management (SISE) 300-715 Complete Video Course focuses on implementing and configuring Cisco Identity Services Engine for preparation for the SISE 300-715 certification, and providing the necessary skills for real-world deployment scenarios.
CCNP Security Management (SISE) 300-715 Complete Video Course focuses on a blend of the real-world experience and best practices mixed with the requirements for the CCNP SISE 300-715 exam. The goal of the course is to not only cover the objectives for the SISE 300-715, but also provide a solid learning resource for mastering key concepts regarding planning and delivering a Cisco ISE solution. Topics include how to develop an ISE architecture; what to consider during the crawl, walk, and run phases of a deployment; and how to support a mature ISE deployment. The course walks you through a successful deployment and elaborates on how to avoid common pitfalls. The course includes many examples and demos of how to configure the technology, so the viewer can follow along with their own lab to master each concept.
Module 1: ISE Fundamentals
Module 2: Policies
Module 3: Device Identification and Onboarding
Module 4: Compliance and Network Device Control
Learn How To
- Understand ISE architecture, node types, and deployment models
- Understand the fundamentals of network access control and the Cisco ISE offering
- Be able to develop ISE policies for users, guests, BYOD, and headless devices
- Develop deployment strategies for ISE with various third party integrations
- Prepare for the SISE 300-715 certification exam
Who Should Take This Course
This course is designed for anybody interested in learning about access control best practices and how to use Cisco Identity Services Engine. This includes those looking to study for the SISE 300-715 exam, as well as those responsible for an organization’s security, looking to deploy network access control using Cisco ISE.
Students should have a basic understanding of how networks function including routing and switching concepts. Experience with designing and deploying networks is a plus. A basic understand of security requirements is also beneficial.
Module 1, “ISE fundamentals,” introduces the ISE key concepts you will need to know before moving on to other topics. In this course, we will cover the requirements for the SISE exam as well as recommendations and best practices we have learned from deploying ISE for various customers. By the end of this module, you should have a general understanding of Cisco ISE core concepts as well as know how to develop a plan to deploy each phase of an ISE engagement.
Module 2, “Policies,” moves into the specifics of how the solution works. This module reviews how to build ISE policies, which includes managing identities of users and devices. Policies are the essential backbone of an ISE deployment, so having a good understanding of the different types of policies and components is essential to a successful implementation.
Module 3, “Device Identification and Onboarding,” will look at three important deployment concepts that are usually encountered during an ISE deployment. First, guest access is covered, and then onto profiling, which is how to fingerprint devices. The module rounds out with BYOD.
Module 4, “Compliance and Network Device Control,” dives into endpoint compliance, and adding and managing network access devices. Another term for endpoint compliance is posture, which tends to be part of the later phases of an ISE deployment. ISE uses NADs or network devices to enforce policies, so it is important to understand how to add and manage NADs to successfully deploy a ISE solution.