Cisco ISE

Securing endpoints BYOD or guest, segmenting the network and securing & restrict access to the network

Ratings 4.00 / 5.00
Cisco ISE

What You Will Learn!

  • Cisco ISE technology
  • Cisco ISE implementation
  • Cisco ISE security
  • Cisco ISE BYOD implementation

Description

In this course you will learn about the cisco ISE, you will learn about the requirements of the ISE in virtual environments, deployments types according to your organizations, HA implementations information, learning to navigate in cisco ISE, create custom Dashboards and dashlets for quick access to the information you need, most importantly to secure ISE CLI and GUI access to administrators and finally securing the ISE communications with PCs.

​In zero-trust architecture, ISE is the policy decision point. It gathers intel from the stack to authenticate users and endpoints, automatically containing threats.

​Harness the power of resilience​ - Resilience begins with secure connections. ISE helps ensure that only trusted users and their devices can access resources across your self-managed network.

Visibility better than 20/20 - Knowing who's connecting to your network, what devices they're on, and what connection they're using is key. ISE uses key intel to automatically identify, classify, and profile devices.

Access control is in your hands - Set up and secure connections with virtual LAN (VLAN) assignments, Access Control Lists (dACLs), URL redirects,. and named ACLs, all designed to undermine unwanted connections quickly and easily.

Onboard effortlessly every time - Reduce tickets for your help desk and deliver a better user experience by empowering users to add and manage their own devices through self-service portals, such as SAML 2.0.

Who Should Attend!

  • Administrators, Security officer, Security administrator, Managed Service Support

TAKE THIS COURSE

Tags

  • Cisco ISE

Subscribers

4

Lectures

20

TAKE THIS COURSE