• CATALOG
  • MILITARY
  • FINANCIAL ASSISTANCE
  • LOGIN
      Forget your password?
  • Open Search Dialog
Home > Training Programs > Networking > Cisco CCNP Security: SCOR & SISE (Vouchers Included)

Cisco CCNP Security: SCOR & SISE (Vouchers Included)

This course is intended for network security engineers and those looking to attain their CCNP Security certification.

Cisco-CCNP-Security-SCOR-SISE
$4,355.00 (USD)

Have a question?We're here to help

Overview

Objective

Outline

  1. Security Foundations
    1. Attacks against on-premises and cloud resources
    2. Common security vulnerabilities
    3. Cryptography concepts and applications
    4. Managing Cisco security devices via application programming interfaces (APIs)
  2. Implementing Security
    1. Security in common cloud environments
    2. Division of responsibility (shared responsibility model)
    3. DevSecOps, continuous integration, and orchestration
  3. Cloud Concepts and Security
    1. Configuring and Verifying VLANs
    2. Configuring and Verifying Trunks
    3. VLAN Trunking Protocol (VTP)
    4. STP Overview and Algorithm Deep Dive
    5. STP Convergence, Configuration and Manipulation
    6. STP PortFast, and BPDU Guard
    7. Multiple Spanning Tree Protocol (MSTP)
    8. EtherChannels
    9. Inter-VLAN Routing
    10. First-Hop Redundancy Protocol (FHRP)
  4. Application-Specific Security Tools
    1. Email Security Appliance (ESA)
    2. Web Security Appliance (WSA)
    3. Cloud Email Security (CES)
    4. Securing DNS with Cisco Umbrella
  5. Securing Endpoints
    1. Antimalware concepts
    2. Mobile device management (MDM)
    3. Multifactor authentication (MFA)
    4. Network access control
    5. Patch management
  6. Network Access Control and Visibility
    1. 802.1x, WebAuth, and MAB
    2. Network visibility and evasion techniques
    3. Cisco network analytics technologies
  7. Introducing Cisco ISE Architecture and Deployment
    1. Using Cisco ISE as a Network Access Policy Engine
    2. Cisco ISE Use Cases
    3. Describing Cisco ISE Functions
    4. Cisco ISE Deployment Models
    5. Context Visibility
  8. Cisco ISE Policy Enforcement
    1. Using 802.1X for Wired and Wireless Access
    2. Using MAC Authentication Bypass for Wired and Wireless Access
    3. Introducing Identity Management
    4. Configuring Certificate Services
    5. Introducing Cisco ISE Policy
    6. Implementing Third-Party Network Access Device Support
    7. Introducing Cisco TrustSec
    8. Cisco TrustSec Configuration
    9. Easy Connect
  9. Web Authentication and Guest Services
    1. Introducing Web Access with Cisco ISE
    2. Introducing Guest Access Components
    3. Configuring Guest Access Settings
    4. Configuring Sponsor and Guest Portals
  10. Cisco ISE Profiler
    1. Introducing Cisco ISE Profiler
    2. Profiling Deployment and Best Practices
  11. Cisco ISE BYOD
    1. Introducing the Cisco ISE BYOD Process
    2. Describing BYOD Flow
    3. Configuring the My Devices Portal
    4. Configuring Certificates in BYOD Scenarios
  12. Cisco ISE Endpoint Compliance Services
    1. Introducing Endpoint Compliance Services
    2. Configuring Client Posture Services and Provisioning in Cisco ISE
  13. Working with Network Access Devices
    1. Review TACACS+
    2. Cisco ISE TACACS+ Device Administration
    3. Configure TACACS+ Device Administration
    4. TACACS+ Device Administration Guidelines and Best Practices
    5. Migrating from Cisco ACS to Cisco ISE

Requirements

Prerequisites

You've got questions.
We're here to help.

Our highly knowledgeable Enrollment Specialists will answer any questions you might have about the course and payment options.

REQUEST INFO

Instructor

FAQs

You've got questions.
We're here to help.

Our highly knowledgeable Enrollment Specialists will answer any questions you might have about the course and payment options.

REQUEST INFO
San Diego State University Global Campus

5250 Campanile Drive
San Diego, CA 92182-1920 US
MAIN CONTENT

Copyright © 1997 - 2024 All rights reserved. The material on this site cannot be reproduced or redistributed unless you have obtained prior written permission from Cengage Learning. Privacy Policy