Cisco ISE
Moiz moiz
3:46:33
Description
Securing endpoints BYOD or guest, segmenting the network and securing & restrict access to the network
What You'll Learn?
- Cisco ISE technology
- Cisco ISE implementation
- Cisco ISE security
- Cisco ISE BYOD implementation
Who is this for?
More details
DescriptionIn this course you will learn about the cisco ISE, you will learn about the requirements of the ISE in virtual environments, deployments types according to your organizations, HA implementations information, learning to navigate in cisco ISE, create custom Dashboards and dashlets for quick access to the information you need, most importantly to secure ISE CLI and GUIÂ access to administrators and finally securing the ISEÂ communications with PCs.
âIn zero-trust architecture, ISE is the policy decision point. It gathers intel from the stack to authenticate users and endpoints, automatically containing threats.
âHarness the power of resilienceâ - Resilience begins with secure connections. ISE helps ensure that only trusted users and their devices can access resources across your self-managed network.
Visibility better than 20/20 - Knowing who's connecting to your network, what devices they're on, and what connection they're using is key. ISE uses key intel to automatically identify, classify, and profile devices.
Access control is in your hands - Set up and secure connections with virtual LAN (VLAN) assignments, Access Control Lists (dACLs), URL redirects,. and named ACLs, all designed to undermine unwanted connections quickly and easily.
Onboard effortlessly every time - Reduce tickets for your help desk and deliver a better user experience by empowering users to add and manage their own devices through self-service portals, such as SAML 2.0.
Who this course is for:
- Administrators, Security officer, Security administrator, Managed Service Support
In this course you will learn about the cisco ISE, you will learn about the requirements of the ISE in virtual environments, deployments types according to your organizations, HA implementations information, learning to navigate in cisco ISE, create custom Dashboards and dashlets for quick access to the information you need, most importantly to secure ISE CLI and GUIÂ access to administrators and finally securing the ISEÂ communications with PCs.
âIn zero-trust architecture, ISE is the policy decision point. It gathers intel from the stack to authenticate users and endpoints, automatically containing threats.
âHarness the power of resilienceâ - Resilience begins with secure connections. ISE helps ensure that only trusted users and their devices can access resources across your self-managed network.
Visibility better than 20/20 - Knowing who's connecting to your network, what devices they're on, and what connection they're using is key. ISE uses key intel to automatically identify, classify, and profile devices.
Access control is in your hands - Set up and secure connections with virtual LAN (VLAN) assignments, Access Control Lists (dACLs), URL redirects,. and named ACLs, all designed to undermine unwanted connections quickly and easily.
Onboard effortlessly every time - Reduce tickets for your help desk and deliver a better user experience by empowering users to add and manage their own devices through self-service portals, such as SAML 2.0.
Who this course is for:
- Administrators, Security officer, Security administrator, Managed Service Support
User Reviews
Rating
Moiz moiz
Instructor's Courses
Udemy
View courses Udemy- language english
- Training sessions 20
- duration 3:46:33
- Release Date 2023/03/29