top of page


Implementing and Configuring the Cisco Identity Services Engine

Cisco Learning Partner Logo_2021.png


USD 500 excl. VAT

Digital Learning

CCNA copy.jpg



To fully benefit from this course, you should have the following knowledge:
• Familiarity with the Cisco IOS® Software Command-Line Interface (CLI)
• Familiarity with Cisco AnyConnect® Secure Mobility Client
• Familiarity with Microsoft Windows operating systems
• Familiarity with 802.1X

Recommended Cisco learning offerings that may help you meet these prerequisites:
• Cisco CCNP® Security Certification training
• Introduction to 802.1X Operations for Cisco Security Professionals (802.1X)

What you'll will learn

What you’ll learn in this course

The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco® Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice,

you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.
This course helps you prepare to take the exam, Implementing and Configuring Cisco Identity Services Engine (300-715 SISE), which leads to CCNP® Security and the Cisco Certified Specialist - Security Identity Management Implementation certifications. This course also earns you 40 Continuing Education
(CE) credits towards recertification.


Course Objectives

After taking this course, you should be able to:
• Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages
• Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services
• Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization
• Describe third-party Network Access Devices (NADs), Cisco TrustSec®, and Easy Connect
• Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios
• Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment

• Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution
• Describe the value of the My Devices portal and how to configure this portal
• Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE
• Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols
• Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool

Course Outline


•Introducing Cisco ISE Architecture and Deployment
oUsing Cisco ISE as a Network Access Policy Engine
oCisco ISE Use CasesoDescribing Cisco ISE Functions
oCisco ISE Deployment ModelsoContext Visibility
•Cisco ISE Policy Enforcement
oUsing 802.1X for Wired and Wireless Access
oUsing MAC Authentication Bypass for Wired and Wireless Access
oIntroducing Identity Management
oConfiguring Certificate Services
oIntroducing Cisco ISE Policy
oImplementing Third-Party Network Access Device Support
oIntroducing Cisco TrustSec
oCisco TrustSec Configuration
oEasy Connect
•Web Authentication and Guest Services
oIntroducing Web Access with Cisco ISE
oIntroducing Guest Access Components
oConfiguring Guest Access Settings
oConfiguring Sponsor and Guest Portals

•Cisco ISE Profiler
oIntroducing Cisco ISE Profiler
oProfiling Deployment and Best Practices
oIntroducing the Cisco ISE BYOD Process
oDescribing BYOD Flow
oConfiguring the My Devices Portal
oConfiguring Certificates in BYOD Scenarios
•Cisco ISE Endpoint Compliance Services
oIntroducing Endpoint Compliance Services
oConfiguring Client Posture Services and Provisioning in Cisco ISE
•Working with Network Access Devices
oReview TACACS+
oCisco ISE TACACS+ Device Administration
oConfigure TACACS+ Device Administration
oTACACS+ Device Administration Guidelines and Best Practices
oMigrating from Cisco ACS to Cisco ISEFast

Further information

If you would like to know more about this course please contact us

bottom of page