In this course you will learn about the Cisco ISE, you will learn about the requirements of the ISE in virtual environments, deployments types according to your organization, HA implementations information, learning to navigate in Cisco ISE, create custom Dashboards and dashlets for quick access to the information you need, most importantly to secure ISE CLI and GUI access to administrators and finally securing the ISE communications with PCs.
In zero-trust architecture, ISE is the policy decision point. It gathers intel from the stack to authenticate users and endpoints, automatically containing threats.
Harness the power of resilience - Resilience begins with secure connections. ISE helps ensure that only trusted users and their devices can access resources across your self-managed network.
Visibility better than 20/20 - Knowing who's connecting to your network, what devices they're on, and what connection they're using is key. ISE uses key intel to automatically identify, classify, and profile devices.
Access control is in your hands - Set up and secure connections with virtual LAN (VLAN) assignments, Access Control Lists (ACLs), and URL redirects, and named ACLs, all designed to undermine unwanted connections quickly and easily.
Onboard effortlessly every time - Reduce tickets for your help desk and deliver a better user experience by empowering users to add and manage their own devices through self-service portals, such as SAML 2.0.
Cisco ISE technology
Cisco ISE implementation
Cisco ISE security
Cisco ISE BYOD implementation
General Knowledge of networking