Module 1: ISE Intro

• Introducing Web Access with Cisco ISE
• Introducing ISE Guest Access Components
• Configuring Guest Access Services
• Configuring Portals: Sponsors and Guests
• Cisco ISE Profiler

• Introducing Cisco ISE Profiler
• Configuring Cisco ISE Profiling

Module2: Cisco ISE BYOD

• Introducing the Cisco ISE BYOD Process
• Describing BYOD Flow
• Configuring My Devices Portal Settings
• Configuring Certificates in BYOD Scenarios

Module3: Cisco ISE Endpoint Compliance Services

• Introducing Endpoint Compliance
• Configuring Client Posture Services and Provisioning in Cisco ISE

Module4: Cisco ISE with AMP and VPN-Based Services

• Introducing VPN Access Using Cisco ISE
• Configuring Cisco AMP for ISE
• Cisco ISE Integrated Solutions with API’s
• Introducing Location-Based Authorization Introducing Cisco ISE2.x pxgrid
• Working with Network Access Devices

Module 5: Configuring TACACS+ for Cisco ISE Device Administration

Module 6: Cisco ISE Endpoint Compliance Services

• Posture service
• Conditions
• Compliance module Flow
• Agents
• Deployment and licensing
• Client provisioning
• Posture general settings
• Client provisioning portal and policy

Module7: Cisco ISE Design

• Designing and Deployment Best Practices
• Performing Cisco ISE Installation and Configuration Best Practices
• Deploying Failover and High Availability
• Configuring Third Party NAD Support
• Configuring Third-Party NAD Support
• Monitoring and Troubleshooting ISE

Module 8: Monitoring and Troubleshooting Service in Cisco ISE Device Configuration for Monitoring

• Troubleshooting the Anyconnect Agent Download Issues
• Troubleshooting the Profiler Feed
• Posture Compliance
• SNMP Traps To Monitor Cisco ISE Processes
• Cisco ISE Alarms
• Log Collection
• Live Authentications
• Global Search for Endpoints

Module 9: Cisco TrustSec

• TrustSec Architecture
• TrustSec Dashboard
• Configure TrustSec Global Settings
• Configure TrustSec Matrix Settings
• Configure TrustSec Devices
• Configure TrustSec AAA Servers
• Security Groups Configuration
• Egress Policy
• SGT Assignment
• TrustSec Configuration and Policy Push
• Security Group Tag Exchange Protocol

Firepower vs ASA

• Introducing to FTD
• Difference between ASA vs FTD
• Installation of FTD
• Configuring FTD-Network
• Basic packet flow
• Installation of FMC
• Adding the Sensor
• Exploring and Managing FMC
• Licensing on FMC
• Configuring system policies
• Health Monitoring
• Creating IDP/ACP/File Policy/SSL policies
• Application detection rules.
• Event Analysis
• Creating and managing users
• Safe search
• Configuring VPN
• Packet-tracer and Capture feature