Description
CCNP Security: Cisco SISE 300-715 Course – Master Cisco ISE Implementation
Cisco SISE 300-715 Course – Gain expert knowledge in implementing and configuring Cisco Identity Services Engine (ISE) for the SISE 300-715 certification and real-world network security deployment.
What You’ll Learn in Cisco SISE 300-715 Course
- Understanding Cisco ISE architecture, node types, and deployment models
- Configuring network access control using Cisco ISE
- Developing ISE policies for users, guests, BYOD, and headless devices
- Implementing device identification and onboarding strategies
- Compliance enforcement and network device control with ISE
- Deploying Cisco ISE with third-party integrations
- Preparing for the SISE 300-715 certification exam
Prerequisites for Learning Cisco SISE 300-715 Course
- Basic understanding of network fundamentals (routing and switching)
- Familiarity with security concepts and policies
- Experience with network design and deployment is beneficial
Course Description: Master Cisco ISE for CCNP Security
The Cisco SISE 300-715 Course is designed to help IT security professionals, network engineers, and CCNP Security candidates master Cisco Identity Services Engine (ISE) for network access control. This course provides a blend of real-world experience, best practices, and exam-focused training to help learners confidently implement and configure ISE for enterprise security.
Through hands-on demonstrations and expert-led instruction, you’ll learn how to develop an ISE architecture, deploy network access control solutions, and create secure policies for users and devices. The course also covers the different phases of deployment (crawl, walk, and run) and teaches you how to troubleshoot and optimize your ISE implementation.
By the end of this course, you’ll be well-prepared for the SISE 300-715 certification exam and have the skills to deploy Cisco ISE in real-world environments.
Explore These Valuable Resources
- Cisco CCNP Security Certification Guide
- Cisco SISE 300-715 Exam Overview
- Cisco Identity Services Engine (ISE) Overview
Explore Related Courses
- CCNP Security Courses
- Cisco Certification Courses
- Network Security Courses
- Access Control Security Courses
- Identity Management Courses
About the Author
This course is developed by certified Cisco security experts with extensive experience in implementing Cisco ISE and preparing IT professionals for CCNP Security certifications. Their hands-on approach ensures that you gain real-world skills alongside your exam preparation.
Lesson Descriptions
Module 1, “ISE fundamentals,” introduces the ISE key concepts you will need to know before moving on to other topics. In this course, we will cover the requirements for the SISE exam as well as recommendations and best practices we have learned from deploying ISE for various customers. By the end of this module, you should have a general understanding of Cisco ISE core concepts as well as know how to develop a plan to deploy each phase of an ISE engagement.
Module 2, “Policies,” moves into the specifics of how the solution works. This module reviews how to build ISE policies, which includes managing identities of users and devices. Policies are the essential backbone of an ISE deployment, so having a good understanding of the different types of policies and components is essential to a successful implementation.
Module 3, “Device Identification and Onboarding,” will look at three important deployment concepts that are usually encountered during an ISE deployment. First, guest access is covered, and then onto profiling, which is how to fingerprint devices. The module rounds out with BYOD.
Module 4, “Compliance and Network Device Control,” dives into endpoint compliance, and adding and managing network access devices. Another term for endpoint compliance is posture, which tends to be part of the later phases of an ISE deployment. ISE uses NADs or network devices to enforce policies, so it is important to understand how to add and manage NADs to successfully deploy a ISE solution.
Table of contents
Introduction
CCNP Security Cisco Identity Services Engine SISE 300-715:
Introduction
Module 1: ISE Fundamentals
Module introduction
Lesson 1: NAC architecture and deployment strategies
Learning objectives
1.1 Introducing ISE
1.2 Understanding ISE deployment options–Part 1
1.3 Understanding ISE deployment options–Part 2
1.4 Understanding ISE deployment options–Part 3
1.5 Understanding ISE and certificates–Part 1
1.6 Understanding ISE and certificates–Part 2
1.7 Understanding and configuring ISE personas
1.8 How people and process impact ISE deployments
Module 2: Policies
Module introduction
Lesson 2: Identity Management
Learning objectives
2.1 Introducing ISE policies–Part 1
2.2 Introducing ISE policies–Part 2
2.3 Introducing ISE policies–Part 3
2.4 Fundamentals of AAA
2.5 Configuring native Active Directory (AD)–Part 1
2.6 Configuring native Active Directory (AD)–Part 2
2.7 Configuring LDAP
2.8 Troubleshooting AD
2.9 Understanding ISE Identity Store
2.10 Identity Store options–Part 1
2.11 Identity Store options–Part 2
2.12 Troubleshooting ISE Identity Stores
Lesson 3: 802.1x and MAC Address Bypass (MAB)
Learning objectives
3.1 Configuring 802.1x wired/wireless network access–Part 1
3.2 Configuring 802.1x wired/wireless network access–Part 2
3.3 Configuring 802.1x wired/wireless network access–Part 23
3.4 Configuring 802.1x wired/wireless network access–Part 4
3.5 Understanding phased deployments for 802.1x–Part 1
3.6 Understanding phased deployments for 802.1x–Part 2
3.7 Understanding Network Access Device (NAD)
3.8 Configuring NAD
3.9 Troubleshooting NAD
3.10 Understanding MAC Address Bypass (MAB)
3.11 Configuring MAB–Part 1
3.12 Configuring MAB–Part 2
3.13 Troubleshooting MAB
Lesson 4: TrustSec
Learning objectives
4.1 Introducing TrustSec
4.2 Cisco TrustSec overview and devices configuration–Part 1
4.3 Cisco TrustSec overview and devices configuration–Part 2
4.4 Cisco TrustSec overview and devices configuration–Part 3
4.5 Cisco TrustSec policy configuration for ISE–Part 1
4.6 Cisco TrustSec policy configuration for ISE–Part 2
4.7 Troubleshooting TrustSec and ISE
Module 3: Device Identification and Onboarding
Module introduction
Lesson 5: Guest Services
Learning objectives
5.1 Planning guest services
5.2 Onboarding guests
5.2 Configuring guest services–Part 1
5.4 Configuring guest services–Part 2
5.3 Configuring guest services–Part 23
5.6 Configuring sponsor and guest portals–Part 1
5.7 Configuring sponsor and guest portals–Part 2
5.8 Configuring sponsor and guest portals–Part 3
5.9 Troubleshooting guest services–Part 1
5.10 Troubleshooting guest services–Part 2
Lesson 6: Profiling overview
Learning objectives
6.1 Introducing profiling
6.2 Profiling interworkings–Part 1
6.3 Profiling interworkings–Part 2
6.4 Implementing profiling services–Part 1
6.5 Implementing profiling services–Part 2
6.6 Implementing profiling services–Part 3
6.7 Configuring switches for profiling services
6.8 Profiling reports
6.9 Implementing probes
6.10 Probe overview
6.11 Profiling best practices
6.12 Implementing Change of Authorization (CoA)
6.13 Configuring endpoint identity management–Part 1
6.14 Configuring endpoint identity management–Part 2
6.15 Troubleshooting profiling
Lesson 7: Bring Your own Device (BYOD) overview
Learning objectives
7.1 Introducing BYOD–Part 1
7.2 Introducing BYOD–Part 2
7.3 Selling BYOD to endusers
7.4 Planning BYOD–Part 1
7.5 Planning BYOD–Part 2
7.6 Planning BYOD–Part 3
7.7 Overview of Cisco BYOD functionality–Part 1
7.8 Overview of Cisco BYOD functionality–Part 2
7.9 Configuring BYOD on-boarding using internal CA–Part 1
7.10 Configuring BYOD on-boarding using internal CA–Part 2
7.11 Configuring BYOD on-boarding using internal CA–Part 3
7.12 Onboarding mobile device management
7.13 Configuring certificates for BYOD
7.14 Configuring blacklist/whitelist–Part 1
7.15 Configuring blacklist/whitelist–Part 2
7.16 Troubleshooting BYOD
Module 4: Compliance and Network Device Control
Module introduction
Lesson 8: Endpoint compliance
Learning objectives
8.1 Introducing endpoint compliance
8.2 Understanding endpoint compliance, posture services, and client provisioning
8.3 Understanding posture conditions and policy
8.4 Understanding client provisioning
8.5 Understanding compliance modules
8.6 Understanding ISE posture agents and operational modes–Part 1
8.7 Understanding ISE posture agents and operational modes–Part 2
8.8 Understanding ISE posture agents and operational modes–Part 2 3
8.9 Understanding Supplicants–Part 1
8.10 Understanding Supplicants–Part 2
8.11 Troubleshooting ISE posture–Part 1
8.12 Troubleshooting ISE posture–Part 2
Lesson 9: Network Access Device (NAD) administration
Learning objectives
9.1 Introducing NAD administration
9.2 Configuring TACACS+ devices–Part 1
9.3 Configuring TACACS+ devices–Part 2
9.4 Understanding command authorization–Part 1
9.5 Understanding command authorization–Part 2
9.6 Troubleshooting network device administration
Lesson 10: Closing items
Learning objectives
10.1 Course overview
Summary
CCNP Security Cisco Identity Services Engine SISE 300-715: Summary
Discover more from Expert Training
Subscribe to get the latest posts sent to your email.
Reviews
There are no reviews yet.