Published 2/2023MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 1.81 GB | Duration: 3h 46m
Securing endpoints BYOD or guest, snting the network and securing & restrict access to the network What you'll learn Cisco ISE technology Cisco ISE implementation Cisco ISE security Cisco ISE BYOD implementation Requirements General Knowledge of networking Description In this course you will learn about the cisco ISE, you will learn about the requirements of the ISE in virtual environments, deployments types according to your organizations, HA implementations information, learning to navigate in cisco ISE, create custom Dashboards and dashlets for quick access to the information you need, most importantly to secure ISE CLI and GUI access to administrators and finally securing the ISE communications with PCs.In zero-trust architecture, ISE is the policy decision point. It gathers intel from the stack to authenticate users and endpoints, automatically containing threats.Harness the power of resilience - Resilience bs with secure connections. ISE helps ensure that only trusted users and their devices can access resources across your self-managed network.Visibility better than 20/20 - Knowing who's connecting to your network, what devices they're on, and what connection they're using is key. ISE uses key intel to automatically identify, classify, and profile devices.Access control is in your hands - Set up and secure connections with virtual LAN (VLAN) assignments, Access Control Lists (dACLs), URL redirects,. and named ACLs, all designed to undee unwanted connections quickly and easily.Onboard effortlessly every - Reduce tickets for your help desk and deliver a better user experience by empowering users to add and manage their own devices through self-service portals, such as SAML 2.0. Overview Section 1: Introduction Lecture 1 Self Intro Section 2: Course Overview Lecture 2 Course Overview Section 3: Cisco ISE introduction Lecture 3 Cisco ISE Introduction Section 4: Cisco ISE Features Lecture 4 Cisco ISE Features Section 5: Cisco ISE Capabilities Lecture 5 Cisco ISE Capabilities Section 6: Deployment Types Lecture 6 Deployment Types Section 7: Cisco ISE Teology Lecture 7 Cisco ISE Teologies Section 8: License Lecture 8 Licenses Section 9: High Availability Lecture 9 ISE high availability Section 10: Resources Lecture 10 Resources Section 11: Installation part 1 Lecture 11 Installation part 1 Section 12: Installation part 2 - Esxi Lecture 12 Installation part 2 - ESXI Section 13: Installation part 3 - Windows 2016 Lecture 13 Installation part 3 - windows server 2016 Section 14: Installation part 4 - ISE Lecture 14 Installation part 4 - ISE Section 15: Cisco ISE GUI Lecture 15 Cisco ISE GUI Section 16: Cisco ISE HA config Lecture 16 Cisco ISE HA Section 17: Securing Cisco ISE Lecture 17 Securing Cisco ISE Section 18: Maitenance Lecture 18 Cisco ISE Maitenance Section 19: Securing Web Access Lecture 19 Securing ISE Web Acess Section 20: Course END Lecture 20 Course END Administrators, Security officer, Security administrator, Managed Service Support HomePage:
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.