CCNP Security Technology Course: 300-208 SISAS
What about this course?
Join our expert instructor, Cristian Matei, with real-world extensive experience for a comprehensive CCNP Security Certification Video Series. The current CCNP Security blueprint is divided into four different exams which need to be passed to get CCNP Security certified. There is a huge gap of Security professionals on the market, so Cisco’s current CCNP Security blueprint was built to train engineers on emerging technologies and make them ready for challenging real-life environments. This course will be focusing on the SISAS exam which assesses knowledge of Cisco Identity Services Engine (ISE) architecture, solution, and components as an overall network threat mitigation and endpoint control solutions. It also includes the fundamental concepts of bring your own device (BYOD) using posture and profiling services of ISE. This course will help candidates obtain a deeper understanding of Identity Services Engine architecture and functionalities, which will tremendously help them both for the certification exam and also for real-life deployments.

Instructor for this course
Cristian Matei
CCIEx2 #23684
This course is composed by the following modules
CCNP Security Course Outline
Certification
Exam Preparation
Study Group
Lab Topology & Equipment
AAA Protocols
RADIUS
TACACS+
Cisco's Authentication Servers
ISE Overview
ISE Management & Authentication Policies
MAC Authentication Bypass :: MAB
MAB Layer 2 Authentication
MAB Verification & Troubleshooting
MAB & 802.1x Common Authorizations
MAB & EAP Common Authorizations
Authorization Verification Troubleshooting
ACL Authorization :: dACL
ACL Authorization :: Filter-ID ACL
ACL Authorization :: Per-User ACL
Extensible Authentication Protocol (EAP)
Common EAP Tunneled Methods
Common EAP Non-Tunneled Methods
802.1x Configuration Steps
Deploying EAP :: Part 1
Deploying EAP :: Part 2
EAP-FASTv1 Implementation
ISE Identity Sources
Authentication Against AD
AD Integration
ISE Application Server
Identity Prefix & Suffix Strip
User & Machine Authorization Policies :: Part 1
User & Machine Authorization Policies :: Part 2
Deploying EAP TLS
Issuing Certificates on ISE
Enrolling Users on a Certificate
User Authentication using EAP TLS
Importing CA Certificates
EAP-FASTv2 Chaining :: Part 1
EAP-FASTv2 Chaining :: Part 2
EAP-FASTv2 Chaining :: Part 3
Default Supplicant Network Access
Layer 3 Authentication
Central Web Authentication Workflow
Phase 1 Configuration
Phase 2 Configuration
ISE Guest Services
Bring Your Own Device (BYOD)
Wi-Fi Deployments
Portal Policy
EAP-FASTv2 Chaining :: Part 4
EAP-FASTv2 Chaining :: Part 5
EndPoint Profiling
Profiling Policies
ISE Authorization Flow with Profiling
Profiling Configuration :: Part 1
Profiling Configuration :: Part 2
Profiling Configuration :: Part 3
Device Sensor Overview
Posture Assessment Overview
Posture Services
Posture Configuration :: Part 1
Posture Configuration :: Part 2
Posture Configuration :: Part 3
Posture Configuration :: Part 4
Layer 2 Encryption (MACSec)
Security Group Tags (SGT)
MACSec Implementation :: Part 1
MACSec Implementation :: Part 2
Common Course Questions
If you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?