Cisco

CCNP Security Technology Course: 300-208 SISAS

  • Regular price $159.99
  • Save


Join our expert instructor, Cristian Matei, with real-world extensive experience for a comprehensive CCNP Security Certification Video Series. The current CCNP Security blueprint is divided into four different exams which need to be passed to get CCNP Security certified. There is a huge gap of Security professionals on the market, so Cisco’s current CCNP Security blueprint was built to train engineers on emerging technologies and make them ready for challenging real-life environments. This course will be focusing on the SISAS exam which assesses knowledge of Cisco Identity Services Engine (ISE) architecture, solution, and components as an overall network threat mitigation and endpoint control solutions. It also includes the fundamental concepts of bring your own device (BYOD) using posture and profiling services of ISE. This course will help candidates obtain a deeper understanding of Identity Services Engine architecture and functionalities, which will tremendously help them both for the certification exam and also for real-life deployments.
  • Course
    • Course Introduction
      • CCNP Security Course Outline
      • Certification
      • Exam Preparation
      • Study Group
      • Lab Topology & Equipment
    • AAA Framework
      • AAA Protocols
      • RADIUS
      • TACACS+
      • Cisco's Authentication Servers
      • ISE Overview
    • Authentication & Authorization
      • ISE Management & Authentication Policies
      • MAC Authentication Bypass :: MAB
      • MAB Layer 2 Authentication
      • MAB Verification & Troubleshooting
      • MAB & 802.1x Common Authorizations
      • MAB & EAP Common Authorizations
      • Authorization Verification Troubleshooting
      • ACL Authorization :: dACL
      • ACL Authorization :: Filter-ID ACL
      • ACL Authorization :: Per-User ACL
      • Extensible Authentication Protocol (EAP)
      • Common EAP Tunneled Methods
      • Common EAP Non-Tunneled Methods
      • 802.1x Configuration Steps
      • Deploying EAP :: Part 1
      • Deploying EAP :: Part 2
      • EAP-FASTv1 Implementation
      • ISE Identity Sources
      • Authentication Against AD
      • AD Integration
      • ISE Application Server
      • Identity Prefix & Suffix Strip
      • User & Machine Authorization Policies :: Part 1
      • User & Machine Authorization Policies :: Part 2
      • Deploying EAP TLS
      • Issuing Certificates on ISE
      • Enrolling Users on a Certificate
      • User Authentication using EAP TLS
      • Importing CA Certificates
      • EAP-FASTv2 Chaining :: Part 1
      • EAP-FASTv2 Chaining :: Part 2
      • EAP-FASTv2 Chaining :: Part 3
    • Phased Deployment
      • Default Supplicant Network Access
    • Layer 3 Authentication
      • Layer 3 Authentication
      • Central Web Authentication Workflow
      • Phase 1 Configuration
      • Phase 2 Configuration
      • ISE Guest Services
      • Bring Your Own Device (BYOD)
      • Wi-Fi Deployments
      • Portal Policy
      • EAP-FASTv2 Chaining :: Part 4
      • EAP-FASTv2 Chaining :: Part 5
    • Endpoint Profiling
      • EndPoint Profiling
      • Profiling Policies
      • ISE Authorization Flow with Profiling
      • Profiling Configuration :: Part 1
      • Profiling Configuration :: Part 2
      • Profiling Configuration :: Part 3
      • Device Sensor Overview
    • Posture Assessment
      • Posture Assessment Overview
      • Posture Services
      • Posture Configuration :: Part 1
      • Posture Configuration :: Part 2
      • Posture Configuration :: Part 3
      • Posture Configuration :: Part 4
    • TrustSec
      • Layer 2 Encryption (MACSec)
      • Security Group Tags (SGT)
      • MACSec Implementation :: Part 1
      • MACSec Implementation :: Part 2
Cristian Matei
Cristian Matei — CCIEx2 #23684
This course is also included in a training bundle:
View Training Bundle


25hr 28min
February 1, 2016
Unlimited HD Access

Train anywhere with our web, iOS, Android and Apple TV apps! You'll also have access to any course updates and additions.

Keep Training, Even Offline

Download the entire course in mobile, high and HD(1080p) resolutions.

  • Course
    • Course Introduction
      • CCNP Security Course Outline
      • Certification
      • Exam Preparation
      • Study Group
      • Lab Topology & Equipment
    • AAA Framework
      • AAA Protocols
      • RADIUS
      • TACACS+
      • Cisco's Authentication Servers
      • ISE Overview
    • Authentication & Authorization
      • ISE Management & Authentication Policies
      • MAC Authentication Bypass :: MAB
      • MAB Layer 2 Authentication
      • MAB Verification & Troubleshooting
      • MAB & 802.1x Common Authorizations
      • MAB & EAP Common Authorizations
      • Authorization Verification Troubleshooting
      • ACL Authorization :: dACL
      • ACL Authorization :: Filter-ID ACL
      • ACL Authorization :: Per-User ACL
      • Extensible Authentication Protocol (EAP)
      • Common EAP Tunneled Methods
      • Common EAP Non-Tunneled Methods
      • 802.1x Configuration Steps
      • Deploying EAP :: Part 1
      • Deploying EAP :: Part 2
      • EAP-FASTv1 Implementation
      • ISE Identity Sources
      • Authentication Against AD
      • AD Integration
      • ISE Application Server
      • Identity Prefix & Suffix Strip
      • User & Machine Authorization Policies :: Part 1
      • User & Machine Authorization Policies :: Part 2
      • Deploying EAP TLS
      • Issuing Certificates on ISE
      • Enrolling Users on a Certificate
      • User Authentication using EAP TLS
      • Importing CA Certificates
      • EAP-FASTv2 Chaining :: Part 1
      • EAP-FASTv2 Chaining :: Part 2
      • EAP-FASTv2 Chaining :: Part 3
    • Phased Deployment
      • Default Supplicant Network Access
    • Layer 3 Authentication
      • Layer 3 Authentication
      • Central Web Authentication Workflow
      • Phase 1 Configuration
      • Phase 2 Configuration
      • ISE Guest Services
      • Bring Your Own Device (BYOD)
      • Wi-Fi Deployments
      • Portal Policy
      • EAP-FASTv2 Chaining :: Part 4
      • EAP-FASTv2 Chaining :: Part 5
    • Endpoint Profiling
      • EndPoint Profiling
      • Profiling Policies
      • ISE Authorization Flow with Profiling
      • Profiling Configuration :: Part 1
      • Profiling Configuration :: Part 2
      • Profiling Configuration :: Part 3
      • Device Sensor Overview
    • Posture Assessment
      • Posture Assessment Overview
      • Posture Services
      • Posture Configuration :: Part 1
      • Posture Configuration :: Part 2
      • Posture Configuration :: Part 3
      • Posture Configuration :: Part 4
    • TrustSec
      • Layer 2 Encryption (MACSec)
      • Security Group Tags (SGT)
      • MACSec Implementation :: Part 1
      • MACSec Implementation :: Part 2