cisco logo color 2020
8618  Reviews star_rate star_rate star_rate star_rate star_half

Implementing and Configuring Cisco Identity Services Engine v5.x

TheImplementing and Configuring Cisco Identity Services Engine (SISE)training teaches you to deploy, configure, and operate Cisco Identity Services Engine (ISE) as the central platform for...

Read More
$4,395 USD
Duration 5 days
Course Code SISE 5.x-NTO
Available Formats Classroom, Virtual

Overview

TheImplementing and Configuring Cisco Identity Services Engine (SISE)training teaches you to deploy, configure, and operate Cisco Identity Services Engine (ISE) as the central platform for identity-based access control. Learning begins with the core architecture and installation and progresses through network access control, identity stores, policy design, and day-to-day operations. You will learn how to configure authentication and authorization policies, create scalable guest onboarding workflows, integrate network devices, and apply identity-based access decisions across wired and wireless environments. It also covers endpoint profiling, posture assessment, Terminal Access Controller Access Control Server (TACACS+) device administration, TrustSec concepts, certificate management, lifecycle operations, and advanced administration practices. The labs provide you with practical experience in Cisco ISE personas, certificate-based authentication, TEAP (EAP Chaining), Bring Your Own Device (BYOD) onboarding, device profiling, guest services, and policy enforcement in real-world environments. A wide range of use cases are covered, including 802.1X, MAB, and certificate provisioning. As a result of this training, you will be able to design, implement, and operate a Cisco ISE deployment that meets modern enterprise requirements for identity, security, visibility, and access control. This training prepares you for 300-715 SISE v1.1 exam. If passed, you earn the Cisco Certified Specialist Security Identity Management Implementation certification and satisfy the concentration exam requirement for the Cisco Certified Network Professional (CCNP) Security certification. This training also earns you 32 Continuing Education (CE) credits toward recertification. This training will help you:

  • Gain hands-on experience configuring, deploying, and operating Cisco ISE for identity-based access control in enterprise environments
  • Develop skills to design and implement secure authentication, authorization, guest access, and BYOD onboarding policies for both wired and wireless networks
  • Learn to integrate Cisco ISE with Active Directory, LDAP, and network devices, as well as configure endpoint profiling and compliance-based access controls
  • Acquire troubleshooting techniques for authentication and policy issues using practical labs and reporting tools, improving real-world problem-solving abilities
  • Prepare for the 300-715 SISE v1.1 exam

Skills Gained

Upon successful completion of this course, students will be able to meet these overall objectives:

  • Describe how Cisco ISE fits into contemporary network security architectures and the main functions, design motivations, and common use cases
  • Examine the functional roles of Cisco ISE node personas, supported deployment models, licensing considerations, and their implications for design planning and scalability decisions
  • Implement the installation workflows, platform requirements, and initial setup steps for deploying Cisco ISE on supported virtual and hardware platforms
  • Evaluate the principles, message flow, and authorization outcomes of 802.1X-based network access, and Cisco ISEs contribution to the security of wired and wireless connections with identity-based controls
  • Describe how MAB works, including its fallback behavior, flow sequence, and policy application within Cisco ISE, and how MAB provides access to non-802.1X-compatible devices
  • Establish the role of NADs in Cisco ISE authentication workflows, and provide an outline of the steps required to add, configure, and validate NADs within Cisco ISE to ensure secure policy enforcement
  • Discuss the role of internal and external identity sources in Cisco ISE, how user and device identities are managed, and how certificates are used for identity-based authentication
  • Evaluate how to configure Cisco ISE to integrate with Active Directory and LDAP, and outline the key settings and connectivity requirements needed to support external user authentication
  • Interpret how Cisco ISE selects identity sources during authentication and the logic and conditions that determine identity store sequences, fallback behavior, and identity normalization techniques
  • Discuss the structure and purpose of policy sets in Cisco ISE, including how global and local constructs interact, how policy sets are matched and evaluated, and how authentication and authorization logic is organized within each policy set
  • Identify how Cisco ISE evaluates authentication policies using rule conditions, identity store sequences, and dictionaries, as well as how behavior is applied when no rules match
  • Interpret how Cisco ISE applies authorization policies following authentication, including how rules are constructed using Conditions Studio and matched against user and device attributes to apply appropriate access profiles
  • Analyze Cisco ISE policies based on logs, RADIUS flow data, and session context to resolve authentication and authorization issues across different access scenarios
  • Analyze how Cisco ISE provides web-based guest access using CWA, and distinguish between hotspot, self-registration, and sponsored access flows
  • Establish global guest settings in Cisco ISE to define account lifecycle behavior, credential policies, communication methods, and access types for guests across supported onboarding processes
  • Configure Cisco ISE guest portals to support different access flows, manage account lifecycles, and implement deployment models that are consistent with organizational policies and scalability requirements
  • Set up sponsor-drive guest access in Cisco ISE via access roles, linking guest types to sponsor groups, and customizing portal behavior to support account creation and approval
  • Establish a clear understanding of Cisco ISEs roles in secure and scalable BYOD access: its enterprise use cases, deployment models, policy-based control strategies, key components, Cisco ISE-specific capabilities, and onboarding designs such as single and dual SSIDs for seamless personal device integration into the network
  • Configure Cisco ISE to deliver supplicants, issue certificates, and enforce policies as part of a complete BYOD onboarding pipeline
  • Operate post-onboarding workflows using the My Device Portal, including revocation of certificates and device de-registration for lost or stolen endpoints
  • Explain how Cisco ISE uses profiling to identify endpoints by taking advantage of classification logic, profiler components, data flows, and feed services to provide the foundation for advanced profiling and policy enforcement
  • Analyze how Cisco ISE collects endpoint data using built-in probes, device sensors, and pxGrid enrichment, and how each method contributes to the accuracy and coverage of profiling
  • Analyze how the profiling policies in Cisco ISE classify endpoints based on collection attributes, and how logical profiles are created and applied to support the decision-making process for determining access based on identity
  • Design scalable profiling solutions by aligning design principles, probe selection, and NAD integration with diverse network environments
  • Maintain visibility of profiling through dashboards and reporting tools, and improve deployment efficiency through optimization techniques
  • Apply foundational understanding of Cisco ISE posture services, including agent types, flow logic, operational modes, and use cases
  • Implement Cisco ISE to deliver posture agents and related resources to endpoints by configuring update services, portals, and delivery policies
  • Administer Cisco ISE policies to ensure secure and compliant network access
  • Test compliance-based access enforcement by simulating a variety of endpoint scenarios using Cisco AnyConnect
  • Assess session behavior, interpret posture outcomes, and analyze reporting tools to confirm the effectiveness of posture policy application and remediation
  • Examine Cisco ISEs use of TACACS+ for securing administrative access, including key AAA concepts and a comparison with RADIUS to illustrate centralized authentication and authorization
  • Set up Cisco ISE for TACACS+ based device administration by configuring policy elements such as command sets, profiles, and policy sets
  • Onboard network devices, define access permissions, and set up authentication and authorization rules to control administrator access
  • Implement advanced TACACS+ authorization logic, implement administrator command access, and implement scalable deployments using proven design guidelines
  • Compare Ciscos TrustSec core architecture, operation, and design considerations, including its enhancements and planning prerequisites for enterprise deployment
  • Configure Cisco TrustSec segmentation in Cisco ISE, including SGT classification, SXP propagation, and tag-based policy enforcement
  • Interpret how to operationalize Cisco ISE through system maintenance, backup/restore procedures, certificate management, and structured upgrades in production environments

Who Can Benefit

The primary audience for this course is as follows:

  • Network Security Engineers
  • Network Administrators
  • Consulting Security Engineers
  • Technical Solutions Architects
  • Network Managers
  • Sales Engineers
  • Account Managers

Prerequisites

There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:

  • Familiarity with the Cisco IOS Command-Line Interface (CLI) for wired and wireless network devices
  • Familiarity with Cisco Secure Client
  • Familiarity with Microsoft Windows operating systems
  • Familiarity with 802.1X
  • These skills can be found in the following Cisco Learning Offering:
  • Implementing and Operating Cisco Security Core Technologies (SCOR)

Course Details

Course Outline:

  • Cisco ISE Evolution, Foundation, and Role
  • Architecture and Design
  • Cisco ISE Installation and Initial Config
  • 802.1X in Cisco ISE
  • MAB in Cisco ISE
  • Network Device Integration with Cisco ISE
  • Identity Sources and Authentication Types
  • Active Directory and LDAP Integration
  • Identity Selection and Resolution Logic
  • Cisco ISE Policy Framework
  • Authentication Policies
  • Authorization Policies
  • Troubleshoot Policies and Sessions
  • Guest Access Overview
  • Guest Access Policies and Settings
  • Guest Portals and Lifecycle Operations
  • Sponsor Portals
  • BYOD Architecture and Use Cases
  • BYOD Onboarding with Native Supplicant Provisioning
  • BYOD Lifecycle Operations
  • Profiling Architecture and Capabilities
  • Probes and Data Collection
  • Profile Policies and Authorization
  • Profile Monitoring and Design
  • Posture Service Flow and Agents
  • Posture Updates and Client Provisioning
  • Posture Policies and Compliance-Based Access
  • Posture Testing and Monitoring
  • AAA and TACACS+
  • TACACS+ Device Administration
  • TACACS+ Command Authorization
  • Cisco TrustSec Overview
  • Cisco TrustSec in Cisco ISE
  • Cisco ISE Administration

Lab Outline:

  • Explore the Initial Cisco ISE Configuration, GUI and System Certificate
  • Configure Network Device Groups and Network Devices
  • Integrate Cisco ISE with Active Directory
  • Configure MAB
  • Configure Wired 802.1X
  • Configure Wireless 802.1X and Optional Wired EAP-TLS and TEAP
  • Troubleshoot Cisco ISE 8021.X Configuration Errors
  • Configure Hotspot Guest Access
  • Configure Sponsored Guest Access
  • Configure BYOD
  • Manage BYOD Devices
  • Configure Profiling
  • Configure Authorization Policy Rules and Run Profiler Reports
  • Configure Posture Preparations and Client Provisioning
  • Configure Posturing and Reporting
  • Configure TACACS+ Basic Device Administration
  • Configure TACACS+ Command Authorization
  • Configure Cisco TrustSec
  • Configure Secure Syslog with TLS v1.3 and Install Cisco ISE Patch
|
View Full Schedule

Schedule

10 options available

  • Guaranteed to Run
    Mar 16, 2026 - Mar 20, 2026 (5 days)
    Virtual | 10:00 AM 6:00 PM EDT
    Language English
    Select from 1 option(s) below
    Virtual |10:00 AM 6:00 PM EDT
    Virtual | 10:00 AM 6:00 PM EDT
    Enroll
    Enroll Add to quote
    Promo Code: FROSTBYTE
  • Apr 20, 2026 - Apr 24, 2026 (5 days)
    Virtual | 10:00 AM 6:00 PM EDT
    Language English
    Select from 1 option(s) below
    Virtual |10:00 AM 6:00 PM EDT
    Virtual | 10:00 AM 6:00 PM EDT
    Enroll
    Enroll Add to quote
    Promo Code: FROSTBYTE
  • May 4, 2026 - May 8, 2026 (5 days)
    Virtual | 10:00 AM 6:00 PM EDT
    Language English
    Select from 1 option(s) below
    Virtual |10:00 AM 6:00 PM EDT
    Virtual | 10:00 AM 6:00 PM EDT
    Enroll
    Enroll Add to quote
    Promo Code: FROSTBYTE
  • Jun 8, 2026 - Jun 12, 2026 (5 days)
    Virtual | 10:00 AM 6:00 PM EDT
    Language English
    Select from 1 option(s) below
    Virtual |10:00 AM 6:00 PM EDT
    Virtual | 10:00 AM 6:00 PM EDT
    Enroll
    Enroll Add to quote
  • Jul 13, 2026 - Jul 17, 2026 (5 days)
    Virtual | 10:00 AM 6:00 PM EDT
    Language English
    Select from 1 option(s) below
    Virtual |10:00 AM 6:00 PM EDT
    Virtual | 10:00 AM 6:00 PM EDT
    Enroll
    Enroll Add to quote
  • Aug 10, 2026 - Aug 14, 2026 (5 days)
    Virtual | 10:00 AM 6:00 PM EDT
    Language English
    Select from 1 option(s) below
    Virtual |10:00 AM 6:00 PM EDT
    Virtual | 10:00 AM 6:00 PM EDT
    Enroll
    Enroll Add to quote
  • Sep 14, 2026 - Sep 18, 2026 (5 days)
    Virtual | 10:00 AM 6:00 PM EDT
    Language English
    Select from 1 option(s) below
    Virtual |10:00 AM 6:00 PM EDT
    Virtual | 10:00 AM 6:00 PM EDT
    Enroll
    Enroll Add to quote
  • Oct 19, 2026 - Oct 23, 2026 (5 days)
    Virtual | 10:00 AM 6:00 PM EDT
    Language English
    Select from 1 option(s) below
    Virtual |10:00 AM 6:00 PM EDT
    Virtual | 10:00 AM 6:00 PM EDT
    Enroll
    Enroll Add to quote
  • Nov 16, 2026 - Nov 20, 2026 (5 days)
    Virtual | 10:00 AM 6:00 PM EDT
    Language English
    Select from 1 option(s) below
    Virtual |10:00 AM 6:00 PM EDT
    Virtual | 10:00 AM 6:00 PM EDT
    Enroll
    Enroll Add to quote
  • Dec 7, 2026 - Dec 11, 2026 (5 days)
    Virtual | 10:00 AM 6:00 PM EDT
    Language English
    Select from 1 option(s) below
    Virtual |10:00 AM 6:00 PM EDT
    Virtual | 10:00 AM 6:00 PM EDT
    Enroll
    Enroll Add to quote

FAQ

Does the course schedule include a Lunchbreak?

Classes typically include a 1-hour lunch break around midday. However, the exact break times and duration can vary depending on the specific class. Your instructor will provide detailed information at the start of the course.

What languages are used to deliver training?

Most courses are conducted in English, unless otherwise specified. Some courses will have the word "FRENCH" marked in red beside the scheduled date(s) indicating the language of instruction.

What does GTR stand for?

GTR stands for Guaranteed to Run; if you see a course with this status, it means this event is confirmed to run. View our GTR page to see our full list of Guaranteed to Run courses.

Does Ascendient Learning deliver group training?

Yes, we provide training for groups, individuals and private on sites. View our group training page for more information.

What does vendor-authorized training mean?

As a vendor-authorized training partner, we offer a curriculum that our partners have vetted. We use the same course materials and facilitate the same labs as our vendor-delivered training. These courses are considered the gold standard and, as such, are priced accordingly.

Is the training too basic, or will you go deep into technology?

It depends on your requirements, your role in your company, and your depth of knowledge. The good news about many of our learning paths, you can start from the fundamentals to highly specialized training.

How up-to-date are your courses and support materials?

We continuously work with our vendors to evaluate and refresh course material to reflect the latest training courses and best practices.

Are your instructors seasoned trainers who have deep knowledge of the training topic?

Ascendient Learning instructors have an average of 27 years of practical IT experience and have also served as consultants for an average of 15 years. To stay current, instructors spend at least 25 percent of their time learning new, emerging technologies and courses.

Do you provide hands-on training and exercises in an actual lab environment?

Lab access is dependent on the vendor and the type of training you sign up for. However, many of our top vendors will provide lab access to students to test and practice. The course description will specify lab access.

Will you customize the training for our company’s specific needs and goals?

We will work with you to identify training needs and areas of growth.  We offer a variety of training methods, such as private group training, on-site of your choice, and virtually. We provide courses and certifications that are aligned with your business goals.

How do I get started with certification?

Getting started on a certification pathway depends on your goals and the vendor you choose to get certified in. Many vendors offer entry-level IT certification to advanced IT certification that can boost your career. To get access to certification vouchers and discounts, please contact info@ascendientlearning.com.

Will I get access to content after I complete a course?

You will get access to the PDF of course books and guides, but access to the recording and slides will depend on the vendor and type of training you receive.

How do I request a W9 for Ascendient Learning?

View our filing status and how to request a W9.

Reviews

the interface was super easy to use and the instructions to get ready for the course was also very simple and easy to understand.

had a good time with the course, however some topics were left out due to the compact amount of time for training.

I like their training. A lot of material covered. The labs are very good. l learned a lot.

The training was very good to understand the concepts and how to set up things .

This was effective way to provide a ton of information in a short time period.