Overview
The Cisco DoD Comply-to-Connect (C2C) training teaches you how to implement and deploy a Department of Defense (DoD) Comply-to-Connect network architecture using Cisco Identity Services Engine (ISE). This training covers implementation of 802.1X for both wired and wireless devices and how Cisco ISE uses that information to apply policy control and enforcement. Additionally, other topics like supplicants, non-supplicants, ISE profiler, authentication, authorization, and accounting (AAA) and public key infrastructure (PKI) support, reporting and troubleshooting are covered. Finally, C2C specific use case scenarios are covered.
This is the 365 day digital subscription offering.
How You'll Benefit
This training will help you:
- Learn how to operate, manage, configure, and troubleshoot the Cisco C2C solution
- Gain an understanding of how the Cisco ISE security components relate to the C2C architecture
- Earn 32 CE credits towards recertification
Who should attend
This training is a US Department of Defense mandate, ensuring compliance with cybersecurity protocols and procedures. The target audience includes individuals seeking the knowledge and skills involved in deploying, operating, and verifying Cisco DoD C2C network architecture, such as:
- Network Security Engineers
- Network Administrators
- Security Administrators
Prerequisites
There are no formal prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
- Familiarity with 802.1X
- Familiarity with Microsoft Windows Operating Systems
- Familiarity with Cisco IOS CLI for wired and wireless network devices
- Familiarity with Cisco Identity Service Engine
The following recommended Cisco offering may help you meet these prerequisites:
Course Objectives
- Define DoD C2C, including its steps and alignment with ISE features/functions and Zero Trust
- Describe Cisco Identity-Based Networking Services
- Explain 802.1X extensible authentication protocol (EAP)
- Configure devices for 802.1X operation
- Configure access for non-supplicant devices
- Describe the Cisco Identity Services Engine
- Explain Cisco ISE deployment
- Describe Cisco ISE policy enforcement concepts
- Describe Cisco ISE policy configuration
- Explain PKI fundamentals, technology, components, roles, and software supplicants
- Troubleshoot Cisco ISE policy and third-party network access device (NAD) support
- Describe Cisco ISE TrustSec configurations
- Describe the Cisco ISE profiler service
- Describe profiling best practices and reporting
- Configure endpoint compliance
- Configure client posture services
- Configure Cisco ISE device administration
- Describe the four main use cases within C2C
Outline
- C2C Fundamentals
- Cisco Identity-Based Networking Services
- 802.1X EAP Authentication
- Configure Devices for 802.1X Operation
- Configure Access for Non-Supplicant Devices
- Introducing Cisco ISE Architecture
- Introducing Cisco ISE Deployment
- Introducing Cisco ISE Policy Enforcement Components
- Introducing Cisco ISE Policy Configuration
- PKI and Advanced Supplicants
- Troubleshooting Cisco ISE Policy and Thir-Party NAD Support
- Exploring Cisco TrustSec
- Introducing the Cisco ISE Profiler
- Introducing Profiling Best Practices and Reporting
- Introducing Cisco ISE Endpoint Compliance Services
- Configuring Client Posture Services and Compliance
- Working with Network Access Devices
- C2C Use Cases