Description: Implementing and Configuring Cisco Identity Services Engine (SISE 300-715) is a 90- minute exam associated with the CCNP Security Certification. This exam tests a candidate's knowledge of Cisco Identify Services Engine, including architecture and deployment, policy enforcement, Web Auth and guest services, profiler, BYOD, endpoint compliance, and network access device administration. The course, Implementing and Configuring Cisco Identity Services Engine, helps candidates to prepare for this exam.
1.0 Architecture and Deployment
1.1 Configure personas
1.2 Describe deployment options
2.0 Policy Enforcement
2.1 Configure native AD and LDAP
2.2 Describe identity store options
2.2.a LDAP
2.2.b AD
2.2.c PKI
2.2.d OTP
2.2.e Smart Card
2.2.f Local
2.3 Configure wired/wireless 802.1X network access
2.4 Configure 802.1X phasing deployment
2.4.a Monitor mode
2.4.b Low impact
2.4.c Closed mode
2.5 Configure network access devices
2.6 Implement MAB
2.7 Configure Cisco TrustSec
2.8 Configure policies including authentication and authorization profiles
3.0 Web Auth and Guest Services
3.1 Configure web authentication
3.2 Configure guest access services
3.3 Configure sponsor and guest portals
4.0 Profiler
4.1 Implement profiler services
4.2 Implement probes
4.3 Implement CoA
4.4 Configure endpoint identity management
5.0 BYOD
5.1 Describe Cisco BYOD functionality
5.1.a Use cases and requirements
5.1.b Solution components
5.1.c BYOD flow
5.2 Configure BYOD device on-boarding using internal CA with Cisco switches and Cisco wireless LAN controllers
5.3 Configure certificates for BYOD
5.4 Configure block list/allow list
6.0 Endpoint Compliance
6.1 Describe endpoint compliance, posture services, and client provisioning
6.2 Configure posture conditions and policy, and client provisioning
6.3 Configure the compliance module
6.4 Configure Cisco ISE posture agents and operational modes
6.5 Describe supplicant, supplicant options, authenticator, and server
7.0 Network Access Device Administration
7.1 Compare AAA protocols
7.2 Configure TACACS+ device administration and command authorization