Vi ste ovdje
Overview/Description
The Cisco SensorBase correlates real-time data from more than 1.5 million devices around the world to create network reputation scores that enable Cisco IPS devices to block threats from known malicious hosts before they pass through the IPS inspection process. In this course, you'll learn how to describe some methodologies for tuning a Cisco IPS sensor to properly manage false positive and negative events, including the methods and configuration procedures to create custom signatures on a Cisco IPS sensor. In addition, you'll learn how to enable the anomaly detection...
Overview/Description
The Cisco ESA uses two different sets of mail policies for message content security allowing different security rules to be defined for messages sent to your users and messages sent from your users. In this course, you will learn how to configure the different features within the incoming and outgoing mail policies; anti-spam, anti-virus, content filters, outbreak filters, and data loss prevention. You will also be able to describe the reporting functions and the tools used for troubleshooting the mail processing flows. This course is one of a series in the SkillSoft...
Overview/Description
The most secure solution at the access edge is to leverage the intelligence of the network. Cisco offers a host of services designed to enable secure user and host access to enterprise networks. It provides standards-based network access control at the access layer by using the 802.1X protocol to secure the physical ports where end users connect. 802.1X is an IEEE standard for media-level access control, offering the capability to permit or deny network connectivity, control VLAN access and apply traffic policy, based on user or machine identity. In this course, you will...
Overview/Description
To protect against unauthorized access to controlled or confidential information, enterprise networks require an effective network access control embedded within the network infrastructure. The Cisco Identity Services Engine (ISE) is a next-generation identity and access control policy platform that enables enterprises to enforce compliance, enhance infrastructure security, and streamline their service operations. In this course, you will learn about commonly used EAP variants used with 802.1X authentication. You will learn how to configure a Cisco switch for AAA, RADIUS...
Overview/Description
The Cisco Identity Services Engine is a next-generation identity and access control policy platform that enables enterprises to enforce compliance, enhance infrastructure security, and streamline their service operations. The unique architecture of Cisco ISE allows enterprises to gather real-time contextual information from networks, users, and devices. In this course, you will learn about the key components of the Cisco ISE architecture and its function in the network access control solution.
Target Audience
This course is for anyone wishing to obtain the...
Overview/Description
Certificate-based client authentication is used in EAP-TLS environments. An advantage of using EAP-TLS is the openness of the standard, wide vendor support, and high security. Authorization is performed after authentication, when the identity of the client is already established. The authorization attributes that are sent via RADIUS to the network access devices are first configured in the ISE as authorization profiles. In this course, you will learn about certificate-based client authentication. You will also explore Cisco Identity Services Engine (ISE) authorization...
Overview/Description
The Cisco Identity Services Engine (ISE) has support for features that provide enhanced access control capabilities in the Cisco ISE solution such as authorization, Security Group Access (SGA), MAC Security (MACsec), web authentication, as well as guest services. In this course, you will learn about certificate-based client authentication, Security Group Access (SGA) and MAC Security (MACsec) features that provide enhanced access control capabilities in the Cisco ISE solution. You will also learn about Cisco ISE WebAuth and the guest service features of the Cisco ISE....
Overview/Description
The Cisco Identity Services Engine offers a range of advanced endpoint access control features. You can use them to enforce compliance and enhance infrastructure security. This course discusses the posture, profiler, and Bring Your Own Device (BYOD) solutions. In this course, you will learn about the posture assessment and the use of NAC agents. You will also learn about the Cisco ISE profiler and the endpoint identity groups as well as the BYOD solution elements and device onboarding.
Target Audience
This course is for anyone wishing to obtain the Implementing Cisco...
Overview/Description
The components of Cisco Unified Communications solutions provide the foundation for converged networks. These solutions encompass voice, video, and data traffic within a single network infrastructure. It is designed to optimize feature functionality, reduce configuration and maintenance requirements, and provide interoperability with various other applications. In this course, you will be able to describe the Cisco Unified Communications Manager Express, Cisco Unified Communications Manager, Cisco Unity Connection, Cisco Prime Collaboration, and Cisco TMS component...
Overview/Description
It is critical to understand the function of traditional telephony components to successfully deploy a VoIP-based system. This course introduces the characteristics of Cisco Unified Communications solutions, the components that are required in a convergent network, the different VoIP signaling protocols, QoS issues, and media transmission protocols. It also provides an overview of traditional voice networks. Inthis course, you will learn about the characteristics of a traditional voice network, the different components in a converged voice network, as well as the...