HAPPY BOOKSGIVING
Use code BOOKSGIVING during checkout to save 40%-55% on books and eBooks. Shop now.
Accessible from your Account page after purchase. Requires the free QuickTime Player software.
Videos can be viewed on: Windows 8, Windows XP, Vista, 7, and all versions of Macintosh OS X including the iPad, and other platforms that support the industry standard h.264 video codec.
Register your product to gain access to bonus material or receive a coupon.
5 hours of video instruction
5 hours of video tutorial for understanding, deploying, configuring, and troubleshooting Cisco TrustSec.
Learn the ins and outs of Cisco TrustSec in this practical video tutorial. Hands-on theory and demos will include configuration and troubleshooting information and tips based on the network access to data center end-to-end use case. Follow configuration steps to implement a solution in your own networks. This course is also perfect for certification candidates preparing for the CCNP Security and CCIE Security exams.
This video series covers topics relevant to TrustSec and will also include references to some new features recently made available on devices like the Cisco ASA. This is a key resource for understanding how Cisco TrustSec differs from traditional methods for securing network access and also to understanding the benefits this brings to an organization from both a cost-effectiveness standpoint as well as meeting ease of use, centralized policy management, and compliance goals.
Major topics are as follows:
1) Understanding and Positioning Cisco TrustSec
2) Cisco TrustSec Functions: Classification, Propagation, and Enforcement
3) Implementing TrustSec on Cisco ISE
4) Implementing TrustSec on Wired and Wireless Devices
5) Implementing Cisco TrustSec on Cisco Firewalls
6) Implementing Cisco TrustSec with Cisco VPN Solutions
7) TrustSec Deployment Considerations
Skill Level
What You Will Learn
Who Should Take This Course
Course Requirements
Table of Contents
Lesson 1: Understanding and Positioning Cisco TrustSec
1.1: TrustSec Problem Space
1.2: TrustSec Versus Legacy Network Access
1.3: TrustSec Domains
1.4: TrustSec Functions
Lesson 2: Understanding TrustSec Functions - Classification
2.1: Classification Fundamentals
2.2: Dynamic Classification
2.3: Static Classification Types and Methods
2.4: Static Classification Implementation
Lesson 3: Understanding TrustSec Functions - Propagation
3.1: Inline Propagation
3.2: SXP Propagation
3.3: Propagation Using SGT Caching
Lesson 4: Understanding TrustSec Functions - Enforcement
4.1: Enforcement Characteristics and Security Group Tags
4.2: Enforcement with Security Group ACLs
4.3: IOS Switch Configuration for Enforcement
4.4: Enforcement on Firewalls
4.5: Enforcement Verification
Lesson 5: Implementing TrustSec on Cisco ISE
5.1: TrustSec Domains
5.2: Security Group Tags
5.3: SGACLS and Egress Policies
Lesson 6: Implementing TrustSec on Cisco Wired and Wireless Devices
6.1: Design Considerations for TrustSec on Cisco Wired/Wireless Devices:
6.2: Wired Classification
6.3: Wired Propagation and Enforcement
6.4: Extending TrustSec
6.5: Wireless Networks
6.6: Verifying Deployment
Lesson 7: Implementing Cisco TrustSec on Cisco Firewalls
7.1: Design Considerations
7.2: Cisco Adaptive Security Appliance
7.3: Cisco Zone-Based Firewall
Lesson 8: Implementing TrustSec with Cisco VPN Solutions
8.1: IKEv2 and IPsec VPNs
8.2: GETVPN
8.3: AnyConnect VPNs
Lesson 9: TrustSec Deployment Considerations
9.1: Platform Guidelines
9.2: SXP Design Guidelines
9.3: Incorporating Non-TrustSec Devices
9.4: User-to-Data Center Use Case
About LiveLessons Video Training
LiveLessons Video Training series publishes hundreds of hands-on, expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. This professional and personal technology video series features world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, IBM Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include: IT Certification, Programming, Web Development, Mobile Development, Home and Office Technologies, Business and Management, and more. View all LiveLessons on InformIT at: http://www.informit.com/livelessons
About the Essentials Series
The Cisco Press video library is an indispensable tool for keeping up with the latest Cisco technologies. We have published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. The Video Mentor series is now part of the acclaimed LiveLessons series; otherwise, we haven't changed a thing. Whether you are a beginner, intermediate, or expert, you'll find the certification video training you need to accelerate your learning. So, what do you want to learn today? [http://www.ciscopress.com/series/series.asp?ser=2185116]
Understanding and Deploying Cisco TrustSec
Lesson 1: Understanding and Positioning Cisco TrustSec
1.1: Cisco TrustSec Problem Space
1.2: Cisco TrustSec versus Legacy Network Access
1.3: Cisco TrustSec Domains
1.4: Cisco TrustSec Functions
Lesson 2: Cisco TrustSec Functions
2.1: Classification Overview
2.2 : Classification (Dynamic)
2.3 : Classification (Static)
2.4 : Propagation (Inline)
2.5 : Propagation (SXP)
2.6 : Propagation (SGT Caching)
2.7 : Enforcement
Lesson 3: Implementing TrustSec on The Cisco ISE
3.1: Adding Network Devices
3.2: Creating a CTS domain
3.3: Creating SGTs and SGACLs
3.4: Building a policy matrix
Lesson 4: Implementing TrustSec on Cisco Switches and Routers and Wireless Devices
4.1: Implementing classification, propagation and enforcement in Wired Networks
4.2: Implementing classification, propagation and enforcement in Wireless Networks
Lesson 5: Implementing Cisco TrustSec on Cisco Firewalls
5.1: Implementing classification, propagation and enforcement on the Cisco ASA
5.2: Implementing classification, propagation and enforcement on CISCO IOS FWS
Lesson 6: Integration of Cisco TrustSec with other Cisco Security Features
6.1: GETVPN
6.2: IKEv2/IPsec
6.3: Anyconnect
Lesson 7: Solution Design Tips, Guidelines and Migration Strategies
7.1: Platform guidelines
7.2: Implementing an SXP strategy
7.3: Incorporating 3rd Party equipment
7.4 Building and Verifying Network Access to Data Center Solutions