Cisco TrustSec LiveLessons [electronic resource] / Timms, Natalie.

Timms, Natalie, author.
Cisco Press, 2015.
1 online resource (1 video file, approximately 5 hr., 11 min.)
1st edition

Location Notes Your Loan Policy


Electronic videos.
System Details:
video file
5 hours of video instruction 5 hours of video tutorial for understanding, deploying, configuring, and troubleshooting Cisco TrustSec. Learn the ins and outs of Cisco TrustSec in this practical video tutorial. Hands-on theory and demos will include configuration and troubleshooting information and tips based on the network access to data center end-to-end use case. Follow configuration steps to implement a solution in your own networks. This course is also perfect for certification candidates preparing for the CCNP Security and CCIE Security exams. This video series covers topics relevant to TrustSec and will also include references to some new features recently made available on devices like the Cisco ASA. This is a key resource for understanding how Cisco TrustSec differs from traditional methods for securing network access and also to understanding the benefits this brings to an organization from both a cost-effectiveness standpoint as well as meeting ease of use, centralized policy management, and compliance goals. Major topics are as follows: Understanding and Positioning Cisco TrustSec Cisco TrustSec Functions: Classification, Propagation, and Enforcement Implementing TrustSec on Cisco ISE Implementing TrustSec on Wired and Wireless Devices Implementing Cisco TrustSec on Cisco Firewalls Implementing Cisco TrustSec with Cisco VPN Solutions TrustSec Deployment Considerations Skill Level Intermediate to advanced What You Will Learn How to enhance network security through data flow segmentation. How TrustSec enables consistent enforcement of security policy across a wide range of Cisco products. Using Cisco ISE for centralized policy management and distribution in a TrustSec domain. How TrustSec is a data segmentation method that provides adherence to compliance standards such as PCI. The benefits of applying security policy based on Role Based Access Control (RBAC), which is not dependent on IP addresses, VLANs, or other topology related constructs. How TrustSec easily integrates with other network security methods and techniques. Implementing TrustSec to several use cases including campus and WAN. How TrustSec can be implemented in a step-by-step manner that facilities migration strategies. Understand how TrustSec provides uniform support for IPv4 and IPv6 networks. Who Should Take This Course Primary audience: Those currently involved in the IT industry as security or networking professionals looking to gain knowledge in the area of deploy...
Online resource; Title from title screen (viewed May 20, 2015)