Cisco TrustSec LiveLessons: Deployment, Configuration and Troubleshooting Techniques
- By Natalie Timms
- Published May 20, 2015 by Cisco Press. Part of the LiveLessons series.
- Copyright 2015
- Edition: 1st
- Downloadable Video
- ISBN-10: 1-58720-563-7
- ISBN-13: 978-1-58720-563-7
Register your product to gain access to bonus material or receive a coupon.
DRM-Free Video Downloads. Purchase and immediately download individual lessons from this video. Make your lesson selections below and click on the Buy button.
Videos can be viewed on: Windows 8, Windows XP, Vista, 7, and all versions of Macintosh OS X including the iPad, and other platforms that support the industry standard h.264 video codec. Requires the free QuickTime Player software.
Actual product comes full screen and in high resolution.
Actual product comes full screen and in high resolution.
Actual product comes full screen and in high resolution.
Actual product comes full screen and in high resolution.
Actual product comes full screen and in high resolution.
Actual product comes full screen and in high resolution.
Actual product comes full screen and in high resolution.
Actual product comes full screen and in high resolution.
Actual product comes full screen and in high resolution.
5 hours of video instruction
5 hours of video tutorial for understanding, deploying, configuring, and troubleshooting Cisco TrustSec.
Learn the ins and outs of Cisco TrustSec in this practical video tutorial. Hands-on theory and demos will include configuration and troubleshooting information and tips based on the network access to data center end-to-end use case. Follow configuration steps to implement a solution in your own networks. This course is also perfect for certification candidates preparing for the CCNP Security and CCIE Security exams.
This video series covers topics relevant to TrustSec and will also include references to some new features recently made available on devices like the Cisco ASA. This is a key resource for understanding how Cisco TrustSec differs from traditional methods for securing network access and also to understanding the benefits this brings to an organization from both a cost-effectiveness standpoint as well as meeting ease of use, centralized policy management, and compliance goals.
Major topics are as follows:
1) Understanding and Positioning Cisco TrustSec
2) Cisco TrustSec Functions: Classification, Propagation, and Enforcement
3) Implementing TrustSec on Cisco ISE
4) Implementing TrustSec on Wired and Wireless Devices
5) Implementing Cisco TrustSec on Cisco Firewalls
6) Implementing Cisco TrustSec with Cisco VPN Solutions
7) TrustSec Deployment Considerations
Skill Level
- Intermediate to advanced
What You Will Learn
- How to enhance network security through data flow segmentation.
- How TrustSec enables consistent enforcement of security policy across a wide range of Cisco products.
- Using Cisco ISE for centralized policy management and distribution in a TrustSec domain.
- How TrustSec is a data segmentation method that provides adherence to compliance standards such as PCI.
- The benefits of applying security policy based on Role Based Access Control (RBAC), which is not dependent on IP addresses, VLANs, or other topology related constructs.
- How TrustSec easily integrates with other network security methods and techniques.
- Implementing TrustSec to several use cases including campus and WAN.
- How TrustSec can be implemented in a step-by-step manner that facilities migration strategies.
- Understand how TrustSec provides uniform support for IPv4 and IPv6 networks.
Who Should Take This Course
- Primary audience: Those currently involved in the IT industry as security or networking professionals looking to gain knowledge in the area of deploying Cisco TrustSec to replace or enhance traditional methods for securing network access and protecting key resources. This topic is also relevant to those that are charged with meeting organizational and industry compliance requirements.
- Secondary audience: Prospective candidates for CCNP, CCIE or other Cisco certifications seeking a definitive reference guide for Cisco TrustSec as it pertains to possible exam content.
Course Requirements
- A good understanding of security basics and familiarity with general networking concepts, infrastructure, and communication.
- Some exposure to configuring Cisco equipment including routers, Catalyst and Data Center switches, and the Cisco ASA and Cisco ISE.
- Familiarity with security protection methods.
Table of Contents
Lesson 1: Understanding and Positioning Cisco TrustSec
1.1: TrustSec Problem Space
1.2: TrustSec Versus Legacy Network Access
1.3: TrustSec Domains
1.4: TrustSec Functions
Lesson 2: Understanding TrustSec Functions - Classification
2.1: Classification Fundamentals
2.2: Dynamic Classification
2.3: Static Classification Types and Methods
2.4: Static Classification Implementation
Lesson 3: Understanding TrustSec Functions - Propagation
3.1: Inline Propagation
3.2: SXP Propagation
3.3: Propagation Using SGT Caching
Lesson 4: Understanding TrustSec Functions - Enforcement
4.1: Enforcement Characteristics and Security Group Tags
4.2: Enforcement with Security Group ACLs
4.3: IOS Switch Configuration for Enforcement
4.4: Enforcement on Firewalls
4.5: Enforcement Verification
Lesson 5: Implementing TrustSec on Cisco ISE
5.1: TrustSec Domains
5.2: Security Group Tags
5.3: SGACLS and Egress Policies
Lesson 6: Implementing TrustSec on Cisco Wired and Wireless Devices
6.1: Design Considerations for TrustSec on Cisco Wired/Wireless Devices:
6.2: Wired Classification
6.3: Wired Propagation and Enforcement
6.4: Extending TrustSec
6.5: Wireless Networks
6.6: Verifying Deployment
Lesson 7: Implementing Cisco TrustSec on Cisco Firewalls
7.1: Design Considerations
7.2: Cisco Adaptive Security Appliance
7.3: Cisco Zone-Based Firewall
Lesson 8: Implementing TrustSec with Cisco VPN Solutions
8.1: IKEv2 and IPsec VPNs
8.2: GETVPN
8.3: AnyConnect VPNs
Lesson 9: TrustSec Deployment Considerations
9.1: Platform Guidelines
9.2: SXP Design Guidelines
9.3: Incorporating Non-TrustSec Devices
9.4: User-to-Data Center Use Case
About LiveLessons Video Training
LiveLessons Video Training series publishes hundreds of hands-on, expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. This professional and personal technology video series features world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, IBM Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include: IT Certification, Programming, Web Development, Mobile Development, Home and Office Technologies, Business and Management, and more. View all LiveLessons on InformIT at: http://www.informit.com/livelessons
- InformIT: http://www.informit.com/livelessons
- Pearson IT Cert: http://www.pearsonitcertification.com/livelessons
- Cisco Press: http://www.ciscopress.com/livelessons
- Que: http://www.quepublishing.com/livelessons
- IBM: http://www.ibmpressbooks.com/livelessons
About the Essentials Series
The Cisco Press video library is an indispensable tool for keeping up with the latest Cisco technologies. We have published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. The Video Mentor series is now part of the acclaimed LiveLessons series; otherwise, we haven't changed a thing. Whether you are a beginner, intermediate, or expert, you'll find the certification video training you need to accelerate your learning. So, what do you want to learn today? [http://www.ciscopress.com/series/series.asp?ser=2185116]
Related Article
Excerpts
Video: Cisco TrustSec Deployment, Configuration & Troubleshooting Techniques: TrustSec Functions
Video: Cisco TrustSec Inline Propagation
Video: Introduction to Cisco TrustSec Deployment, Configuration & Troubleshooting Techniques
Table of Contents
Understanding and Deploying Cisco TrustSec
Lesson 1: Understanding and Positioning Cisco TrustSec
1.1: Cisco TrustSec Problem Space
1.2: Cisco TrustSec versus Legacy Network Access
1.3: Cisco TrustSec Domains
1.4: Cisco TrustSec Functions
Lesson 2: Cisco TrustSec Functions
2.1: Classification Overview
2.2 : Classification (Dynamic)
2.3 : Classification (Static)
2.4 : Propagation (Inline)
2.5 : Propagation (SXP)
2.6 : Propagation (SGT Caching)
2.7 : Enforcement
Lesson 3: Implementing TrustSec on The Cisco ISE
3.1: Adding Network Devices
3.2: Creating a CTS domain
3.3: Creating SGTs and SGACLs
3.4: Building a policy matrix
Lesson 4: Implementing TrustSec on Cisco Switches and Routers and Wireless Devices
4.1: Implementing classification, propagation and enforcement in Wired Networks
4.2: Implementing classification, propagation and enforcement in Wireless Networks
Lesson 5: Implementing Cisco TrustSec on Cisco Firewalls
5.1: Implementing classification, propagation and enforcement on the Cisco ASA
5.2: Implementing classification, propagation and enforcement on CISCO IOS FWS
Lesson 6: Integration of Cisco TrustSec with other Cisco Security Features
6.1: GETVPN
6.2: IKEv2/IPsec
6.3: Anyconnect
Lesson 7: Solution Design Tips, Guidelines and Migration Strategies
7.1: Platform guidelines
7.2: Implementing an SXP strategy
7.3: Incorporating 3rd Party equipment
7.4 Building and Verifying Network Access to Data Center Solutions
Downloadable Video
- Your Price: $159.99
- List Price: $199.99
- About this video
Accessible from your Account page after purchase. Requires the free QuickTime Player software.
Videos can be viewed on: Windows 8, Windows XP, Vista, 7, and all versions of Macintosh OS X including the iPad, and other platforms that support the industry standard h.264 video codec.
Other Things You Might Like
- Securing Enterprise Networks with Cisco Meraki
- eBook $55.99
- Securing Enterprise Networks with Cisco Meraki
- Book $55.99
- In Zero Trust We Trust
- eBook $34.39