Implementing Cisco Bring Your Own Device Solutions (SBYOD)
- Channel Partner / Reseller
- Cisco CCNA Wireless certification or commensurate wireless experience recommended
- Knowledge of basic IEEE 802.1X (recommended to take the free 802.1X E-learning on PEC before attending this training)
- Understanding of Microsoft Active Directory or Lightweight Directory Access Protocol (LDAP)
- Attendance in the SWISE course, or commensurate field experience.
Implementing Cisco Bring Your Own Device Solutions (Version 1.0) course is a 3-day 20 to 22-hour instructor-led course. Cisco ISE combined with the Wireless LAN Controllers (WLCs), access points (APs), Catalyst switches, and end devices provides a comprehensive end-user security solution.
- This training extends the core ISE / BYOD knowledge that learners obtains in the SWISE course with more advanced knowledge and implementation use cases.
- These solutions will be leveraged to control wired and wireless end-user access to corporate resources.
- Students should already be familiar with the basic configuration of the Cisco ISE, switches, WLCs, and APs.
- This course is based on the Cisco ISE Release 1.2, and Cisco Wireless LAN Controller Release 7.5.
- This product training course concentrates on Cisco ISE Release 1.2 product features and functions that more advanced implementations often require.
- This course shall provide skills that relate to Cisco ISE Release 1.2 design and configuration, including Network Access Devices (NAD) such as Cisco WLC and Cisco switches.
- The goal of the Cisco ADVANCED ISE IMPLEMENTATION course is to train engineers to understand and configure advanced Cisco ISE Release 1.2 features using wired and wireless NADs.
- This course will include concepts and configuration information to integrate both wired and wireless NADs.
- Comparing the features that are built into wired and wireless NADs versus the rich feature set of Cisco ISE will ensure that learners can select and configure the appropriate product for a given scenario.
- This course will have a wired and wireless perspective that focuses on the design and configuration requirements that are needed to authenticate and authorize a wired and wireless device such as a personally owned or corporate owned mobile device