• 100 Queen St W, Brampton, ON L6X 1A4, Canada
  • +1-800-961-0337
04/02/2019 04/04/2019
  • VLT
Live Online
07/01/2019 07/03/2019
  • VLT
Live Online
09/24/2019 09/26/2019
  • VLT
Live Online
12/17/2019 12/19/2019
  • VLT
Live Online

Introduction to 802.1X Operations for Cisco Security Professionals (802.1X v1.0)

Course Overview

After finishing this course, the student will have the capacity to meet these general goals:

  • Depict personality based systems administration ideas and parts
  • Characterize the segments and procedures of port-based verification
  • Distinguish the 802.1X parts and their interrelation at an abnormal state
  • Distinguish necessities and alternatives for non-supplicant gadgets
  • Position singular segments of a 802.1X system and recognize compatibilities


This segment records the aptitudes and information that students must have to profit completely from the course. This area incorporates prescribed Cisco learning offerings that the students may finish to profit completely from this course, including the accompanying:

  • Cisco CCNA
  • Participation of Securing Networks with Routers and Switches (SNRS) or proportional learning
  • Learning of Microsoft Windows Server 2008 Active Directory
  • Learning of Cisco remote LAN controllers and lightweight access focuses
  • Learning of fundamental summon line arrangement of Cisco Catalyst switches

Who Should Attend

The essential gathering of people for this course is as per the following:

  • Cisco Channel Partner frameworks designers and field builds that are looking to meet the training prerequisites to achieve Authorized Technology Provider (ATP) approval to offer Cisco ISE.

The optional group of onlookers for this course is as per the following:

  • Security draftsmen, outline designers, and others looking for hands-on involvement with Cisco TrustSec 802.1X arrangements with Cisco ISE.

Introduction to 802.1X Operations for Cisco Security Professionals (802.1X v1.0)

Course Outline

Module 1: Cisco TrustSec

  • Lesson 1: Surveying Cisco TrustSec
  • Lesson 2: Surveying Cisco TrustSec Architecture Components

Module 2: Port-Based Authentication

  • Lesson 1: Surveying the IEEE 802.1X Standard
  • Lesson 2: Surveying 802.1X and EAP
  • Lesson 3: Describing the Role of RADIUS in EAP Communications

Module 3: Configure Devices for 802.1X Operation

  • Lesson 1: Identifying 802.1X Components and Topologies
  • Lesson 2: Configuring Cisco ISE for 802.1X
  • Lesson 3: Configuring Network Devices for 802.1X
  • Lesson 4: Configuring Supplicants for 802.1X Operation

Module 4: Configure Guest Access

  • Lesson 1: Configuring Cisco TrustSec for Non-Supplicant Devices
  • Lesson 2: Configuring Cisco WebAuth for Non-Supplicant Devices

Module 5: Design Cisco TrustSec Networks with Cisco ISE and 802.1X

  • Lesson 1: Identifying Component Compatibilities with 802.1X
  • Lesson 2: Reviewing 802.1X Design Considerations That Impact Implementation
  • Lesson 3: Reviewing Scalable 802.1X Architectures

Lab Outline

  • Lab 1-0: Accessing the Lab Equipment
  • Lab 1-1: Configuring Cisco ISE, Switch, WLC, and Clients
  • Lab 2-1: Configuring Authentication Using Web Authentication
  • Contextual analysis: Designing an End-to-End High-Level Cisco TrustSec Network with Cisco ISE and 802.1X