CCNP Security SISAS 300-208 Official Cert Guide (2015)
Part I: The CCNP Certification
Chapter 1: CCNP Security Certification
Part II: “The Triple A” (Authentication, Authorization, and Accounting)
Chapter 2: Fundamentals of AAA
Chapter 3: Identity Management
Chapter 4: EAP Over LAN (Also Known As 802.1X)
Chapter 5: Non-802.1X Authentications
Chapter 6: Introduction to Advanced Concepts
Part III: Cisco Identity Services Engine
Chapter 7: Cisco Identity Services Engine Architecture
Chapter 8: A Guided Tour of the Cisco ISE Graphical User Interface
Chapter 9: Initial Configuration of the Cisco ISE
Chapter 10: Authentication Policies
Chapter 11: Authorization Policies
Part IV: Implementing Secure Network Access
Chapter 12: Implement Wired and Wireless Authentication
Chapter 13: Web Authentication
Chapter 14: Deploying Guest Services
Part V: Advanced Secure Network Access
Chapter 16: UCertificate-Based User Authentications
Chapter 17: Bring Your Own Device
Chapter 18: TrustSec and MACSec
Chapter 19: Posture Assessment
Part VI: Safely Deploying in the Enterprise
Chapter 21: ISE Scale and High Availability
Chapter 22: Troubleshooting Tools
Part VII: Final Preparation
Part VII: Appendixes
Appendix A Answers to the “Do I Know This Already?” Quizzes
Appendix B Configuring the Microsoft CA for BYOD
Appendix C Using the Dogtag CA for BYOD
Appendix D Sample Switch Configurations
Chapter 1: CCNP Security Certification
Part II: “The Triple A” (Authentication, Authorization, and Accounting)
Chapter 2: Fundamentals of AAA
Chapter 3: Identity Management
Chapter 4: EAP Over LAN (Also Known As 802.1X)
Chapter 5: Non-802.1X Authentications
Chapter 6: Introduction to Advanced Concepts
Part III: Cisco Identity Services Engine
Chapter 7: Cisco Identity Services Engine Architecture
Chapter 8: A Guided Tour of the Cisco ISE Graphical User Interface
Chapter 9: Initial Configuration of the Cisco ISE
Chapter 10: Authentication Policies
Chapter 11: Authorization Policies
Part IV: Implementing Secure Network Access
Chapter 12: Implement Wired and Wireless Authentication
Chapter 13: Web Authentication
Chapter 14: Deploying Guest Services
Part V: Advanced Secure Network Access
Chapter 16: UCertificate-Based User Authentications
Chapter 17: Bring Your Own Device
Chapter 18: TrustSec and MACSec
Chapter 19: Posture Assessment
Part VI: Safely Deploying in the Enterprise
Chapter 21: ISE Scale and High Availability
Chapter 22: Troubleshooting Tools
Part VII: Final Preparation
Part VII: Appendixes
Appendix A Answers to the “Do I Know This Already?” Quizzes
Appendix B Configuring the Microsoft CA for BYOD
Appendix C Using the Dogtag CA for BYOD
Appendix D Sample Switch Configurations