• Online, Instructor-Led
Course Description

Interested in learning how to provide access to network resources without compromising on security? You've come to the right place. The Cisco Secure Access Control System v5.x has been designed to help security professionals, network administrators, engineers, and architects to use ACS effectively to provide easy access to resources of the network without compromising on security. Since the system uses security features that are also part of Cisco's IOS software, the course can help you get theoretical knowledge and hands on experience with multiple aspects of security.

Learning Objectives

Describe the role of various Cisco Secure Access Control System components Install Cisco Secure ACS using a setup script Explain Cisco Secure ACS licensing Understand and describe the difference between value types, values, and attributes Understand the importance of user authentication, authorization, and accounting, and describe how identity stores work Effectively configure identity score sequences Understand the basics of Lightweight Direct Access Protocol and leverage the protocol for effective configuration of external identity stores Implement TACACS+ to perform various functions on Cisco Secure ACS Understand the different aspects of Cisco Secure ACS to monitor and troubleshoot problems Use a local certificate authority (CA) for the configuration and troubleshooting of digital certificates that Cisco Secure ACS self-signs Configure and troubleshoot IEEE 802.1X and EAP within Cisco Secure ACS environments

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • All-Source Analysis

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.