Course Overview:
Cisco DoD Comply-to-Connect (C2C) course teaches you how to implement and deploy a Department of Defense (DoD) Comply-to-Connect network architecture using Cisco Identity Services Engine (ISE). This training covers implementation of 802.1X for both wired and wireless devices and how Cisco ISE uses that information to apply policy control and enforcement. Additionally, other topics like supplicants, non-supplicants, ISE profiler, authentication, authorization, and accounting (AAA) and public key infrastructure (PKI) support, reporting and troubleshooting are covered. Finally, C2C specific use case scenarios are covered.
This training also earns you 32 Continuing Education (CE) credits toward recertification.
Dates/Locations:
Duration: 5 days
Course Outline:
Section 1: C2C Fundamentals
- Comply to Connect Overview
- From C2C to ZTA
- Steps to Implement C2C
Section 2: Cisco Identity-Based Networking Services
- Cisco IBNS Overview
- AAA Role in Cisco IBNS
- Compare Cisco IBNS and Cisco ISE Solutions
- Explore Cisco IBNS Architecture Components
Section 3: Introducing Cisco ISE Architecture
- Cisco ISE as a Network Access Policy Engine
- Cisco ISE Use Cases
- Cisco ISE Functions
Section 4: Introducing Cisco ISE Deployment
- Cisco ISE Deployment Models
- Cisco ISE Licensing and Network Requirements
- Cisco ISE Context Visibility Features
- New Features in Cisco ISE 3.X
Section 5: Introducing Cisco ISE Policy Enforcement Components
- 802.1X for Wired and Wireless Access
- MAC Authentication Bypass for Wired and Wireless Access
- Identity Management
- Active Directory Identity Source
- Additional Identity Sources
- Certificate Services
Section 6: Introducing Cisco ISE Policy Configuration
- Cisco ISE Policy
- Cisco ISE Authentication Rules
- Cisco ISE Authorization Rules
Section 7: PKI and Advanced Supplicants
- Public Key Infrastructure (PKI)
- TEAP in Comply to Connect (C2C)
- Secure Client ISE features and Configuration for C2C
Section 8: Introducing the Cisco ISE Profiler
- Web Access with Cisco ISE
- ISE Profiler
- Cisco ISE Probes
- Profiling Policy
- Custom Attributes in Profile
Section 9: Introducing Cisco ISE Endpoint Compliance Services
- Endpoint Compliance Services Overview
Section 10: Configuring Client Posture Services and Compliance
- Client Posture Services and Provisioning Configuration
Section 11: Introducing Profiling Best Practices and Reporting
- Profiling Best Practices
Section 12: C2C Use Cases
- Cisco CX ISE Reporting Tool
- ISE Reporting
- ISE Hardening
- Profiling Best Practices for C2C
Section 13: C2C Third-Party Integrations-Tenable
- Tenable Use Case
- Tenable Overview and Capabilities
- Tenable Integration Prerequisites
- Tenable Integration Configuration
- Policy Design
- Policy Enforcement
- Enforcement Verification
Section 14: C2C Third-Party Integrations-MECM
- MECM Use Case
- MECM Overview and Capabilities
- MECM Integration Prerequisites
- MECM Integration Configuration
- Policy Design
- Policy Enforcement
- Enforcement Verification
Section 15: C2C Third-Party Integrations-Trellix
- Trellix Use Case
- Trellix Overview and Capabilities
- Trellix Integration Prerequisites
- Trellix Integration Configuration
- Policy Enforcement
- Enforcement Verification
Section 16: Troubleshooting Cisco ISE Policy and Third-Party NAD
- Cisco ISE Third-Party Network Access Device Support
- Troubleshooting Cisco ISE Policy Configuration
Section 17: Exploring Cisco TrustSec
- Cisco TrustSec Overview
- Cisco TrustSec Enhancements
- Cisco TrustSec Configuration
Section 18: Working with Network Access Devices
- Reviewing AAA
- Cisco ISE TACACS+ Device Administration
- Configuring TACACS+ Device Administration
- TACACS+ Device Administration Guidelines and Best Practices
Course Prerequisites:
There are no prerequisites for this training. However, the knowledge and skills you are recommended to have before attending this training are:
- Familiarity with 802.1X
- Familiarity with Microsoft Windows Operating Systems
- Familiarity with Cisco IOS CLI for wired and wireless network devices
- Familiarity with Cisco Identity Service Engine
Course Overview:
TN-813: Certified in Governance, Risk, and Compliance (CGRC) course is for the (ISC)²® Certified in Governance, Risk, and Compliance (CGRC) credential previously known as Certified Authorization Professional (CAP). This course walks the student through the Risk Management Framework following practices the NIST pubs. CGRC is an objective measure of the knowledge, skills and abilities required for personnel involved in the process of certifying and accrediting security of information systems. Specifically, this credential applies to those responsible for formalizing processes used to assess risk and establish security requirements. Their decisions will ensure that information systems possess security commensurate with the level of exposure to potential risk, as well as damage to assets or individuals.The CGRC credential is appropriate for civilian, state and local governments in the U.S., as well as commercial markets. CGRC certification applies to job functions such as authorization officials, system owners, information owners, information system security officers, and certifiers. CGRC is crucial to the Management staff.
This course is the “why” of the entire security field. It provides a logical way of allocating resources where there is greatest risk and why we make the decisions we make in the field of security. It is TechNow’s view that of all the security courses we have seen, this course genuinely puts the “big picture” of security in front of the students. Students actually come to an understanding of truly what is critical to security of an enterprise versus a bunch of nuts and bolts of security.
TechNow’s CGRC course covers all of the (ISC)²® CGRC 7 Knowledge domains:
- Security and Privacy Governance, Risk Management, and Compliance Program
- Scope of the System
- Selection and Approval of Framework, Security, and Privacy Controls
- Implementation of Security and Privacy Controls
- Assessment/ Audit of Security and Privacy Controls
- System Compliance
- Compliance Maintenance
RMF Related Steps
- Prepare – Process Initiation
- Categorize Information Systems
- Establish the Security Control Baseline
- Apply Security Controls
- Assess Security Controls
- Authorize Information System
- Monitor Security Controls
TechNow’s CGRC Instructors have extensive knowledge and experience in the field, and have been working with organizations to build assessor teams for over 20 years.
Attendees to TN-813: Certified in Governance, Risk, and Compliance (CGRC) will receive TechNow authorized training materials, including access to the documentation of the CGRC Exam domains, and expert instruction.
Dates/Locations:
| Date/Time | Event |
|---|---|
|
05/26/2026 - 05/29/2026 08:00 -16:00 |
TN-813: Certified in Governance, Risk and Compliance (CGRC)</a> TechNow, Inc, San Antonio TX |
|
09/08/2026 - 09/11/2026 08:00 -16:00 |
TN-813: Certified in Governance, Risk and Compliance (CGRC) TechNow, Inc, San Antonio TX |
Duration: 3 Days
Course Objectives:
- Initiate the Preparation Phase
- Perform Execution Phase
- Perform Maintenance Phase
- Understand the Purpose of Security Authorization
Prerequisites:
- IT Security
- Information Assurance
- Information Risk Management certification and systems administration
- 1-2 years of general experience technical experience
- 2 years of general systems experience
- 1-2 years of Database/Systems Development/Network Experience
- Information Security Policy Experience
Comments
Latest comments from students
