About

Welcome to My CCIE Security Journey

Hello and welcome!

This blog documents my journey toward achieving the CCIE Security certification. If you’ve ever considered taking this path—or you’re already somewhere along the road - I hope this site becomes a useful companion along the way.

The goal here is simple: share what I learn as I study, experiment, break things, fix them again, and gradually work through the technologies that make up Cisco’s security ecosystem.

Expect a Real Learning Journey

As with any real learning process, there will probably be a few mistakes along the way. Networking and security technologies evolve quickly, and sometimes the best learning happens through trial, error, and discussion.

If you spot something that doesn’t look right, please let me know. Feedback, corrections, and shared experiences are always welcome. The idea is to make this space useful not just for me, but for anyone preparing for the same certifications.

What’s Coming Next

Over the next few days and weeks, I’ll be building out the structure of the site and posting articles covering key topics from the Cisco security certification track. These posts will include notes, explanations, lab observations, and practical insights from my study process.

First Stop: Cisco ISE

The first certification I’ll be tackling is the Cisco CCNP Security concentration exam: Implementing and Configuring Cisco Identity Services Engine.

This is the SISE 300-715 exam, which focuses on Cisco ISE deployment, policy enforcement, authentication, authorization, and network access control.

If you’re preparing for this exam too, you can expect upcoming posts on topics like:

  • Cisco ISE architecture and deployment models

  • Authentication and authorization policies

  • 802.1X and network access control

  • Guest and BYOD workflows

  • Integration with external identity sources

  • Troubleshooting ISE environments

Let’s Get Started

Whether you’re studying for the exam, working with Cisco ISE in production, or simply interested in network security, I’m glad you’re here.

Comparative Architectures of Centralised and Local Web Authentication

  The choice between Local Web Authentication (LWA) and Centralized Web Authentication (CWA) depends on your need for dynamic policy enforce...