Pulse Policy Secure (PPS): Deployment, Implementation and Configuration

Pulse Policy Secure (PPS): Deployment, Implementation and Configuration PRICE: $3000.00 DURATION: 3

Course Content

This three-day course provides detailed coverage of the configuration of the Pulse Policy Secure Solution. Students will work with Pulse Policy Secure, a firewall enforcer, and configure secured access to network resources. Key areas include Pulse Policy Secure deployment, basic implementation, and component configuration. Students will have the opportunity to apply their knowledge in several hands-on labs. NOTE: This course prepares students for the requirements of the “Pulse Secure Certified Technical Expert – PPS” Certification Exam.

Who should attend?

Network Engineers, Enterprise System Architects, Technical Support Specialists & Implementation Consultants.

At course completion

After completing this course, students will be able to:

    • Pulse Policy Secure deployment
    • Basic implementation
    • Component configuration
    • Students will have the opportunity to apply their knowledge in several hands-on labs


    • Students should have experience with the TCP/IP protocol suite, including addressing and routing
    • Students should have Ethernet experience, including addressing, basic switching operations, and virtual LANs (VLANs).
    • Students should have knowledge of basic security and access management concepts, including 802.1X and RADIUS

Day 1

  • Chapter 1: Course Introduction
  • Chapter 2: Pulse Policy Secure
  • Chapter 3: Initial Configuration
    • Lab: Initial Configuration
  • Chapter 4: The Access Management Framework
  • Chapter 5: User Roles
    • Lab: User Roles
  • Chapter 6: Client Access Methods
    • Lab: Client Access

Day 2

  • Chapter 7: Profiler
  • Chapter 8: Firewall Enforcement
    • Lab: Firewall Enforcement
  • Chapter 9: Layer 2 Enforcement
    • Lab: 802.1X Enforcement
  • Chapter 10: Endpoint Security
    • Lab: Endpoint Security

Day 3

  • Chapter 11: Authentication Options
    • Lab: Authentication Options
  • Chapter 12: Management and Troubleshooting
    • Lab: Logging and Troubleshooting
  • Chapter 13: High Availability
    • Lab: Clustering
  • Chapter 14: Virtualization
  • Chapter 15: Pulse Policy Secure Integration

Riyadh KSA

Enroll Now
2020/01/19 - 2020/01/21

Bengaluru India

Enroll Now
2020/01/20 - 2020/01/22

Dubai UAE

Enroll Now
2020/02/02 - 2020/02/04