- Course overview
- Course details
- Prerequisites
Course overview
About this course
This three-day course provides detailed coverage of the configuration of the Pulse Policy Secure Solution. Students will work with Pulse Policy Secure, a firewall enforcer, and configure secured access to network resources. Key areas include Pulse Policy Secure deployment, basic implementation, and component configuration. Students will have the opportunity to apply their knowledge in several hands-on labs.
Who should attend?
Network Engineers, Enterprise System Architects, Technical Support Specialists & Implementation Consultants.
At course completion
After completing this course, students will be able to:- Pulse Policy Secure
- Initial Configuration
- The Access Management Framework
- User Roles
- Client Access Methods
- Profiler
- Firewall Enforcement
- Layer 2 Enforcement
- Endpoint Security
- Authentication Options
- Management and Troubleshooting
- High Availability
- Virtualization
- Pulse Policy Secure Integration
Course details
Chapter 1: Course Introduction
Chapter 2: Pulse Policy Secure
Chapter 3: Initial Configuration
Chapter 4: The Access Management Framework
Chapter 5: User Roles
Chapter 6: Client Access Methods
Chapter 7: Profiler
Chapter 8: Firewall Enforcement
Chapter 9: Layer 2 Enforcement
Chapter 10: Endpoint Security
Chapter 11: Authentication Options
Chapter 12: Management and Troubleshooting
Chapter 13: High Availability
Chapter 14: Virtualization
Chapter 15: Pulse Policy Secure Integration
Prerequisites
- Students should have experience with the TCP/IP protocol suite, including addressing and routing and Ethernet experience, including addressing, basic switching operations, and virtual LANs (VLANs).
- Students should have knowledge of basic security and access management concepts, including 802.1X and RADIUS
Enquiry
Course : Pulse Policy Secure - Deployment, Implementation and Configuration
Enquiry
request for : Pulse Policy Secure - Deployment, Implementation and Configuration