• Course overview
  • Course details
  • Prerequisites

Course overview

About this course

This three-day course provides detailed coverage of the configuration of the Pulse Policy Secure Solution. Students will work with Pulse Policy Secure, a firewall enforcer, and configure secured access to network resources. Key areas include Pulse Policy Secure deployment, basic implementation, and component configuration. Students will have the opportunity to apply their knowledge in several hands-on labs.

Who should attend?

Network Engineers, Enterprise System Architects, Technical Support Specialists & Implementation Consultants.

At course completion

After completing this course, students will be able to:
  • Pulse Policy Secure
  • Initial Configuration
  • The Access Management Framework
  • User Roles
  • Client Access Methods
  • Profiler
  • Firewall Enforcement
  • Layer 2 Enforcement
  • Endpoint Security
  • Authentication Options
  • Management and Troubleshooting
  • High Availability
  • Virtualization
  • Pulse Policy Secure Integration

Show More Show Less

Course details

Chapter 1: Course Introduction

Chapter 2: Pulse Policy Secure

Chapter 3: Initial Configuration

Chapter 4: The Access Management Framework

Chapter 5: User Roles

Chapter 6: Client Access Methods

Chapter 7: Profiler

Chapter 8: Firewall Enforcement

Chapter 9: Layer 2 Enforcement

Chapter 10: Endpoint Security

Chapter 11: Authentication Options

Chapter 12: Management and Troubleshooting

Chapter 13: High Availability

Chapter 14: Virtualization

Chapter 15: Pulse Policy Secure Integration

Show More Show Less

Prerequisites

  • Students should have experience with the TCP/IP protocol suite, including addressing and routing and Ethernet experience, including addressing, basic switching operations, and virtual LANs (VLANs).
  • Students should have knowledge of basic security and access management concepts, including 802.1X and RADIUS

Our Technology Partners

Spectrum Networks is the Authorised Learning Partner for some of the leaders in IT technology for Digital Transformation