Pulse Policy Secure Deployment, Implementation and Configuration

  • Duration: 3 days
Categories:
Tags:

This three-day course provides detailed coverage of the configuration of the Pulse Policy Secure Solution. Students will work with Pulse Policy Secure, a firewall enforcer, and configure secured access to network resources.

  • Objectives 0/0

    Key areas include Pulse Policy Secure deployment, basic implementation, and component configuration. Students will have the opportunity to apply their knowledge in several hands-on labs.
    Target Audience
    Network Engineers
    Enterprise System Architect
    Technical Support Specialists
    Implementation Consultants
    Prerequisites
    Students should have experience with the TCP/IP protocol suite, including addressing and routing, and Ethernet experience, including addressing, basic switching operations, and virtual LANs (VLANs).
    Students should have knowledge of basic security and access management concepts, including 802.1X and RADIUS.

    No items in this section
  • Curriculum 0/0

    Chapter 1: Course Introduction
    Chapter 2: Pulse Policy Secure
    Chapter 3: Initial Configuration
    Chapter 4: The Access Management Framework
    Chapter 5: User Roles
    Chapter 6: Client Access Methods
    Chapter 7: Profiler
    Chapter 8: Firewall Enforcement
    Chapter 9: Layer 2 Enforcement
    Chapter 10: Endpoint Security
    Chapter 11: Authentication Options
    Chapter 12: Management and Troubleshooting
    Chapter 13: High Availability
    Chapter 14: Virtualization
    Chapter 15: Pulse Policy Secure Integration

    No items in this section

Price

$3,000.00

Rating

Not enough ratings to display

Leave a Reply

Your email address will not be published. Required fields are marked *

X