Pulse Policy Secure Deployment, Implementation and Configuration

This three-day course provides detailed coverage of the configuration of the Pulse Policy Secure Solution. Students will work with Pulse Policy Secure, a firewall enforcer, and configure secured access to network resources. Key areas include Pulse Policy Secure deployment, basic implementation, and component configuration. Students will have the opportunity to apply their knowledge in several hands-on labs.

Course syllabus:

  1. Course Introduction

  2. Pulse Policy Secure

  3. Initial Configuration

  4. The Access Management Framework

  5. User Roles

  6. Client Access Methods

  7. Profiler

  8. Firewall Enforcement

  9. Layer 2 Enforcement

  10. Endpoint Security

  11. Authentication Options

  12. Management and Troubleshooting

  13. High Availability

  14. Virtualization

  15. Pulse Policy Secure Integration