Pulse Policy Secure Deployment, Implementation and Configuration
This three-day course provides detailed coverage of the configuration of the Pulse Policy Secure Solution. Students will work with Pulse Policy Secure, a firewall enforcer, and configure secured access to network resources. Key areas include Pulse Policy Secure deployment, basic implementation, and component configuration. Students will have the opportunity to apply their knowledge in several hands-on labs.
Course syllabus:
-
Course Introduction
-
Pulse Policy Secure
-
Initial Configuration
-
The Access Management Framework
-
User Roles
-
Client Access Methods
-
Profiler
-
Firewall Enforcement
-
Layer 2 Enforcement
-
Endpoint Security
-
Authentication Options
-
Management and Troubleshooting
-
High Availability
-
Virtualization
-
Pulse Policy Secure Integration