Select a different country or region to see content specific to your location and make online purchases.
x
GB
/
GBP
Image
Filter Events

Pulse Policy Secure Deployment, Implementation and Configuration - PPS

PS-TRN-PPS-180D

Pulse Secure Training Courses Certification

Schedule

See all events for this courseSee all Courses
Open
Pulse Secure

Pulse Policy Secure Deployment, Implementation and Configuration - PPS

PS-TRN-PPS-180D

Bracknell

Language: English

GMT UTC+00:00

Start date:13 Mar 2023 09:00
End date:15 Mar 2023 17:00
Duration:3 days

$ 3,000

Open
Pulse Secure

Pulse Policy Secure Deployment, Implementation and Configuration - PPS

PS-TRN-PPS-180D

Houten

Language: English

CEST UTC+02:00

Start date:31 May 2023 09:30
End date:02 Jun 2023 17:30
Duration:3 days

$ 3,000

Open
Pulse Secure

Pulse Policy Secure Deployment, Implementation and Configuration - PPS

PS-TRN-PPS-180D

Diegem

Language: English

CEST UTC+02:00

Start date:03 Jul 2023 09:00
End date:05 Jul 2023 17:00
Duration:3 days

$ 3,000

Open
Pulse Secure

Pulse Policy Secure Deployment, Implementation and Configuration - PPS

PS-TRN-PPS-180D

Bracknell

Language: English

BST UTC+01:00

Start date:04 Sep 2023 09:00
End date:06 Sep 2023 17:00
Duration:3 days

$ 3,000

Lab
Pulse Secure

Pulse Policy Secure Deployment, Implementation and Configuration - PPS

PS-TRN-PPS-180D

from $ 300

Description

This three-day course provides detailed coverage of the configuration of the Pulse Policy Secure Solution. Students will work with Pulse Policy Secure, a firewall enforcer, and configure secured access to network resources.

Key areas include Pulse Policy Secure deployment, basic implementation, and component configuration. Students will have the opportunity to apply their knowledge in several hands-on labs.

NOTE: This course prepares students for the requirements of the “Pulse Secure Certified Technical Expert – PPS” Certification Exam.

Target Audience

  • Network Engineers
  • Enterprise System Architect
  • Technical Support Specialists
  • Implementation Consultants
  • Students should have experience with the TCP/IP protocol suite, including addressing and routing, and Ethernet experience, including addressing, basic switching operations, and virtual LANs (VLANs).

  • Students should have knowledge of basic security and access management concepts, including 802.1X and RADIUS.
  • Day 1

  • Chapter 1: Course Introduction
  • Chapter 2: Pulse Policy Secure
  • Chapter 3: Initial Configuration
  • o Lab: Initial Configuration

  • Chapter 4: The Access Management Framework
  • Chapter 5: User Roles
  • o Lab: User Roles

  • Chapter 6: Client Access Methods
  • o Lab: Client Access

    Day 2

  • Chapter 7: Profiler
  • Chapter 8: Firewall Enforcement
  • o Lab: Firewall Enforcement

  • Chapter 9: Layer 2 Enforcement
  • o Lab: 802.1X Enforcement

  • Chapter 10: Endpoint Security
  • o Lab: Endpoint Security

    Day 3

  • Chapter 11: Authentication Options
  • o Lab: Authentication Options

  • Chapter 12: Management and Troubleshooting
  • o Lab: Logging and Troubleshooting

  • Chapter 13: High Availability
  • o Lab: Clustering

  • Chapter 14: Virtualization
  • Chapter 15: Pulse Policy Secure Integration
  • We use cookies to understand how you use our site and to improve your experience. To learn more, click here. Read our revised Privacy Policy and Terms and Conditions.