Download Our Latest Course Catalog | Download Now

Pulse Connect Secure (PCS): Administration and Configuration

This course begins with foundational topics and progressively covers more complex areas such as user roles, resource policies, and advanced authentication methods, ensuring a thorough understanding of the PCS ecosystem.

Overview

Overview

Through a series of detailed modules and practical labs—including the Initial Configuration Lab, User Roles Lab, and Authentication Lab—participants will engage with real-world scenarios that enhance their learning experience.

Prerequisites

To get the most out of the Pulse Connect Secure (PCS) Administration and Configuration course, we recommend you have the following knowledge and experience:

  • Basic understanding of networking fundamentals, including LAN and WAN principles.
  • Familiarity with IP addressing (IPv4 and IPv6) and network routing concepts.
  • General knowledge of firewalls, VPNs, and remote access technologies.
  • Experience with network security concepts and common protocols (such as SSL/TLS).
  • Comfortable using and managing operating systems, particularly Windows and/or Unix/Linux platforms.
  • Some exposure to administering and configuring network or security devices is beneficial but not mandatory.
Scope

N/A

Target Audience

The Pulse Connect Secure Administration and Configuration course is designed for IT professionals focused on secure remote access and VPN solutions.

  • Network Administrators
  • Network Engineers
  • Security Administrators
  • Security Consultants
  • Systems Engineers
  • IT Support Staff
  • VPN Administrators
  • Infrastructure Architects
  • Technical Support Personnel
  • Cybersecurity Professionals
Best Practices

Datacipher, a premier Authorized Training Partner, is celebrated for its outstanding educational programs and unwavering dedication to training excellence. Our instructors, both passionate experts and seasoned security consultants, infuse each session with deep practical knowledge.

Certification

N/A

FAQs

Can the PCS course be taken online?

Yes, the PCS course is available online, complete with live demonstrations and personal lab access, led by expert instructors for an immersive learning experience.

Is in-person classroom training available?

Indeed, in-person training is offered at our facilities, and we can customize sessions for on-site delivery. Please check our “Price and Dates” section or contact us directly for scheduling information.

Will I receive official course materials?

Participants will receive official course materials in both electronic and printed forms. Ensure your booking is confirmed at least ten days in advance to secure printed materials.

Can the electronic coursebook be printed?

Yes, the electronic coursebook is printable, providing flexible study options.

Do participants receive a certificate of completion?

Upon successfully completing the course, participants will be awarded an official certificate, recognizing their proficiency in the PCS content.

Course Outline

Module 1 – Course Introduction
Module 2 – Pulse Connect Secure
Module 3 – Initial Configuration / Lab: Initial Configuration Lab
Module 4 – Technology and Terminology
Module 5 – User Roles / Lab: User Roles Lab
Module 6 – Basic Logging and Troubleshooting / Lab: Logging and Tracing Lab
Module 7 – Resource Policies and Profiles / Lab: Resource Policies Lab
Module 8 – Authentication / Lab: Authentication Lab
Module 9 – Advanced Authentication Options / Lab: Single Sign-on Lab
Module 10 – Certificates / Lab: Certificate Lab
Module 11 – Client and Server Applications / Lab: VPN Tunneling Lab
Module 12 – Pulse Secure Client / Lab: Pulse Secure Client Lab
Module 13 – License Server Client Deployment
Module 14 – Endpoint Security / Lab: Host Checker Lab
Module 15 – Administration / Lab: Administration Lab
Module 16 – Troubleshooting / Lab: Troubleshooting Lab
Module 17 – Virtualization
Module 18 – Clustering / Lab: Cluster Lab
Module 19 – Cloud Secure
  • Select Time Zone
    Format
    Language/Location
Payment Methods

At DataCipher, we provide a variety of payment options for our Check Point courses. Here’s what you can choose from:

Purchase Order (PO) – If your organization prefers using a purchase order, start the registration process by clicking the Register button. At the end of the registration form, select the option “My company will pay for it, please send an invoice with the payment details.” Our training team will then provide an official quote and any necessary additional information that your accounts department might need to issue the PO.

Bank Transfer – DataCipher has bank accounts in both the US and Europe, accommodating all standard bank transfer methods such as IBAN/BIC, Swift, ACH, or wire transfer. To make a payment via bank transfer, simply use the Register button to sign up for your selected course.

Credit Card Payments – We accept payments from all major credit cards, including Mastercard, VISA, American Express, Discover & Diners, and Cartes Bancaires. Payments can be made directly through the registration link or by requesting an invoice that includes a web link for online payment. All transactions are secure, and DataCipher does not store any credit card information.

These methods are designed to make the registration process as smooth and flexible as possible for all participants.

Status

Guaranteed to Run – DataCipher is committed to running this class unless unforeseen events such as an instructor’s accident or illness occur.

Guaranteed on Next Booking – The course will proceed once an additional student registers.

Scheduled Class – We have scheduled this course and rarely cancel due to low enrollment. We offer a “Cancel No More Than Once” guarantee, ensuring that if a class is canceled due to insufficient enrollment, the next session will run regardless of the number of attendees.

Sold Out – If the class is fully booked, please use our contact form to join the waiting list or to inquire about additional sessions. We’re here to accommodate your training needs and keep you informed of new opportunities.

Half and Full-Day Training

At DataCipher, we offer our training courses in both traditional full-day and convenient half-day formats. Our half-day classes are specifically designed for IT professionals who cannot be away from their workplaces for consecutive full days. This flexible schedule allows participants to dedicate a few hours to learning and then return to their regular work responsibilities.

The curriculum for both the full-day and half-day formats is identical. The primary difference is that the half-day classes spread the coursework over a more extended period, providing a balanced approach to professional education. DataCipher has been successfully running these half-day training sessions for several years, receiving consistently positive feedback from our customers. They appreciate the flexibility and report that the extended timeframe facilitates a deeper understanding of the material, as it gives them more time to absorb and reflect on the information learned.

By the end of this training, participants will be well-equipped with the necessary expertise to ensure secure remote access and maintain cloud environments effectively. The PCS Administration and Configuration course is ideal for network administrators and security professionals seeking to advance their technical proficiency and confidently handle the complexities of modern network security.

REQUEST CUSTOM DELIVERY

REQUEST a Quote

Become An Expert By Practice – Get Your Hands On Labs

Don’t let your tech outpace the skills of your people

TRUSTED BY TOP COMPANIES LIKE IBM, DELOITTE, ERICSSON, AND MORE.
DISCOVER OUR CUSTOMER PORTFOLIO.

Dedicated to excellence, we cultivate strong partnerships with worldwide technology innovators.

Testimonials

What Our Clients Say