Secure Access Product Training
Sign up for one of our certification courses. Become fully certified in our products and maximize the potential of your mobile deployment! Below is a list of our upcoming courses.
Secure Access Product Overview & Architecture
- Zero Trust Network Access/Software Defined Perimeter
- Digital Experience Monitoring
- Core functionality, security, differentiation, and productivity benefits
- Security
- System administration and user experience
- Secure Web Gateway
- Authentication, encryption, and persistence
- Architecture
- Secure Access Cloud
- Client software components
- Virtual addresses
- Secure Access Warehouse
- Design, deployment, redundancy, and load balancing
- Networking Considerations
- Scalability
- High availability
Secure Access Installation – Virtual Lab Environment
- Mobility Server Installation
- Post installation best practices
- Secure Access Client Installation
- Validate connectivity
- Review management console status screens
- Simulate network connectivity loss and roaming
- Test application session persistence
Configuration
- Server settings
- Client settings
- Settings hierarchy
- User and device groups
- Configuring overrides
- Configure Global Settings
- Configure User groups
- Quarantine
- Application Persistence as a Service (APaaS)
- Configure role based access to the Mobility Console
- Configure authentication profiles
- SAML
- Understanding certificate infrastructure
- Device authentication
- Single Sign-On
- Automatic updating of the Mobility client
- Map Secure Access groups to Active Directory groups
- Configure Client Settings
- Configure Device Groups
- BYOD configuration
- Configure Console Access Rules
Policy
- Purpose and benefits
- Rule structure and implementation
- Working with host groups
- Policy scenarios
- Subscribing a device
- Software Defined Perimeter
- Quality of service and real-time optimizations
- Secure Web Gateway exercises
- Split tunnel traffic while maintaining visibility
- Manipulate traffic based on destination domain (YouTube, Netflix, etc)
- Network Access Control
Policy Exercises
- Create a Rule Set
- Passthrough Application
- Prioritize network adapters
- Subscribing policies
- Host groups
- Split tunnel traffic
- Restricting application based on interface
- Traffic restrictions based on reputation
- Software Defined Perimeter
- Secure Web Gateway
- Perform NAC remediation
- Quarantine client for Antivirus failure
- Restrict access (remediate) client as a result of a failure
- Simulate and validate each NAC condition
- Insights for Network installation & configuration
- Configure data export settings
- Bandwidth Server installation & testing
- Configure custom diagnostics client tests
Insights for Network
- Architecture
- Core functionality and productivity benefits
- System administration and user experience
- Insights for Network components
- Core functionality and productivity benefits
- System administration and user experience
- Interpreting Diagnostics reports
- Using Diagnostics reports to aid in client troubleshooting
- Alerts
- Using Insights for Network to better respond to client support issues
- Performance
- Threat Defense
- Cost Control
- Inventory
- System
Management Tools & Troubleshooting
- Server & client event and debugging
- Upgrade and server migration planning
- Command line troubleshooting
- Client activity logs
- Warehouse logs, backup, and management
- Automate warehouse backups
- Automate migrating a Secure Access client to a new server pool
- Automatic client software deployments
- Individual help (bring your specific situations that you are working on and we will use them as a class project)