Aruba Clear Pass Essentials Training

This five-day course covering labs and modules will teach participants about fundamental features of the ClearPass Portfolio.

Category : Aruba

Course Price : $2499 Per Participant

Course Details

500+

Courses

20+

Years of Experience

95K+

Global Learners

Training Exclusives

  • Live instructor-led interactive sessions with Microsoft Certified Trainers (MCT).
  • Access to Microsoft Official Courseware (MOC).
  • Real-time Virtual Lab Environment.
  • Experience 24*7 Learner Support.
  • Self-paced learning and flexible schedules.

Course Description

This Aruba Clearpass training helps you prepare for the basic foundation skills utilized in Network Access Control utilizing the ClearPass product portfolio.  

This five-day course covering labs and modules will teach participants about the fundamental features of the ClearPass Portfolio.

Learners will also learn to set up ClearPass as an AAA server, configuring policy manager, OnBoard, OnGuard, and guest featured sets. 

This Aruba training course also covers integrating with external servers in Active Directories, Reporting, and Monitoring the deployment best performances.

What you will learn

Prerequisites

You must have good knowledge of the fundamental access layer, operations of firewall rules, and ACLs.

Learners must have experience and knowledge of network phrasing and standards, IP protocols, and VLANs.

Learners are known to have the best idea about switching and directing, LLDAP, AAA, 802.1x validation WLANs, etc.

Who should attend this course?

Ideal Participants for This Course

The program is aimed at IT professionals seeking to broaden their expertise by learning to load, configure, deploy, and manage SharePoint 2016 on the cloud or data center.

Individuals with at least one year of working experience in planning and maintenance of SharePoint and nearly two years of hands-on experience in core tech such as Windows Server 2012 R2 or later, Microsoft SQL Server 2014 or later, networking infrastructure services, Internet Information Services (IIS), Active Directory Services (AD DS).

What You Receive at Probot Learning:

Global IT Certification

Customized Training Solutions

Expert Industry Trainers

Practical Learning Approach

Flexible Training Modes

Authorized Course Materials

Career-Enhancing Skills

PPP-Based Pricing Model

Workshops for Skill Gaps

Recognition and Growth

Learning Modules

Module 1: Intro to ClearPass
  • BYOD; High Level Overview
  • Posture; Profiling; Guest and Onboard
  • Policy Service Rules
  • Authentication, Authorization and Roles
  • Enforcement Policy and Profiles
  • Authentication Types
  • Servers; Radius COA
  • Active Directory; Certificates
  • NAD Devices; Adding NAD to ClearPass
  • Network Device Groups; Attributes
  • Aruba Controller as NAD; Aruba Switch; Aruba Instant
  • Monitoring; Troubleshooting; Logging
  • Policy Simulation
  • Insight Dashboard, Reports, Alerts
  • Insight Search, Administration, Replication
  • Adding AD as Auth Source
  • Joining AD domain; Using AD services
  • Adding AD as Auth Source
  • Joining AD domain; Using AD services
  • Guest Account creation; Web Login pages
  • Guest Service configuration
  • Self-registration pages; Configuring NADS for Guest
  • Guest Manager Deep Dive; Web Login Deep Dive
  • Sponsor Approval; MAC Caching
  •  
  • Intro to Onboard; Basic Onboard Setup
  • Onboard Deepdive; Single SSID Onboarding
  • Dual SSID Onboarding
 
  • Profiling; Endpoint Analysis Deep Dive
  • Posture; Posture Deployment Options
  • OnGuard Agent Health Collection; Workflow
  • 802.1x with Posture using Persistent/dissolvable agent
  • OnGuard web Login; Monitoring & Updates
  • Operations; Admin Users
  • Clustering; Redundancy & LAB
  • ClearPass Licensing; Base License; Applications
  • Deployment Options; ClearPass Admin Login SSO
  • Access Network SSO; ASO-Auto-Sign On
  • Configuration & Demo
  • Intro; Examples.
  • General HTTP Palo Alto Firewall & Configuration
  • Adding AD as Auth Source
  • Joining AD domain; Using AD services

What Exam Do I Need To Get Certified?

  • 312-50 CEH : EC-Council Certified Ethical Hacker
 

About the Certifications

CEH – Certified Ethical Hacker Certification empowers a person in a certain network security area of Ethical Hacking through a vendor-neutral perspective. This certification will strengthen the application knowledge of security officers, auditors, security professionals, site administrators and anybody who is apprehensive about the virtue of the network infrastructure. A CEH is an individual who is trained to understand and know how to locate for shortcomings and susceptibilities in target systems and utilizes the knowledge and tools for the same as a malicious hacker.

Certification Details

Step 1: Review the skills and knowledge required to certify.

Step 2: Recommended training for EC-Council Certified Ethical Hacker (CEH) Certification:

  • CEH – Certified Ethical Hacker v12

Step 3: Take this exam and get certified.

  • Exam 312-50 CEH

Who Should Attend?

Individual who wants to strengthen the application knowledge of security officers, auditors, security professionals, site administrators and anybody who is concerned about the uprightness of the network infrastructure.

Skills Measured

This CEH – Certified Ethical Hacker Certification is an entry level training certification course where professionals having basic idea about networking and familiarity with Linux OS can join this course.

Certification Latest Updates

This Certified Ethical Hacker Certification is valid for three years staring from the certification date. You must renew your certification before expiry date.

FAQs

What qualifications are needed to obtain this certification in ethical hacking?

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Talk to Learning Advisor