Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Identity Management, Authentication and Access Control with pfSense

Description

pfSense provides network firewall, VPN, and other services to users and network operators. In this course, you'll learn the setup, configuration, and validation of pfSense in an enterprise environment.

Managing access and ensuring network integrity can be difficult but, necessary in your networks. In this course, Identity Management, Authentication and Access Control with pfSense, you’ll cover how to utilize pfSense to secure a live enterprise environment. First, you’ll demonstrate how to setup and configure pfSense. Next, you’ll apply configurations to your device to help see and secure remote access connections. Finally, you’ll simulate a segmented network with access controls on the device to limit traffic to and from each. When you’re finished with this course, you’ll have the skills and knowledge to identify, protect, detect, or respond to threats in your network systems.

Tags
Online Course


Identity Management, Authentication and Access Control with pfSense

Affiliate notice

pfSense provides network firewall, VPN, and other services to users and network operators. In this course, you'll learn the setup, configuration, and validation of pfSense in an enterprise environment.

Managing access and ensuring network integrity can be difficult but, necessary in your networks. In this course, Identity Management, Authentication and Access Control with pfSense, you’ll cover how to utilize pfSense to secure a live enterprise environment. First, you’ll demonstrate how to setup and configure pfSense. Next, you’ll apply configurations to your device to help see and secure remote access connections. Finally, you’ll simulate a segmented network with access controls on the device to limit traffic to and from each. When you’re finished with this course, you’ll have the skills and knowledge to identify, protect, detect, or respond to threats in your network systems.