Implementing Aruba Network Security Training in Hong Kong

  • Learn via: Classroom
  • Duration: 5 Days
  • Level: Fundamentals
  • Price: From €3,679+VAT
We can host this training at your preferred location. Contact us!

The Implementing Aruba Network Security course covers intermediate security concepts and prepares candidates to take the exam to achieve Aruba Certified Networking Security Professional (ACNSP) certification. This course helps admins use the Aruba portfolio to implement Zero Trust Security (ZTS) and protect their networks from threats. It explains how to configure Aruba network infrastructure and ClearPass solutions to authenticate and control both wired and wireless users, as well as remote users on a client-to-site VPN. The course further explains how to collect a variety of contextual information on ClearPass Policy Manager (CPPM) and implement advanced role mapping and enforcement policies. The course also covers using ClearPass Device Insight to enhance visibility. Learners will learn how to set up features such as the ArubaOS-CX Network Analytics Engine (NAE), Aruba Wireless Intrusion Detection System/Intrusion Prevention System (WIDS/WIPS), and Aruba gateway IDS/IPS, as well as how to investigate alerts.

The following knowledge is recommended for this seminar:

Aruba recommends that the candidate has attended the Aruba Network Security Fundamentals (ANSF) course prior to attending this professional level course. Or have equivalent experience and knowledge of network security fundamentals.

After you successfully complete this course, expect to be able to:

1. Protect and Defend
  • Define security terminologies
  • PKI
  • Zero Trust Security
  • WIPS & WIDS
  • Harden devices Securing network infrastructure
  • Securing L2 & L3 protocols
  • Secure a WLAN
  • Deploy AAA with CPPM
  • Secure a wired LAN Deploy AAA with CPPM Deploy 802.1x Deploy certificate based authentication for users & devices Secure the WAN Understand Aruba's SD-Branch for automating VPN deployment Design and deploy VPN with Aruba's VIA client Classify endpoints Deploy endpoint classification to devices Integrate ClearPass and CPDI
2. Analyze
  • Threat detection
  • Investigate Central alerts
  • Interpret packet captures
  • Evaluate endpoint postures
  • Troubleshooting
  • Deploy and analyze results from NAE scripts
  • Endpoint classification
  • Analyze endpoint classification data to identify risks
  • Analyze endpoint classification data on CPDI
3. Investigate
  • Forensics
  • Explain CPDI capabilities of showing network conversations on supported Aruba devices

ArubaSecurity Strategy&ClearPass Fundamentals
  • Explain Aruba Zero Trust Security
  • Explain how Aruba solutions apply to different security vectors
Deploy TrustedCertificatestoArubaSolutions
  • Describe PKI dependencies
  • Set up appropriate certificates & trusted root CAs on CPPM
Implement Certificate-Based802.1x
  • Deploy AAA for WLANs with ClearPass Policy Manager (CPPM)
  • Deploy certificate based authentication for users and devices
Implement Advanced Policies one the Role-Based ArubaOS Firewall
  • Deploy AAA for WLANs with ClearPass Policy Manager (CPPM)
  • Define and apply advanced firewall policies
Evaluate Endpoint Posture
  • Evaluate different endpoint postures
Implement aTrusted Network Infrastructure
  • Set up secure authentication and authorization of network infrastructure managers, including,
  • Advanced TACACS+ authorization
  • Multi-factor authentication
  • Secure L2 and L3 protocols, as well as other protocols such as SFTP
Implement 802.1XandRole-BasedAccess Control onAOS-CX
  • Deploy AAA for wired devices using ClearPass Policy Manager (CPPM), including local and downloadable roles
  • Explain Dynamic Segmentation, including its benefits and use cases
  • Deploy Dynamic Segmentation using VLAN steering
  • Configure 802.1X authentication for APs
Implement Dynamic Segmentation on AOS-CXSwitches
  • Explain Dynamic Segmentation, including its benefits and use cases
  • Deploy Dynamic Segmentation, including:
  • User-based tunneling (UBT)
  • Virtual network-based tunneling (VNBT)
Monitor with Network Analytics Engine(NAE)
  • Deploy and use Network Analytics
  • Engine (NAE) agents for monitoring
ImplementWIDS/WIPS
  • Explain the Aruba WIPS and WIDS technology
  • Configure AP rogue detection and mitigation
Use CPPM and Third-Party Integration to Mitigate Threats
  • Describe log types and levels and use the CPPM Ingress Event Engine to integrate with third-party logging solutions
  • Set up integration between the Aruba infrastructure and CPPM, allowing CPPM
Implement Device Profiling with CPPM
  • Explain benefits and methods of endpoint classification on CPPM, including active and passive methods
  • Deploy and apply endpoint classification to devices
  • Analyze endpoint classification data on CPPM to identify risks
Introduction to ClearPassDeviceInsight
  • Define ClearPass Device Insight (CPDI)
  • Analyze endpoint classification data on CPDI
Deploy ClearPassDeviceInsight
  • Define and deploy ClearPass Device Insight (CPDI)
  • Analyze endpoint classification data on CPDI
IntegrateCPDIwith CPPM
  • Integrate ClearPass Policy Manager (CPPM) and ClearPass Device Insight (CPDI)
  • Mitigate threats by using CPDI to identify traffic flows and apply tags and CPPM to take actions based on tags
UsePacket CapturesTo Investigate Security Issues
  • Perform packet capture on Aruba infrastructure locally and using Central
  • Interpret packet captures
Establish aSecureRemoteAccess
  • Explain VPN concepts
  • Understand that Aruba SD-WAN solutions automate VPN deployment for the WAN
  • Describe the Aruba 9x00 Series Gateways
  • Design and deploy remote VPNs using Aruba VIA
ConfigureArubaGateway IDS/IPS
  • Describe the Aruba 9x00 Series Gateways
  • Define and apply UTM policies
Use Central Alertsto Investigate Security Issues
  • Investigate Central alerts
  • Recommend action based on the analysis of Central alerts


Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our Hong Kong facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

11 January 2025 (5 Days)
Hong Kong, Kowloon, Tsuen Wan
Classroom / Virtual Classroom
19 January 2025 (5 Days)
Hong Kong, Kowloon, Tsuen Wan
Classroom / Virtual Classroom
11 January 2025 (5 Days)
Hong Kong, Kowloon, Tsuen Wan
Classroom / Virtual Classroom
19 January 2025 (5 Days)
Hong Kong, Kowloon, Tsuen Wan
Classroom / Virtual Classroom
17 February 2025 (5 Days)
Hong Kong, Kowloon, Tsuen Wan
Classroom / Virtual Classroom
24 February 2025 (5 Days)
Hong Kong, Kowloon, Tsuen Wan
Classroom / Virtual Classroom
€3,679 +VAT
Book Now
17 February 2025 (5 Days)
Hong Kong, Kowloon, Tsuen Wan
Classroom / Virtual Classroom
24 February 2025 (5 Days)
Hong Kong, Kowloon, Tsuen Wan
Classroom / Virtual Classroom
€3,679 +VAT
Book Now
Implementing Aruba Network Security Training Course in Hong Kong

Hong Kong is officially known as the Hong Kong Special Administrative Region of the People's Republic of China (HKSAR) and is a city and special administrative region of China on the eastern Pearl River Delta in South China. Hong Kong is one of the most densely populated places in the world, with over 7.5 million population. The official languages of the HKSAR are Chinese and English. Hong Kong is a highly developed territory and ranks fourth on the United Nations Human Development Index and the residents of Hong Kong have the highest life expectancies in the world.

The best time to visit Hong Kong is from September to December, since the temperatures, averaging between 19 to 28 degree Celsius. During this outdoor activities-friendly travelling season, you can take a walk along Victoria Harbour, visit the islands of Lantau, Lamma and Cheung Chau and participate in the Mid-Autumn Festival. Top choices of the tourists to visit in Hong Kong are Big Buddha statue, Wong Tai Sin Temple, Repulse Bay and the Beaches and Hong Kong Disneyland.

Explore our diverse range of IT courses, encompassing programming, software development, cyber security, data science, business skills, and Agile/Scrum. Wherever you are in Hong Kong, our seasoned instructors will bring practical training and expert knowledge to your preferred training venue.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.