Ivanti Connect Secure
In today’s hybrid work environment, secure and reliable remote access is a critical requirement for every organization. Ivanti Connect Secure (ICS) provides a powerful SSL VPN solution that enables users to securely access corporate resources from anywhere, on any device.This course is designed to help IT professionals understand not only how to configure Ivanti Connect Secure, but why it works the way it does. By combining clear theoretical explanations with practical configuration concepts, participants will gain the confidence to deploy, manage, and troubleshoot ICS in real-world enterprise environments.
Key areas include Ivanti Connect Secure deployment and configuration, basic implementation, and component configuration. Students will have the opportunity to apply their knowledge in several hands-on labs.
Module 1: Solution Overview and Deployment Options
- Basics of SSL VPN
- ICS Deployment Scenarios (Single Arm, Dual Arm)
- Ivanti Security Appliances
- Introduction to ICS Features
- Licensing
Module 2: Initial Installation and Configuration
- Initial high-level configuration (topology)
- Hardware and cables
- Initial appliance setup
- Serial console menu options
- Initial configuration
- Backup configuration operations
Module 3: Remote User Access
- SSL, TLS, and digital certificates
- Remote access methods (Core, Application, Network)
- Access management frameworks
- Detailed user access flow
Module 4: User Roles
- User role functionalities
- User roles vs. resource policies
Module 5: Resource Policies and Profiles
- Resource policy components, types, and structures
- Resource syntax
- Web ACL policy
- Resource policy vs. resource profile
Module 6: Authentication and User Realms
- Authentication process
- Authentication server types
- Authentication servers
- User realm components
- Permissive merging
Module 7: Sign-in Policy
- Sign-in policy overview
- Configuring sign-in policies
Module 8: Certificate Security Administration
- Digital certificates and Public Key Infrastructure (PKI)
- Digital certificate usage
Module 9: VPN Tunneling and Installers
- VPN tunneling concept
- Access control
- Connection profile
- Split tunneling
- Bandwidth management
- VPN tunneling options
Module 10: Administration and Troubleshooting
- Administrator authentication
- Delegated admin role
- Logs and monitoring
- Archiving
- SNMP
- Troubleshooting
Module 11: Endpoint Security – Host Checker
- Endpoint security concept
- Realm- and role-level Host Checker
- Host Checker types
- Host Checker remediation actions
Module 12: Clustering
- Clustering types
- Active-active vs. active-passive clusters
- Clustering limitations
- License usage in a cluster
- Cluster configuration
Module 13: Introduction to Advanced Topics
- After completing this course, you will be able to:
- Understand SSL VPN Fundamentals:
Explain how secure remote access works and why ICS architecture is designed the way it is. - Deploy Ivanti Connect Secure:
Install and configure ICS appliances using best-practice deployment models. - Manage Secure User Access:
Design user roles, realms, and policies to provide secure and controlled access to corporate resources. - Implement Strong Authentication:
Integrate external authentication servers and certificate-based security. - Secure Endpoints:
Use Host Checker to assess endpoint compliance and enforce security policies. - Ensure High Availability:
Design and configure clustering for resilience and scalability. - Troubleshoot Effectively:
Use logs, monitoring, and structured troubleshooting techniques to resolve common issues.
- Understand SSL VPN Fundamentals:
This course is designed for network and security professionals responsible for deploying, managing, or supporting secure remote access solutions. It is ideal for engineers who want to build a solid foundation in Ivanti Connect Secure or enhance existing ICS deployments with best practices and advanced operational knowledge.
Participants should have a basic understanding of:
- Networking
- Network security
- Authentication and directory services (such as Active Directory and LDAP)
If you need this course, you can fill out the form or contact us.

