Training Symantec

Training goals dlearning

code: SYM-PSGBA

The ProxySG 6.6 Basic Administration course is an introduction to deployment options and management of the individual key features offered using the ProxySG 6.6 solution. This an introductory course and is designed for students who are new to the ProxySG solution.

Course Objectives

By the completion of this course, you will be able to:

  • Describe the major Secure Web Gateway functions of the ProxySG
  • License and configure a ProxySG
  • Deploy a ProxySG in either explicit or transparent mode
  • Use the Visual Policy Manager to write policies to manage web filtering, authentication, and SSL traffic management
  • Use ProxySG access logs to generate reports.

Who Should Attend:

The ProxySG 6.6 Basic Administration course is intended for students who wish to master the fundamentals of the ProxySG. It is designed for students who have not taken any previous training courses about the ProxySG.

Conspect Show list

This course includes practical hands-on exercises that enable you to test your new skills and begin to use those skills in a working environment.

  1. Introduction to the Symantec ProxySG Secure Web Gateway
    • Describe the functions of a proxy server
    • Differentiate proxy servers from firewalls
    • Describe the key features and benefits of the ProxySG
    • List the various ProxySG models
    • Access online Symantec community resources
  2. ProxySG Security Deployment Options
    • Describe the three network deployment methods
    • Describe the three possible roles of the ProxySG
  3. ProxySG Management Console
    • Describe the relationship between the Management Console and the ProxySG CLI
    • Describe the primary function of the major areas of the Management Console
    • Use the Management Console to access on-box help and Symantec product documentation
  4. Traffic Interception Using Proxy Services
    • Understand the functions of proxy services, listeners, and proxy types
    • Describe the three most common proxy services
    • Explain how the intercept and bypass settings affect what happens to network traffic passing through the ProxySG
    • Explain the function of common global proxy service settings
  5. Hypertext Transfer Protocol
    • Understand how a connection is initiated over the transport layer
    • Identify the components of an HTTP URL
    • Explain the two types of HTTP messages: request and response
    • Identify common response codes
  6. Introduction to the Visual Policy Manager
    • Describe the relationship among the VPM, CPL, and the Management Console
    • Describe the default processing order for policy layers and rules
    • Describe triggers and actions that can be used in writing policy
    • Identify the types of objects that the VPM supports
    • Describe some of the best practices to be followed when using the VPM to create policy
  7. Filtering Web Content
    • Describe the main concepts of web filtering
    • Describe the primary category databases
    • Describe the category types available to policy
    • Describe how WebFilter and WebPulse work together
  8. Using Threat Intelligence to Defend the Network
    • Understand Intelligence Services as provided by the Global Intelligence Network
    • Understand Geolocation and Threat Risk Levels and how they can be used in policy
  9. Ensuring Safe Downloads
    • Describe how malware can be transmitted via HTTP
    • Explain the methods, advantages, and disadvantages of file type detection
    • Describe some of the considerations in deciding what content to block as possible malware sources
  10. Notifying User of Internet Usage Policies
    • Explain the function and various components of built-in and custom exception pages
    • Describe the function of Notify User objects
    • Identify the types of pages that can be sent to users by using Notify User objects
    • Describe splash pages and coaching pages using Notify User objects in the VPM
  11. Access Logging on the ProxySG
    • Describe, at a high level, how the ProxySG performs access logging
    • Describe the components of a ProxySG access log facility
    • Identify default log facilities and log formats
    • Describe common use cases for periodic and continuous uploading of access logs
Download conspect training as PDF

Additional information

Requirements

This course assumes that students have a basic understanding of networking concepts, such as local-area networks (LANs), the Internet, security, and IP protocols.

Difficulty level
Duration 2 days
Certificate

The participants will obtain certificates signed by Symantec. (course completion)

Trainer

Authorized Symantec Trainer.

Other training Symantec | ProxySG

Training thematically related

Networking and Wireless

IT Security

Network Security

Contact form

Please fill form below to obtain more info about this training.







* Fields marked with (*) are required !!!

Information on data processing by Compendium - Centrum Edukacyjne Spółka z o.o.

2000 USD

close

Discount codes

Discount code may refer to (training, producer, deadline). If you have a discount code, enter it in the appropriate field.
(green means entering the correct code | red means the code is incorrect)

FORM OF TRAINING ?

close

Traditional training

Sessions organised at Compendium CE are usually held in our locations in Kraków and Warsaw, but also in venues designated by the client. The group participating in training meets at a specific place and specific time with a coach and actively participates in laboratory sessions.

Dlearning training

You may participate from at any place in the world. It is sufficient to have a computer (or, actually a tablet, or smartphone) connected to the Internet. Compendium CE provides each Distance Learning training participant with adequate software enabling connection to the Data Center. For more information, please visit dlearning.eu site

TRAINING MATERIALS ?

close

Electronic materials

Electronic Materials: These are electronic training materials that are available to you based on your specific application: Skillpipe, eVantage, etc., or as PDF documents.

Ctab materials

Ctab materials: the price includes ctab tablet and electronic training materials or traditional training materials and supplies provided electronically according to manufacturer's specifications (in PDF or EPUB form). The materials provided are adapted for display on ctab tablets. For more information, check out the ctab website.

 

SELECT TERM TRAINING

    • General information
    • Guaranteed dates
    • Last minute (-10%)
    • Language of the training
    • English
Book a training appointment