Training Symantec

Training goals dlearning


The ProxySG v6.6 Advanced Administration course is intended for IT professionals who wish to learn to master the advanced features of ProxySG.

Course Objectives

By the completion of this course, you will be able to:

  • Solve common authentication and SSL issues
  • Understand the underlying architecture of SGOS
  • Monitor and analyze ProxySG performance
  • Use policy tracing as a troubleshooting tool

Who Should Attend:

This course is for IT network or security professionals who have practical experience with the ProxySG in the field and wish to master the advanced network security of ProxySG.

Conspect Show list

This course includes practical hands-on exercises that enable you to test your new skills and begin to use those skills in a working environment.

  1. Using Authentication Realms
    • Describe the benefits of enabling authentication on the ProxySG
    • Describe, at a high level, the ProxySG authentication architecture
    • Understand the use of IWA realms, with both IWA Direct and IWA BCAAA connection methods
  2. Understanding Authentication Credentials
    • Describe how NTLM and Kerberos authentication work in both IWA direct and IWA BCAAA deployments
    • Configure the ProxySG to use Kerberos authentication
  3. Understanding Authentication Modes
    • Describe authentication surrogates and authentication modes
    • Describe ProxySG authentication in both explicit and transparent deployment mode
  4. Understanding HTTPS
    • Describe key components of SSL encryption
    • Describe how the SSL handshake works
    • Describe some of the legal and security considerations related to use of the SSL proxy
  5. Managing SSL Traffic on the ProxySG
    • Describe how the SSL proxy service handles SSL traffic
    • Describe the standard keyrings that are installed by default on the ProxySG
    • Identify the types of security certificates that the ProxySG uses
  6. Optimizing SSL Interception Performance
    • Configure the ProxySG to process SSL traffic according to best practices for performance
  7. SGOS Architecture
    • Identify key components of SGOS
    • Explain the interaction among client workers and software workers in processing client requests
    • Explain the significance of policy checkpoints
    • Describe key characteristics of the SGOS storage subsystem
    • Explain the caching behavior of the ProxySG
  8. Caching Architecture
    • Describe the benefits of object caching on the ProxySG
    • Explain the caching-related steps in a ProxySG transaction
    • Identify and describe the HTTP request and response headers related to caching
    • Describe, in general terms, how the ProxySG validates cached objects to ensure freshness
    • Explain how the ProxySG uses cost-based deletion, popularity contests, and pipelining to improve object caching
  9. System Diagnostics
    • Describe the use of the health monitor and health checks
    • Explain the use of the event and access logs
    • Describe the information available in advanced URLs and sysinfo files
    • Describe the function of policy tracing and packet captures
  10. Introduction to Content Policy Language (CPL)
    • Describe the fundamental concepts and purposes of ProxySG policy transactions
    • Understand the relationship of layers, rules, conditions, properties, and triggers
    • Describe the two types of actions in CPL
    • Describe how to write, edit, and upload CPL code
  11. Using Policy Tracing for Troubleshooting
    • Identify the two main types of ProxySG policy traces
    • Describe the various sections of a policy trace result
    • Configure a global and policy-driven trace
    • Access and interpret policy trace results
  12. ProxySG Integration
    • Identify other Symantec products that can be used as part of a complete security solution
Download conspect training as PDF

Additional information


You must have working knowledge of ProxySG Administration and should possess advanced knowledge of networking, security, and authentication.

Difficulty level
Duration 2 days

The participants will obtain certificates signed by Symantec. (course completion)


Authorized Symantec Trainer.

Other training Symantec | ProxySG

Training thematically related

Networking and Wireless

IT Security

Network Security

Contact form

Please fill form below to obtain more info about this training.

* Fields marked with (*) are required !!!

Information on data processing by Compendium - Centrum Edukacyjne Spółka z o.o.

2000 USD


Discount codes

Discount code may refer to (training, producer, deadline). If you have a discount code, enter it in the appropriate field.
(green means entering the correct code | red means the code is incorrect)



Traditional training

Sessions organised at Compendium CE are usually held in our locations in Kraków and Warsaw, but also in venues designated by the client. The group participating in training meets at a specific place and specific time with a coach and actively participates in laboratory sessions.

Dlearning training

You may participate from at any place in the world. It is sufficient to have a computer (or, actually a tablet, or smartphone) connected to the Internet. Compendium CE provides each Distance Learning training participant with adequate software enabling connection to the Data Center. For more information, please visit site



Electronic materials

Electronic Materials: These are electronic training materials that are available to you based on your specific application: Skillpipe, eVantage, etc., or as PDF documents.

Ctab materials

Ctab materials: the price includes ctab tablet and electronic training materials or traditional training materials and supplies provided electronically according to manufacturer's specifications (in PDF or EPUB form). The materials provided are adapted for display on ctab tablets. For more information, check out the ctab website.



    • General information
    • Guaranteed dates
    • Last minute (-10%)
    • Language of the training
    • English
    • General information
    • Guaranteed dates
    • Last minute (-10%)
    • Language of the training
    • English
Book a training appointment

Upcoming Symantec training

Training schedule Symantec