Formation Symantec ProxySG 6.6 Basic Administration (BCCPA)

Ref. BCCPA

durée

2 jours

Tarif

1750€ ht

picture_as_pdfprint

Nos clients

Ils nous font confiance.

logos clients Nativo formation
Formations inter / intra entreprise
Revenir aux formations Bluecoat

Formation Symantec ProxySG 6.6 Basic Administration (BCCPA)

Objectifs

By the completion of this course, you will be able to:

  • Describe the major Secure Web Gateway functions of the ProxySG

  • License and configure a ProxySG

  • Deploy a ProxySG in either explicit or transparent mode

  • Use the Visual Policy Manager to write policies to manage web filtering, authentication, and SSL traffic management

  • Use ProxySG access logs to generate reports.

Public

Administrateur ou ingénieurs sécurité.

Prérequis

This course assumes that students have a basic understanding of networking concepts, such as local-area networks (LANs), the Internet, security, and IP protocols.

Programme

Module 1: Introduction to the Symantec ProxySG Secure Web Gateway

  • Describe the functions of a proxy server

  • Differentiate proxy servers from firewalls

  • Describe the key features and benefits of the ProxySG

  • List the various ProxySG models

  • Access online Symantec community resources

Module 2: ProxySG Security Deployment Options

  • Describe the three network deployment methods

  • Describe the three possible roles of the ProxySG

Module 3: ProxySG Management Console

  • Describe the relationship between the Management Console and the ProxySG CLI

  • Describe the primary function of the major areas of the Management Console

  • Use the Management Console to access on-box help and Symantec product documentation

Module 4: Traffic Interception Using Proxy Services

  • Understand the functions of proxy services, listeners, and proxy types

  • Describe the three most common proxy services

  • Explain how the intercept and bypass settings affect what happens to network traffic passing through the ProxySG

  • Explain the function of common global proxy service settings

Module 5: Hypertext Transfer Protocol

  • Understand how a connection is initiated over the transport layer

  • Identify the components of an HTTP URL

  • Explain the two types of HTTP messages: request and response

  • Identify common response codes

Module 6: Introduction to the Visual Policy Manager

  • Describe the relationship among the VPM, CPL, and the Management Console

  • Describe the default processing order for policy layers and rules

  • Describe triggers and actions that can be used in writing policy

  • Identify the types of objects that the VPM supports

  • Describe some of the best practices to be followed when using the VPM to create policy

Module 7: Filtering Web Content

  • Describe the main concepts of web filtering

  • Describe the primary category databases

  • Describe the category types available to policy

  • Describe how WebFilter and WebPulse work together

Module 8: Using Threat Intelligence to Defend the Network

  • Understand Intelligence Services as provided by the Global Intelligence Network

  • Understand Geolocation and Threat Risk Levels and how they can be used in policy

Module 9: Ensuring Safe Downloads

  • Describe how malware can be transmitted via HTTP

  • Explain the methods, advantages, and disadvantages of file type detection

  • Describe some of the considerations in deciding what content to block as possible malware sources

Module 10: Notifying User of Internet Usage Policies

  • Explain the function and various components of built-in and custom exception pages

  • Describe the function of Notify User objects

  • Identify the types of pages that can be sent to users by using Notify User objects

  • Describe splash pages and coaching pages using Notify User objects in the VPM

Module 11: Access Logging on the ProxySG

  • Describe, at a high level, how the ProxySG performs access logging

  • Describe the components of a ProxySG access log facility

  • Identify default log facilities and log formats

  • Describe common use cases for periodic and continuous uploading of access logs

Moyens et Méthodes Pédagogiques

  • La formation est constituée d’apports théoriques, d’exercices pratiques et de réflexions
  • Un poste par stagiaire
  • Formateur Expert
  • Remise d’une documentation pédagogique papier ou numérique pendant le stage

Validation des acquis

  • Auto évaluation des acquis par le stagiaire via un questionnaire en fin de formation
  • Attestation de fin de stage remise avec la facture