logo

Symantec Course

course overview

Click to View dates & book now

Overview

This 5-day Bootcamp is designed for network and IT security professionals to help them master the advanced features of ProxySG. It also shows how Content Analysis 2.x integrates with other Symantec solution to provide a complete anti-malware ecosystem.

Audience

This course is intended for professionals who wish to master the fundamentals of the ProxySG. It is designed for IT network or security professionals who have not taken any previous training courses about the ProxySG.

Prerequisites

This course assumes that students have a basic understanding of networking concepts, such as local-area networks (LANs), the Internet, security, and IP protocols. You must have a working knowledge of networking concepts, including TCP/IP, ICAP, SSL. You should be familiar with malware detections techniques such as Anti-Virus or reputation analysis.

Outline

ProxySG 6.6 Basic Administration:

Module 1: Introduction to the Symantec ProxySG Secure Web Gateway

Module 2: ProxySG Security Deployment Options

Module 3: ProxySG Management Console

Module 4: Traffic Interception Using Proxy Services

Module 5: Hypertext Transfer Protocol

Module 6: Introduction to the Visual Policy Manager

Module 7: Filtering Web Content

Module 8: Using Threat Intelligence to Defend the Network

Module 9: Ensuring Safe Downloads

Module 10: Notifying User of Internet Usage Policies

Module 11: Access Logging on the ProxySG

  • Appendix A: ProxySG Initial Configuration
  • Appendix B: IPv6 in ProxySG Deployments

ProxySG v6.6 Advanced Administration

Module 1: Using Authentication Realms

Module 2: Understanding Authentication Credentials

Module 3: Understanding Authentication Modes

Module 4: Understanding HTTPS

Module 5: Managing SSL Traffic on the ProxySG

Module 6: Optimizing SSL Interception Performance

Module 7: SGOS Architecture

Module 8: Caching Architecture

Module 9: System Diagnostics

Module 10: Introduction to Content Policy Language (CPL)

Module 11: Using Policy Tracing for Troubleshooting

Module 12: ProxySG Integration

Introduction

  • Course environment
  • Lab environment

Install and Implement Content Analysis.

  • Initial Content Analysis configuration
  • ICAP Overview and configuration
  • API Setup
  • Performance Profile configuration

Content Analysis Protection Layers.

  • Technology Overview
  • Preventing known bad files from reaching your environment
  • Protect against known threats
  • Detecting threats with artificial intelligence
  • Detecting emerging threats through a sandboxed execution

Interface Content Analysis with other Symantec Solutions.

  • Increase visibility with Symantec Reporter and Management Center
  • Increase forensic knowledge with Security Analytics
  • Extending mitigation and filtering with Symantec Endpoint Protection

Maintenance and troubleshooting for Content Analysis.

  • Monitoring Content Analysis
  • Troubleshooting Content Analysis

Talk to an expert

Thinking about Onsite?

If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. Its a cost effective option. One on one training can be delivered too, at reasonable rates.

Submit an enquiry from any page on this site, and let us know you are interested in the requirements box, or simply mention it when we contact you.

All $ prices are in USD unless it’s a NZ or AU date

SPVC = Self Paced Virtual Class

LVC = Live Virtual Class

Please Note: All courses are availaible as Live Virtual Classes

Trusted by over 1/2 million students in 15 countries

Our clients have included prestigious national organisations such as Oxford University Press, multi-national private corporations such as JP Morgan and HSBC, as well as public sector institutions such as the Department of Defence and the Department of Health.