Menu Icon

Available Training Rooms

  • PRIVATE BATCH
  • PUBLIC PROGRAM
  • ON DEMAND
  • BLENDED

Course Details

  • Course Overview
  • Skills Gained
  • Who should attend?
  • Pre-Requisite
  • Syllabus

The ProxySG 6.6 Basic Administration course is an introduction to deployment options and management of the individual key features offered using the ProxySG 6.6 solution. This an introductory course and is designed for students who are new to the ProxySG solution.

By the completion of this course, you will be able to:

  • Describe the major Secure Web Gateway functions of the ProxySG
  • License and configure a ProxySG
  • Deploy a ProxySG in either explicit or transparent mode
  • Use the Visual Policy Manager to write policies to manage web filtering, authentication, and SSL traffic management
  • Use ProxySG access logs to generate reports.

The ProxySG 6.6 Basic Administration course is intended for students who wish to master the fundamentals of the ProxySG. It is designed for students who have not taken any previous training courses about the ProxySG.

This course assumes that students have a basic understanding of networking concepts, such as local-area networks (LANs), the Internet, security, and IP protocols.

 

COURSE OUTLINE

Module 1:

  • Introduction to the Symantec ProxySG Secure Web Gateway
  • Describe the functions of a proxy server
  • Differentiate proxy servers from firewalls
  • Describe the key features and benefits of the ProxySG
  • List the various ProxySG models
  • Access online Symantec community resources

Module 2:

  • ProxySG Security Deployment Options
  • Describe the three network deployment methods
  • Describe the three possible roles of the ProxySG

Module 3:

  • ProxySG Management Console
  • Describe the relationship between the Management Console and the ProxySG CLI
  • Describe the primary function of the major areas of the Management Console

Module 4:

  • Traffic Interception Using Proxy Services 
  • Understand the functions of proxy services, listeners, and proxy types
  • Describe the three most common proxy services
  • Explain how the intercept and bypass settings affect what happens to network traffic passing through the ProxySG
  • Explain the function of common global proxy service settings

Module 5:

  • Hypertext Transfer Protocol 
  • Understand how a connection is initiated over the transport layer
  • Identify the components of an HTTP URL
  • Explain the two types of HTTP messages: request and response
  • Identify common response codes

Module 6:

  • Introduction to the Visual Policy Manager 
  • Describe the relationship among the VPM, CPL, and the Management Console
  • Describe the default processing order for policy layers and rules
  • Describe triggers and actions that can be used in writing policy
  • Identify the types of objects that the VPM supports
  • Describe some of the best practices to be followed when using the VPM to create policy

Module 7: 

  • Filtering Web Content
  • Describe the main concepts of web filtering
  • Describe the primary category databases
  • Describe the category types available to policy  Describe how WebFilter and WebPulse work together

Module 8: 

  • Using Threat Intelligence to Defend the Network
  • Understand Intelligence Services as provided by the Global Intelligence Network
  • Understand Geolocation and Threat Risk Levels and how they can be used in policy

Module 9: 

  • Ensuring Safe Downloads
  • Describe how malware can be transmitted via HTTP
  • Explain the methods, advantages, and disadvantages of file type detection
  • Describe some of the considerations in deciding what content to block as possible malware sources

Module 10:

  • Notifying User of Internet Usage Policies
  • Explain the function and various components of built-in and custom exception pages
  • Describe the function of Notify User objects
  • Identify the types of pages that can be sent to users by using Notify User objects
  • Describe splash pages and coaching pages using Notify User objects in the VPM

Module 11: 

  • Access Logging on the ProxySG
  • Describe, at a high level, how the ProxySG performs access logging
  • Describe the components of a ProxySG access log facility
  • Identify default log facilities and log formats
  • Describe common use cases for periodic and continuous uploading of access logs

Appendix A:  ProxySG Initial Configuration

Appendix B: IPv6 in ProxySG Deployments

 

 

Audience

  • DEVELOPER
  • SYSTEM ANALYST
  • QA TESTER
  • BUSINESS ANALYST

Public Program Schedule

Course Name Duration Brochure Location Schedule Enroll
There is no upcoming Public Batch Schedule, you can ask for Private Batch or for On-Demand Learning

Download the syllabus

Download

The highest standard, The happiest learners

Our Enterprise Clients

FAQ

  • What is the Symantec Certification Program?
  • What is the benefit of becoming Symantec Certified?
  • How does a live-online class differ from a standard classroom delivery ?
  • What time do classes begin ?
  • Who will be my trainer?
  • How do I pay?
  • What are your cancellation & refund policy?

The Symantec Certification Program provides rigorous, objective assessments of Symantec technical expertise through securely proctored, computer-based, multiple-choice exams (based on real-world job tasks). The program validates the skills and technical competencies necessary for Symantec professionals to efficiently implement, administer, and maintain their data protection, high availability, and security environments utilizing Symantec solutions. Successful completion of the programs’ current requirements will result in the achievement and reward of either a Symantec Certified Specialist (SCS) or Symantec Certified Professional (SCP) certificate.

Symantec certified candidates and their companies have the ability to gain industry recognition, competitive differentiation, greater productivity & results, increased user community satisfaction, and a tangible measure of their education investment. Did you know that 76% of candidates and recruiters verified that Symantec Certification was discussed as part of the hiring process? Certification can open the door to increased visibility, better opportunities and new jobs in your industry. In today’s highly competitive environment, certification differentiates you as a professional who is serious about applied learning, making you an asset to a prospective employer. Read about the benefits of Certification for an Individual and Employer.

Our live online classes are conducted in the same manner as our classroom classes, using the same manuals and lab equipment. Just as in our classroom classes, each online student is assigned a set of remote lab equipment including an ESXi host and various pre-configured Virtual machines, as the specific class they are attending requires. The students connect to the lab environment using Microsoft’s Remote Display Protocol (RDP) in order to perform the lab exercises. The vast majority of our online students find the class experience equivalent to or better than a classroom delivered class.

All our trainers are Symantec Certified Instructors. Our representative will share trainer profile once you start talking to our team.

We accept all modes of payment. If you are being nominated by your organization, your organization need to release PO before the course start date. If you are an individual you can pay through credit / debit cards, online transfer (RTGS/NEFT) to our account 7 days prior to the course start date.

  • In a highly unlikely event of cancellation of batch from our end, we shall refund 100% that is paid by you. If client choose to cancel for any reasons, below is the terms.
  • If you cancel or reschedule your registration 5 or more calendar days before the scheduled start date of the class – No cancellation charges
  • If you cancel or reschedule your registration less than 5 calendar days before the scheduled start date of the class – cancellation charges 100% of the course fee
  • If you do not show up for the event, or cancel on the day of the event - cancellation charges 100% of the course fee

Other Related Courses

Related courses will be updated soon...