The Symantec Web Protection—Edge SWG Planning, Implementation, and Administration course provides a detailed introduction to the features that comprise Edge SWG, which is the on-premise component of Symantec Web Protection.
These applications include ProxySG, Management Center, Reporter, Content Analysis, and High Risk Isolation.
Associated certification:
By the completion of this course, you will be able to:
Module 1: Introduction to Symantec Edge SWG
Module 2: Intercepting web traffic and applying policy
Module 3: Applying security and web usage policy to encrypted traffic
Module 4: Providing security and web usage policies based on role or group
Module 5: Enforcing corporate guidelines for acceptable Internet browsing behavior
Module 6: Protecting the endpoint from malicious activity
Module 7: Centrally managing devices with Management Center
Module 8: Reporting for Edge SWG features
Module 9: Enhancing security with virus scanning
Module 10: Using malware analysis to analyze potentially malicious files
Module 11: Providing security for risky and unknown websites with High Risk Isolation
Module 12: Monitoring Edge SWG features
Module 13: Understanding SGOS architecture and caching on the Edge SWG
Module 14: Using built-in diagnostic tools on the Edge SWG
Module 15: Expanding security with cloud integrations
Module 16: Course review
Appendix A: Using Content Policy Language (CPL)
Appendix B: Introduction to Hypertext Transport Protocol (HTTP)
The Symantec Web Protection—Edge SWG Planning, Implementation, and Administration course provides a detailed introduction to the features that comprise Edge SWG, which is the on-premise component of Symantec Web Protection.
These applications include ProxySG, Management Center, Reporter, Content Analysis, and High Risk Isolation.
Associated certification:
By the completion of this course, you will be able to:
Module 1: Introduction to Symantec Edge SWG
Module 2: Intercepting web traffic and applying policy
Module 3: Applying security and web usage policy to encrypted traffic
Module 4: Providing security and web usage policies based on role or group
Module 5: Enforcing corporate guidelines for acceptable Internet browsing behavior
Module 6: Protecting the endpoint from malicious activity
Module 7: Centrally managing devices with Management Center
Module 8: Reporting for Edge SWG features
Module 9: Enhancing security with virus scanning
Module 10: Using malware analysis to analyze potentially malicious files
Module 11: Providing security for risky and unknown websites with High Risk Isolation
Module 12: Monitoring Edge SWG features
Module 13: Understanding SGOS architecture and caching on the Edge SWG
Module 14: Using built-in diagnostic tools on the Edge SWG
Module 15: Expanding security with cloud integrations
Module 16: Course review
Appendix A: Using Content Policy Language (CPL)
Appendix B: Introduction to Hypertext Transport Protocol (HTTP)