Cisco-opplæring

Insoft Services er en av få opplæringsleverandører i EMEAR som tilbyr hele spekteret av Cisco-sertifisering og spesialisert teknologiopplæring.

Les mer

Cisco Sertifisering

Opplev en blandet læringstilnærming som kombinerer det beste av instruktørledet opplæring og e-læring i eget tempo for å hjelpe deg med å forberede deg til sertifiseringseksamen.

Les mer

Cisco Learning Credits

Cisco Learning Credits (CLC) er forhåndsbetalte opplæringskuponger innløst direkte med Cisco som gjør planleggingen for suksessen din enklere når du kjøper Cisco-produkter og -tjenester.

Les mer

Etterutdanning

Cisco Continuing Education Program tilbyr alle aktive sertifiseringsinnehavere fleksible alternativer for å resertifisere ved å fullføre en rekke kvalifiserte opplæringselementer.

Les mer

Cisco Digital Learning

Sertifiserte ansatte er verdsatte eiendeler. Utforsk Ciscos offisielle digitale læringsbibliotek for å utdanne deg gjennom innspilte økter.

Les mer

Cisco Business Enablement

Cisco Business Enablement Partner Program fokuserer på å skjerpe forretningsferdighetene til Cisco Channel Partners og kunder.

Les mer

Cisco opplæringskatalog

Les mer

Fortinet Sertifisering

Fortinet Network Security Expert (NSE)-programmet er et opplærings- og sertifiseringsprogram på åtte nivåer for å lære ingeniører om nettverkssikkerheten for Fortinet FW-ferdigheter og -erfaring.

Tekniske kurs

Fortinet-opplæring

Insoft er anerkjent som Fortinet Autorisert Opplæringssenter på utvalgte steder i EMEA.

Les mer

Fortinet opplæringskatalog

Utforsk et bredt utvalg av Fortinet Schedule på tvers av forskjellige land så vel som online kurs.

Les mer

ATC-status

Sjekk atc-statusen vår på tvers av utvalgte land i Europa.

Les mer

Pakker for Fortinet-tjenester

Insoft Services har utviklet en spesifikk løsning for å effektivisere og forenkle prosessen med å installere eller migrere til Fortinet-produkter.

Les mer

Microsoft-opplæring

Insoft Services gir Microsoft opplæring i EMEAR. Vi tilbyr Microsofts tekniske opplærings- og sertifiseringskurs som ledes av instruktører i verdensklasse.

Tekniske kurs

Extreme-opplæring

Lær eksepsjonell kunnskap og ferdigheter i ekstreme nettverk.

Les mer

Teknisk sertifisering

Vi tilbyr omfattende læreplan over tekniske kompetanseferdigheter om sertifiseringsprestasjonen.

Les mer

Extreme opplæringskatalog

Tekniske kurs

ATP-akkreditering

Som autorisert opplæringspartner (ATP) sørger Insoft Services for at du får de høyeste utdanningsstandardene som er tilgjengelige.

Les mer

Løsninger og tjenester

Vi tilbyr innovativ og avansert støtte for design, implementering og optimalisering av IT-løsninger. Vår kundebase inkluderer noen av de største Telcos globalt.

Les mer

Globalt anerkjent team av sertifiserte eksperter hjelper deg med å gjøre en jevnere overgang med våre forhåndsdefinerte konsulent-, installasjons- og migrasjonspakker for et bredt spekter av Fortinet-produkter.

Om oss

Insoft Tilbyr autoriserte opplærings- og konsulenttjenester for utvalgte IP-leverandører. Finn ut hvordan vi revolusjonerer bransjen.

Les mer
  • +47 23 96 21 03
  • Symantec Web Protection – Cloud SWG Planning, Implementation, and Administration R1

    Duration
    2 Dager
    Delivery
    (Online Og På stedet)
    Price
    Pris på forespørsel

    The Symantec Web Protection – Cloud SWG Planning, Implementation, and Administration course is intended for IT professionals who will be planning, installing, configuring or administering the Symantec Cloud Secure Web Gateway.

     

    Associated certification:

    • Exam 250-584 Symantec Web Protection R1 Technical Specialist
    • Describe the architecture, components and process flow of Cloud SWG
    • Identify installation, configuration and administration of the core features and products of Cloud SWG.
    • Identify the key elements for planning a Cloud SWG deployment

    Module 1: Cloud Delivered Security

    • What is Cloud Delivered Security
    • What are the Key Considerations for Having Cloud Delivered Security
    • What are the Key Features Needed for Cloud Delivered Security

     

    Module 2: Cloud SWG Connection

    • Architecture and Functionality
    • Cloud SWG Infrastructure
    • Cloud SWG Connection Architecture
    • Cloud SWG Features
    • Cloud SWG Additional Products

     

    Module 3: Getting Started with Cloud SWG

    • Initial Registration
    • User Administration
    • Licensing
    • Data Privacy Settings

     

    Module 4: Enable Remote Users to Securely Access the Internet

    • Remote Users and Solutions
    • WSS Agent Access Method
    • Web and Cloud Access Protection Access Method
    • Cloud Connect Defense (CCD) Access

     

    Module 5: Provide Safe and Proper

    • Web Usage Based on User Identity
    • Authentication and Cloud SWG
    • Auth Connector
    • SAML
    • Remote Authentication Methods with Auth Connector
    • Authentication with WSS Agent and Web and Cloud Access Protection Access Methods

     

    Module 6: Create a more Effective Work Environment for Employee Web Usage

    • Configure Content Filtering Rules to Determine Internet Usage
    • Setting Global Content Filtering Policy Rules
    • Creating Custom Response Pages
    • Universal Policy Enforcement

     

    Module 7: Providing Web Protection Against Malware

    • Cloud SWG Threat Protection
    • Malware Analysis and Cloud SWG
    • Threat Protection Policies
    • Creating Threat Protection Policy Rules

     

    Module 8: Enable Encrypted Traffic Inspection

    • Encrypted Traffic
    • SSL Configuration
    • Configuring SSL Exceptions
    • Topic Title

     

    Module 9: Enable Corporate Users to Securely Access the Internet

    • Firewall/VPN (IPsec) Access Method
    • FQDN-IKEv2 Firewall Access Method
    • TransProxy (Explicit Proxy Over IPsec) Access Method
    • Proxy Forwarding Access Method

     

    Module 10: Identify Web Usage and Security Statistics with Reports

    • Reports Overview
    • Pre-defined Reports
    • Simple Reporting
    • Custom Reporting
    • Forensic Reporting
    • Managing and Using Reports

     

    Module 11: Enable Mobile Users to Securely Access the Internet

    • About Mobile Device Security
    • Authentication for Mobile Users
    • SEP-Mobile Solution
    • Android Mobile Access Enrollment Process

     

    Module 12: Planning Cloud SWG Deployments

    • Assessment of Needs
    • Design – Access Methods and Authentication
    • Design – Policy, Reporting and Threat Protection
    • Design Evaluation
    • Working knowledge of cloud based solutions
    • Knowledge of internet traffic protocols
    • Basic understanding of principles of authentication

    The Symantec Web Protection – Cloud SWG Planning, Implementation, and Administration course is intended for IT professionals who will be planning, installing, configuring or administering the Symantec Cloud Secure Web Gateway.

     

    Associated certification:

    • Exam 250-584 Symantec Web Protection R1 Technical Specialist
    • Describe the architecture, components and process flow of Cloud SWG
    • Identify installation, configuration and administration of the core features and products of Cloud SWG.
    • Identify the key elements for planning a Cloud SWG deployment

    Module 1: Cloud Delivered Security

    • What is Cloud Delivered Security
    • What are the Key Considerations for Having Cloud Delivered Security
    • What are the Key Features Needed for Cloud Delivered Security

     

    Module 2: Cloud SWG Connection

    • Architecture and Functionality
    • Cloud SWG Infrastructure
    • Cloud SWG Connection Architecture
    • Cloud SWG Features
    • Cloud SWG Additional Products

     

    Module 3: Getting Started with Cloud SWG

    • Initial Registration
    • User Administration
    • Licensing
    • Data Privacy Settings

     

    Module 4: Enable Remote Users to Securely Access the Internet

    • Remote Users and Solutions
    • WSS Agent Access Method
    • Web and Cloud Access Protection Access Method
    • Cloud Connect Defense (CCD) Access

     

    Module 5: Provide Safe and Proper

    • Web Usage Based on User Identity
    • Authentication and Cloud SWG
    • Auth Connector
    • SAML
    • Remote Authentication Methods with Auth Connector
    • Authentication with WSS Agent and Web and Cloud Access Protection Access Methods

     

    Module 6: Create a more Effective Work Environment for Employee Web Usage

    • Configure Content Filtering Rules to Determine Internet Usage
    • Setting Global Content Filtering Policy Rules
    • Creating Custom Response Pages
    • Universal Policy Enforcement

     

    Module 7: Providing Web Protection Against Malware

    • Cloud SWG Threat Protection
    • Malware Analysis and Cloud SWG
    • Threat Protection Policies
    • Creating Threat Protection Policy Rules

     

    Module 8: Enable Encrypted Traffic Inspection

    • Encrypted Traffic
    • SSL Configuration
    • Configuring SSL Exceptions
    • Topic Title

     

    Module 9: Enable Corporate Users to Securely Access the Internet

    • Firewall/VPN (IPsec) Access Method
    • FQDN-IKEv2 Firewall Access Method
    • TransProxy (Explicit Proxy Over IPsec) Access Method
    • Proxy Forwarding Access Method

     

    Module 10: Identify Web Usage and Security Statistics with Reports

    • Reports Overview
    • Pre-defined Reports
    • Simple Reporting
    • Custom Reporting
    • Forensic Reporting
    • Managing and Using Reports

     

    Module 11: Enable Mobile Users to Securely Access the Internet

    • About Mobile Device Security
    • Authentication for Mobile Users
    • SEP-Mobile Solution
    • Android Mobile Access Enrollment Process

     

    Module 12: Planning Cloud SWG Deployments

    • Assessment of Needs
    • Design – Access Methods and Authentication
    • Design – Policy, Reporting and Threat Protection
    • Design Evaluation
    • Working knowledge of cloud based solutions
    • Knowledge of internet traffic protocols
    • Basic understanding of principles of authentication
      Datoer
      Date on Request

    Follow Up Courses

    Filtrer
    • 3 Dager
      Date on Request
      Price on Request
      Book Now
    • 3 Dager
      Date on Request
      Price on Request
      Book Now
    • 5 Dager
      Date on Request
      Price on Request
      Book Now
    • 5 Dager
      Date on Request
      Price on Request
      Book Now
    • 3 Dager
      Date on Request
      Price on Request
      Book Now
    • 4 Dager
      Date on Request
      Price on Request
      Book Now
    • 5 Dager
      Date on Request
      Price on Request
      Book Now
    • 5 Dager
      Date on Request
      Price on Request
      Book Now
    • 4 Dager
      Date on Request
      Price on Request
      Book Now
    • 2 Dager
      Date on Request
      Price on Request
      Book Now

    Know someone who´d be interested in this course?
    Let them know...

    Use the hashtag #InsoftLearning to talk about this course and find students like you on social media.