Cisco-opplæring

Insoft Services er en av få opplæringsleverandører i EMEAR som tilbyr hele spekteret av Cisco-sertifisering og spesialisert teknologiopplæring.

Les mer

Cisco Sertifisering

Opplev en blandet læringstilnærming som kombinerer det beste av instruktørledet opplæring og e-læring i eget tempo for å hjelpe deg med å forberede deg til sertifiseringseksamen.

Les mer

Cisco Learning Credits

Cisco Learning Credits (CLC) er forhåndsbetalte opplæringskuponger innløst direkte med Cisco som gjør planleggingen for suksessen din enklere når du kjøper Cisco-produkter og -tjenester.

Les mer

Etterutdanning

Cisco Continuing Education Program tilbyr alle aktive sertifiseringsinnehavere fleksible alternativer for å resertifisere ved å fullføre en rekke kvalifiserte opplæringselementer.

Les mer

Cisco Digital Learning

Sertifiserte ansatte er verdsatte eiendeler. Utforsk Ciscos offisielle digitale læringsbibliotek for å utdanne deg gjennom innspilte økter.

Les mer

Cisco Business Enablement

Cisco Business Enablement Partner Program fokuserer på å skjerpe forretningsferdighetene til Cisco Channel Partners og kunder.

Les mer

Cisco opplæringskatalog

Les mer

Fortinet Sertifisering

Fortinet Network Security Expert (NSE)-programmet er et opplærings- og sertifiseringsprogram på åtte nivåer for å lære ingeniører om nettverkssikkerheten for Fortinet FW-ferdigheter og -erfaring.

Tekniske kurs

Fortinet-opplæring

Insoft er anerkjent som Fortinet Autorisert Opplæringssenter på utvalgte steder i EMEA.

Les mer

Fortinet opplæringskatalog

Utforsk et bredt utvalg av Fortinet Schedule på tvers av forskjellige land så vel som online kurs.

Les mer

ATC-status

Sjekk atc-statusen vår på tvers av utvalgte land i Europa.

Les mer

Pakker for Fortinet-tjenester

Insoft Services har utviklet en spesifikk løsning for å effektivisere og forenkle prosessen med å installere eller migrere til Fortinet-produkter.

Les mer

Microsoft-opplæring

Insoft Services gir Microsoft opplæring i EMEAR. Vi tilbyr Microsofts tekniske opplærings- og sertifiseringskurs som ledes av instruktører i verdensklasse.

Tekniske kurs

Extreme-opplæring

Lær eksepsjonell kunnskap og ferdigheter i ekstreme nettverk.

Les mer

Teknisk sertifisering

Vi tilbyr omfattende læreplan over tekniske kompetanseferdigheter om sertifiseringsprestasjonen.

Les mer

Extreme opplæringskatalog

Tekniske kurs

ATP-akkreditering

Som autorisert opplæringspartner (ATP) sørger Insoft Services for at du får de høyeste utdanningsstandardene som er tilgjengelige.

Les mer

Løsninger og tjenester

Vi tilbyr innovativ og avansert støtte for design, implementering og optimalisering av IT-løsninger. Vår kundebase inkluderer noen av de største Telcos globalt.

Les mer

Globalt anerkjent team av sertifiserte eksperter hjelper deg med å gjøre en jevnere overgang med våre forhåndsdefinerte konsulent-, installasjons- og migrasjonspakker for et bredt spekter av Fortinet-produkter.

Om oss

Insoft Tilbyr autoriserte opplærings- og konsulenttjenester for utvalgte IP-leverandører. Finn ut hvordan vi revolusjonerer bransjen.

Les mer
  • +47 23 96 21 03
  • Symantec Web Security Service Planning, Implementation, and Administration R1.2

    Duration
    2 Dager
    Delivery
    (Online Og På stedet)
    Price
    Pris på forespørsel

    The Symantec Web Security Service Planning, Implementation, and Administration course is intended for IT professionals who will be planning, installing, configuring or administering the Symantec Web Security Service (WSS).

     

    Associated certification:

    • Exam 250-554: Symantec Web Security Service – R1.2 Technical Specialist
    • Describe the architecture, components and process flow of WSS
    • Identify installation, configuration and administration of the core features and products of WSS.
    • Identify the key elements for planning a WSS deployment

    Module 1: Cloud Delivered Security

    • What is Cloud Delivered Security
    • What are the Key Considerations for Having Cloud Delivered Security
    • What are the Key Features Needed for Cloud Delivered Security

     

    Module 2: Web Security Service Connection Architecture and Functionality

    • WSS Infrastructure
    • WSS Connection Architecture
    • WSS Features
    • WSS Additional Products

     

    Module 3: Getting Started with WSS

    • Initial Registration
    • User Administration
    • Licensing
    • Data Privacy Settings

     

    Module 4: Enable Remote Users to Securely Access the Internet

    • Remote Users and Solutions
    • WSS Agent Access Method
    • WSS-SEP Access Method
    • Cloud Connect Defense (CCD) Access

     

    Module 5: Provide Safe and Proper Web Usage Based on User Identity

    • Authentication and WSS
    • Auth Connector
    • SAML
    • Remote Authentication Methods with Auth Connector
    • Authentication with WSS Agent and WSS-SEP Access Methods

     

    Module 6: Create a more Effective Work Environment for Employee Web Usage

    • Configure Content Filtering Rules to Determine Internet Usage
    • Setting Global Content Filtering Policy Rules
    • Creating Custom Response Pages
    • Universal Policy Enforcement

     

    Module 7: Providing Web Protection Against Malware

    • WSS Threat Protection
    • Malware Analysis and WSS
    • Threat Protection Policies
    • Creating Threat Protection Policy Rules

     

    Module 8: Enable Encrypted Traffic Inspection

    • Encrypted Traffic
    • SSL Configuration
    • Configuring SSL Exceptions

     

    Module 9: Enable Corporate Users to Securely Access the Internet

    • Firewall/VPN (IPsec) Access Method
    • FQDN-IKEv2 Firewall Access Method
    • Cert-Based Connection Access Method
    • TransProxy (Explicit Proxy Over IPsec) Access Method
    • Proxy Forwarding Access Method

     

    Module 10: Identify Web Usage and Security Statistics with Reports

    • Reports Overview
    • Pre-defined Reports
    • Simple Reporting
    • Custom Reporting
    • Forensic Reporting
    • Managing and Using Reports

     

    Module 11: Enable Mobile Users to Securely Access the Internet

    • About Mobile Device Security
    • Authentication for Mobile Users
    • SEP-Moblie Solution
    • Android Mobile Access Enrollment Process

     

    Module 12: Course review

    • Assessment of Needs
    • Design – Access Methods and Authentication
    • Design – Policy, Reporting and Threat Protection
    • Design Evaluation
    • Working knowledge of cloud based solutions
    • Knowledge of internet traffic protocols
    • Basic understanding of principles of authentication.

    The Symantec Web Security Service Planning, Implementation, and Administration course is intended for IT professionals who will be planning, installing, configuring or administering the Symantec Web Security Service (WSS).

     

    Associated certification:

    • Exam 250-554: Symantec Web Security Service – R1.2 Technical Specialist
    • Describe the architecture, components and process flow of WSS
    • Identify installation, configuration and administration of the core features and products of WSS.
    • Identify the key elements for planning a WSS deployment

    Module 1: Cloud Delivered Security

    • What is Cloud Delivered Security
    • What are the Key Considerations for Having Cloud Delivered Security
    • What are the Key Features Needed for Cloud Delivered Security

     

    Module 2: Web Security Service Connection Architecture and Functionality

    • WSS Infrastructure
    • WSS Connection Architecture
    • WSS Features
    • WSS Additional Products

     

    Module 3: Getting Started with WSS

    • Initial Registration
    • User Administration
    • Licensing
    • Data Privacy Settings

     

    Module 4: Enable Remote Users to Securely Access the Internet

    • Remote Users and Solutions
    • WSS Agent Access Method
    • WSS-SEP Access Method
    • Cloud Connect Defense (CCD) Access

     

    Module 5: Provide Safe and Proper Web Usage Based on User Identity

    • Authentication and WSS
    • Auth Connector
    • SAML
    • Remote Authentication Methods with Auth Connector
    • Authentication with WSS Agent and WSS-SEP Access Methods

     

    Module 6: Create a more Effective Work Environment for Employee Web Usage

    • Configure Content Filtering Rules to Determine Internet Usage
    • Setting Global Content Filtering Policy Rules
    • Creating Custom Response Pages
    • Universal Policy Enforcement

     

    Module 7: Providing Web Protection Against Malware

    • WSS Threat Protection
    • Malware Analysis and WSS
    • Threat Protection Policies
    • Creating Threat Protection Policy Rules

     

    Module 8: Enable Encrypted Traffic Inspection

    • Encrypted Traffic
    • SSL Configuration
    • Configuring SSL Exceptions

     

    Module 9: Enable Corporate Users to Securely Access the Internet

    • Firewall/VPN (IPsec) Access Method
    • FQDN-IKEv2 Firewall Access Method
    • Cert-Based Connection Access Method
    • TransProxy (Explicit Proxy Over IPsec) Access Method
    • Proxy Forwarding Access Method

     

    Module 10: Identify Web Usage and Security Statistics with Reports

    • Reports Overview
    • Pre-defined Reports
    • Simple Reporting
    • Custom Reporting
    • Forensic Reporting
    • Managing and Using Reports

     

    Module 11: Enable Mobile Users to Securely Access the Internet

    • About Mobile Device Security
    • Authentication for Mobile Users
    • SEP-Moblie Solution
    • Android Mobile Access Enrollment Process

     

    Module 12: Course review

    • Assessment of Needs
    • Design – Access Methods and Authentication
    • Design – Policy, Reporting and Threat Protection
    • Design Evaluation
    • Working knowledge of cloud based solutions
    • Knowledge of internet traffic protocols
    • Basic understanding of principles of authentication.
      Datoer
      Date on Request

    Follow Up Courses

    Filtrer
    • 2 Dager
      Date on Request
      Price on Request
      Book Now
    • 3 Dager
      Date on Request
      Price on Request
      Book Now
    • 3 Dager
      Date on Request
      Price on Request
      Book Now
    • 3 Dager
      Date on Request
      Price on Request
      Book Now
    • 2 Dager
      Date on Request
      Price on Request
      Book Now
    • 4 Dager
      Date on Request
      Price on Request
      Book Now
    • 2 Dager
      Date on Request
      Price on Request
      Book Now
    • 3 Dager
      Date on Request
      Price on Request
      Book Now

    Know someone who´d be interested in this course?
    Let them know...

    Use the hashtag #InsoftLearning to talk about this course and find students like you on social media.