Cisco utbildning

Insoft Services är en av få utbildningsleverantörer inom EMEAR som erbjuder hela utbudet av Cisco-certifiering och specialiserad teknikutbildning.

Läs mer

Cisco-certifieringar

Upplev en blandad inlärningsmetod som kombinerar det bästa av instruktörsledd utbildning och e-lärande i egen takt för att hjälpa dig att förbereda dig för ditt certifieringsprov.

Läs mer

Cisco Learning Credits

Cisco Learning Credits (CLC) är förbetalda utbildningskuponger som löses in direkt med Cisco och som gör det enklare att planera för din framgång när du köper Ciscos produkter och tjänster.

Läs mer

Cisco Fortbildning

Ciscos fortbildningsprogram erbjuder alla aktiva certifikatinnehavare flexibla alternativ för att omcertifiera genom att slutföra en mängd olika kvalificerade utbildningsartiklar.

Läs mer

Cisco Digital Learning

Certifierade medarbetare är VÄRDERADE tillgångar. Utforska Ciscos officiella digitala utbildningsbibliotek för att utbilda dig själv genom inspelade sessioner.

Läs mer

Partner för affärsaktivering

Cisco Business Enablement Partner Program fokuserar på att vässa affärskunskaperna hos Cisco Channel Partners och kunder.

Läs mer

Cisco Kurskatalog

Läs mer

Fortinet-certifieringar

Fortinet Network Security Expert (NSE) -programmet är ett utbildnings- och certifieringsprogram på åtta nivåer för att lära ingenjörer om deras nätverkssäkerhet för Fortinet FW-färdigheter och erfarenheter.

Tekniska utbildningar

Tekniska utbildningar

Insoft är erkänt som Fortinet Authorized Training Center på utvalda platser i EMEA.

Läs mer

Fortinet Kurskatalog

Utforska ett brett utbud av Fortinet-scheman i olika länder samt onlinekurser.

Läs mer

ATC-status

Kolla in vår ATC-status i utvalda länder i Europa.

Läs mer

Fortinet Professionella tjänster

Globalt erkända team av certifierade experter hjälper dig att göra en smidigare övergång med våra fördefinierade konsult-, installations- och migreringspaket för ett brett utbud av Fortinet-produkter.

Läs mer

Microsoft-utbildning

Insoft Services tillhandahåller Microsoft-utbildning i EMEAR. Vi erbjuder Microsofts tekniska utbildnings- och certifieringskurser som leds av instruktörer i världsklass.

Tekniska utbildningar

Extreme-utbildning

Lär dig exceptionella kunskaper och färdigheter i Extreme Networks.

Technische Kurse

Tekniske-certifieringar

Vi tillhandahåller omfattande läroplan för tekniska kompetensfärdigheter på certifieringsprestationen.

Läs mer

Extreme Kurskatalog

Hier finden Sie alle Extreme Networks online und den von Lehrern geleiteten Kalender für den Klassenraum.

Läs mer

ATP-ackreditering

Som auktoriserad utbildningspartner (ATP) säkerställer Insoft Services att du får de högsta tillgängliga utbildningsstandarderna.

Läs mer

Konsultpaket

Vi erbjuder innovativt och avancerat stöd för att designa, implementera och optimera IT-lösningar.Vår kundbas inkluderar några av de största telekombolagen globalt.

Lösningar och tjänster

Globalt erkända team av certifierade experter hjälper dig att göra en smidigare övergång med våra fördefinierade konsult-, installations- och migreringspaket för ett brett utbud av Fortinet-produkter.

Om oss

Insoft Tillhandahåller auktoriserade utbildnings- och konsulttjänster för utvalda IP-leverantörer.Lär dig hur vi revolutionerar branschen.

Läs mer
  • +46 8 502 431 88
  • Symantec Web Protection – Edge SWG Planning, Implementation, and Administration R1

    Duration
    4 Dagar
    Delivery
    (Online och på plats)
    Price
    Pris på begäran

    The Symantec Web Protection—Edge SWG Planning, Implementation, and Administration course provides a detailed introduction to the features that comprise Edge SWG, which is the on-premise component of Symantec Web Protection.

     

    These applications include ProxySG, Management Center, Reporter, Content Analysis, and High Risk Isolation.

     

    Associated certification:

    • Exam 250-584 Symantec Web Protection R1 Technical Specialist

    By the completion of this course, you will be able to:

     

    • Describe the major Edge SWG functions and capabilities
    • Write policies to defend enterprise networks against malware attacks and to enforce acceptable Internet browsing behavior
    • Understand how the various applications work together to secure enterprise networks
    • View reports and monitor solution performance

    Module 1: Introduction to Symantec Edge SWG

    1. Overview of Web Protection Suite
    2. Overview of Edge SWG components

     

    Module 2: Intercepting web traffic and applying policy

    1. How the ProxySG intercepts traffic
    2. Writing policy on the ProxySG
    3. Layer and rule evaluation order in the VPM

     

    Module 3: Applying security and web usage policy to encrypted traffic

    1. Introduction to TLS
    2. Managing HTTPS traffic on the ProxySG

     

    Module 4: Providing security and web usage policies based on role or group

    1. Authentication basics on the ProxySG
    2. Using IWA authentication on the ProxySG
    3. Authentication modes in explicit and transparent modes
    4. Connecting to the Windows domain directly using IWA direct
    5. Connecting to the Windows domain using IWA BCAAA
    6. Using roles and groups in policy

     

    Module 5: Enforcing corporate guidelines for acceptable Internet browsing behavior

    1. Create strong corporate guidelines for acceptable Internet use
    2. Use website categorization to enforce acceptable use guidelines
    3. Provide the ProxySG with categorization databases to be referenced in policy
    4. Set the Request URL Category object in policy to enforce acceptable use guidelines
    5. Inform users when web access is denied or restricted due to policy

     

    Module 6: Protecting the endpoint from malicious activity

    1. WebPulse technical details
    2. Introduction to Intelligence Services
    3. Using Intelligence Services data feeds in policy
    4. Ensuring safe downloads

     

    Module 7: Centrally managing devices with Management Center

    1. How Management Center centralizes and simplifies device management
    2. Configuring the ProxySG with the ProxySG Admin Console
    3. Creating and distributing VPM policies
    4. Creating and managing jobs
    5. Use reports to analyze web browsing activity

     

    Module 8: Reporting for Edge SWG features

    1. How Reporter delivers centralized web reporting
    2. Configuring access logging on the ProxySG
    3. Using the Reporter Admin Console to configure log processing on Reporter

     

    Module 9: Enhancing security with virus scanning

    1. Introduction to Content Analysis
    2. Exploring the Content Analysis management console
    3. Configuring communication with the ProxySG over ICAP
    4. Configuring malware scanning options

     

    Module 10: Using malware analysis to analyze potentially malicious files

    1. Introduction to malware analysis
    2. Preparing the use malware analysis
    3. Performing malware analysis

     

    Module 11: Providing security for risky and unknown websites with High Risk Isolation

    1. Introduction to High Risk Isolation
    2. Configuring HRI
    3. Overview of Symantec Web Isolation

     

    Module 12: Monitoring Edge SWG features

    1. Monitoring devices from within Management Center
    2. Monitor and maintain the Content Analysis
    3. Troubleshooting tips

     

    Module 13: Understanding SGOS architecture and caching on the Edge SWG

    1. SGOS architecture
    2. Caching on the Edge SWG
    3. Using HTTP compression

     

    Module 14: Using built-in diagnostic tools on the Edge SWG

    1. Exploring sysinfo files
    2. Using policy tracing and policy coverage
    3. Using packet captures
    4. Sending service information to Symantec

     

    Module 15: Expanding security with cloud integrations

    1. Introduction to Cloud SWG
    2. Using Universal Policy Enforcement
    3. Integrating CloudSOC with Symantec Web Protection

     

    Module 16: Course review

    1. Symantec Web Protection–Edge SWG Planning, Implementation, and Administration course review

     

    Appendix A: Using Content Policy Language (CPL)

    1. Basic CPL concepts
    2. Intermediate CPL concepts
    3. Using CPL best practices

     

    Appendix B: Introduction to Hypertext Transport Protocol (HTTP)

    1. Basic HTTP concepts
    • Basic understanding of networking concepts
    • Basic understanding of network security concepts
    • Basic understanding of the use of proxy servers

    The Symantec Web Protection—Edge SWG Planning, Implementation, and Administration course provides a detailed introduction to the features that comprise Edge SWG, which is the on-premise component of Symantec Web Protection.

     

    These applications include ProxySG, Management Center, Reporter, Content Analysis, and High Risk Isolation.

     

    Associated certification:

    • Exam 250-584 Symantec Web Protection R1 Technical Specialist

    By the completion of this course, you will be able to:

     

    • Describe the major Edge SWG functions and capabilities
    • Write policies to defend enterprise networks against malware attacks and to enforce acceptable Internet browsing behavior
    • Understand how the various applications work together to secure enterprise networks
    • View reports and monitor solution performance

    Module 1: Introduction to Symantec Edge SWG

    1. Overview of Web Protection Suite
    2. Overview of Edge SWG components

     

    Module 2: Intercepting web traffic and applying policy

    1. How the ProxySG intercepts traffic
    2. Writing policy on the ProxySG
    3. Layer and rule evaluation order in the VPM

     

    Module 3: Applying security and web usage policy to encrypted traffic

    1. Introduction to TLS
    2. Managing HTTPS traffic on the ProxySG

     

    Module 4: Providing security and web usage policies based on role or group

    1. Authentication basics on the ProxySG
    2. Using IWA authentication on the ProxySG
    3. Authentication modes in explicit and transparent modes
    4. Connecting to the Windows domain directly using IWA direct
    5. Connecting to the Windows domain using IWA BCAAA
    6. Using roles and groups in policy

     

    Module 5: Enforcing corporate guidelines for acceptable Internet browsing behavior

    1. Create strong corporate guidelines for acceptable Internet use
    2. Use website categorization to enforce acceptable use guidelines
    3. Provide the ProxySG with categorization databases to be referenced in policy
    4. Set the Request URL Category object in policy to enforce acceptable use guidelines
    5. Inform users when web access is denied or restricted due to policy

     

    Module 6: Protecting the endpoint from malicious activity

    1. WebPulse technical details
    2. Introduction to Intelligence Services
    3. Using Intelligence Services data feeds in policy
    4. Ensuring safe downloads

     

    Module 7: Centrally managing devices with Management Center

    1. How Management Center centralizes and simplifies device management
    2. Configuring the ProxySG with the ProxySG Admin Console
    3. Creating and distributing VPM policies
    4. Creating and managing jobs
    5. Use reports to analyze web browsing activity

     

    Module 8: Reporting for Edge SWG features

    1. How Reporter delivers centralized web reporting
    2. Configuring access logging on the ProxySG
    3. Using the Reporter Admin Console to configure log processing on Reporter

     

    Module 9: Enhancing security with virus scanning

    1. Introduction to Content Analysis
    2. Exploring the Content Analysis management console
    3. Configuring communication with the ProxySG over ICAP
    4. Configuring malware scanning options

     

    Module 10: Using malware analysis to analyze potentially malicious files

    1. Introduction to malware analysis
    2. Preparing the use malware analysis
    3. Performing malware analysis

     

    Module 11: Providing security for risky and unknown websites with High Risk Isolation

    1. Introduction to High Risk Isolation
    2. Configuring HRI
    3. Overview of Symantec Web Isolation

     

    Module 12: Monitoring Edge SWG features

    1. Monitoring devices from within Management Center
    2. Monitor and maintain the Content Analysis
    3. Troubleshooting tips

     

    Module 13: Understanding SGOS architecture and caching on the Edge SWG

    1. SGOS architecture
    2. Caching on the Edge SWG
    3. Using HTTP compression

     

    Module 14: Using built-in diagnostic tools on the Edge SWG

    1. Exploring sysinfo files
    2. Using policy tracing and policy coverage
    3. Using packet captures
    4. Sending service information to Symantec

     

    Module 15: Expanding security with cloud integrations

    1. Introduction to Cloud SWG
    2. Using Universal Policy Enforcement
    3. Integrating CloudSOC with Symantec Web Protection

     

    Module 16: Course review

    1. Symantec Web Protection–Edge SWG Planning, Implementation, and Administration course review

     

    Appendix A: Using Content Policy Language (CPL)

    1. Basic CPL concepts
    2. Intermediate CPL concepts
    3. Using CPL best practices

     

    Appendix B: Introduction to Hypertext Transport Protocol (HTTP)

    1. Basic HTTP concepts
    • Basic understanding of networking concepts
    • Basic understanding of network security concepts
    • Basic understanding of the use of proxy servers
      Datum
      Datum på begäran

    Follow Up Courses

    Filtrera
    • 2 Dagar
      Datum på begäran
      Price on Request
      Book Now
    • 3 Dagar
      Datum på begäran
      Price on Request
      Book Now
    • 3 Dagar
      Datum på begäran
      Price on Request
      Book Now
    • 3 Dagar
      Datum på begäran
      Price on Request
      Book Now
    • 2 Dagar
      Datum på begäran
      Price on Request
      Book Now
    • 4 Dagar
      Datum på begäran
      Price on Request
      Book Now
    • 2 Dagar
      Datum på begäran
      Price on Request
      Book Now
    • 3 Dagar
      Datum på begäran
      Price on Request
      Book Now

    Know someone who´d be interested in this course?
    Let them know...

    Use the hashtag #InsoftLearning to talk about this course and find students like you on social media.