Symantec (Blue Coat) ProxySG 6.7 Basic Administration Training in Australia

  • Learn via: Classroom / Virtual Classroom / Online
  • Duration: 2 Days
  • Price: Please contact for booking options
We can host this training at your preferred location. Contact us!

The 2-day ProxySG 6.6 Basic Administration course is an introduction to deployment options and management of the individual key features offered using the ProxySG 6.6 solution.

This an introductory course and is designed for students who are new to the Proxy SG solution.

This course includes practical hands-on exercises that enable you to test your new skills and begin to use those skills in a working environment.

The ProxySG 6.6 Basic Administration course is intended for students who wish to master the fundamentals of the ProxySG. It is designed for students who have not taken any previous training courses about the ProxySG.

This course assumes that students have a basic understanding of networking concepts, such as local-area networks (LANs), the Internet, security, and IP protocols.

By the completion of this course, you will be able to:

• Describe the major Secure Web Gateway functions of the ProxySG
• License and configure a ProxySG
• Deploy a ProxySG in either explicit or transparent mode
• Use the Visual Policy Manager to write policies to manage web filtering, authentication, and SSL traffic management
• Use ProxySG access logs to generate reports

Module 1: Introduction to the Symantec ProxySG Secure Web Gateway

• Describe the functions of a proxy server
• Differentiate proxy servers from firewalls
• Describe the key features and benefits of the ProxySG
• List the various ProxySG models
• Access online Symantec community resources

Module 2: ProxySG Security Deployment Options

• Describe the three network deployment methods
• Describe the three possible roles of the ProxySG

Module 3: ProxySG Management Console

• Describe the relationship between the Management Console and the ProxySG CLI
• Describe the primary function of the major areas of the Management Console
• Use the Management Console to access on-box help and Symantec product documentation

Module 4: Traffic Interception Using Proxy Services

• Understand the functions of proxy services, listeners, and proxy types
• Describe the three most common proxy services
• Explain how the intercept and bypass settings affect what happens to network traffic passing through the ProxySG
• Explain the function of common global proxy service settings

Module 5: Hypertext Transfer Protocol

• Understand how a connection is initiated over the transport layer
• Identify the components of an HTTP URL
• Explain the two types of HTTP messages: request and response
• Identify common response codes

Module 6: Introduction to the Visual Policy Manager

• Describe the relationship among the VPM, CPL, and the Management Console
• Describe the default processing order for policy layers and rules
• Describe triggers and actions that can be used in writing policy
• Identify the types of objects that the VPM supports
• Describe some of the best practices to be followed when using the VPM to create policy

Module 7: Filtering Web Content

• Describe the main concepts of web filtering
• Describe the primary category databases
• Describe the category types available to policy
• Describe how WebFilter and WebPulse work together

Module 8: Using Threat Intelligence to Defend the Network

• Understand Intelligence Services as provided by the Global Intelligence Network
• Understand Geolocation and Threat Risk Levels and how they can be used in policy

Module 9: Ensuring Safe Downloads

• Describe how malware can be transmitted via HTTP
• Explain the methods, advantages, and disadvantages of file type detection
• Describe some of the considerations in deciding what content to block as possible malware sources

Module 10: Notifying User of Internet Usage Policies

• Explain the function and various components of built-in and custom exception pages
• Describe the function of Notify User objects
• Identify the types of pages that can be sent to users by using Notify User objects
• Describe splash pages and coaching pages using Notify User objects in the VPM

Module 11: Access Logging on the ProxySG

• Describe, at a high level, how the ProxySG performs access logging
• Describe the components of a ProxySG access log facility
• Identify default log facilities and log formats
• Describe common use cases for periodic and continuous uploading of access logs

Appendix A: ProxySG Initial Configuration
Appendix B: IPv6 in ProxySG Deployments



Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our Australia facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

06 January 2025 (2 Days)
Melbourne, Sydney, Brisbane
Classroom / Virtual Classroom
06 January 2025 (2 Days)
Melbourne, Sydney, Brisbane
Classroom / Virtual Classroom
01 February 2025 (2 Days)
Melbourne, Sydney, Brisbane
Classroom / Virtual Classroom
04 February 2025 (2 Days)
Melbourne, Sydney, Brisbane
Classroom / Virtual Classroom
05 February 2025 (2 Days)
Melbourne, Sydney, Brisbane
Classroom / Virtual Classroom
08 February 2025 (2 Days)
Melbourne, Sydney, Brisbane
Classroom / Virtual Classroom
19 February 2025 (2 Days)
Melbourne, Sydney, Brisbane
Classroom / Virtual Classroom
01 February 2025 (2 Days)
Melbourne, Sydney, Brisbane
Classroom / Virtual Classroom
Symantec (Blue Coat) ProxySG 6.7 Basic Administration Training Course in Australia

Australia is the smallest continent yet it's also one of the largest countries in the World. As the oldest and flattest continent, Australia is a mega-diverse country with a vast variety of landscapes, climates and animals. Canberra is the capital city while Sydney, Brisbane and Melbourne are the more popular ones. Australia is a developed country with a high-income economy and a member of the United Nations, G20 and the Commonwealth of Nations.

While cricket and football are the most popular sports in Australia, the Australian Open tennis grand slam tournament is a major international event that takes place in this country. The island of Tasmania has the cleanest air in the world. Uluru-Kata Tjuta National Park, Great Barrier Reef, Kangaroo Island, Kakadu National Park, Whitsunday Islands and The Pinnacles are some of the jaw-dropping places in Australia.

We offer a wide range of IT courses, from cybersecurity, data science and software development to business skills and project management, and we can host training at your preferred location in Australia. Let our experienced instructors provide you with hands-on training and practical insights.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.