Symantec (Blue Coat) ProxySG 6.7 Advanced Administration Training in Belgium

  • Learn via: Classroom / Virtual Classroom / Online
  • Duration: 2 Days
  • Price: Please contact for booking options
We can host this training at your preferred location. Contact us!

The 2-day ProxySG v6.6 Advanced Administration course is intended for IT professionals who wish to learn to master the advanced features of ProxySG.

This course includes practical hands-on exercises that enable you to test your new skills and begin to use those skills in a working environment.

This course is for IT network or security professionals who have practical experience with the ProxySG in the field and wish to master the advanced network security of ProxySG.

By the completion of this course, you will be able to:

• Solve common authentication and SSL issues
• Understand the underlying architecture of SGOS
• Monitor and analyze ProxySG performance
• Use policy tracing as a troubleshooting tool

Module 1: Using Authentication Realms

• Describe the benefits of enabling authentication on the ProxySG
• Describe, at a high level, the ProxySG authentication architecture
• Understand the use of IWA realms, with both IWA Direct and IWA BCAAA connection methods

Module 2: Understanding Authentication Credentials

• Describe how NTLM and Kerberos authentication work in both IWA direct and IWA BCAAA deployments
• Configure the ProxySG to use Kerberos authentication

Module 3: Understanding Authentication Modes

• Describe authentication surrogates and authentication modes
• Describe ProxySG authentication in both explicit and transparent deployment mode

Module 4: Understanding HTTPS

• Describe key components of SSL encryption
• Describe how the SSL handshake works
• Describe some of the legal and security considerations related to use of the SSL proxy

Module 5: Managing SSL Traffic on the ProxySG

• Describe how the SSL proxy service handles SSL traffic
• Describe the standard keyrings that are installed by default on the ProxySG
• Identify the types of security certificates that the ProxySG uses

Module 6: Optimizing SSL Interception Performance

• Configure the ProxySG to process SSL traffic according to best practices for performance

Module 7: SGOS Architecture

• Identify key components of SGOS
• Explain the interaction among client workers and software workers in processing client requests
• Explain the significance of policy checkpoints
• Describe key characteristics of the SGOS storage subsystem
• Explain the caching behavior of the ProxySG

Module 8: Caching Architecture

• Describe the benefits of object caching on the ProxySG
• Explain the caching-related steps in a ProxySG transaction
• Identify and describe the HTTP request and response headers related to caching
• Describe, in general terms, how the ProxySG validates cached objects to ensure freshness
• Explain how the ProxySG uses cost-based deletion, popularity contests, and pipelining to improve object caching

Module 9: System Diagnostics

• Describe the use of the health monitor and health checks
• Explain the use of the event and access logs
• Describe the information available in advanced URLs and sysinfo files
• Describe the function of policy tracing and packet captures

Module 10: Introduction to Content Policy Language (CPL)

• Describe the fundamental concepts and purposes of ProxySG policy transactions
• Understand the relationship of layers, rules, conditions, properties, and triggers
• Describe the two types of actions in CPL
• Describe how to write, edit, and upload CPL code

Module 11: Using Policy Tracing for Troubleshooting

• Identify the two main types of ProxySG policy traces
• Describe the various sections of a policy trace result
• Configure a global and policy-driven trace
• Access and interpret policy trace results

Module 12: ProxySG Integration

• Identify other Symantec products that can be used as part of a complete security solution



Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our Belgium facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

Classroom / Virtual Classroom
03 augustus 2024
Brüksel, Brugge, Anvers
2 Days
Classroom / Virtual Classroom
07 augustus 2024
Brüksel, Brugge, Anvers
2 Days
Classroom / Virtual Classroom
15 augustus 2024
Brüksel, Brugge, Anvers
2 Days
Classroom / Virtual Classroom
16 augustus 2024
Brüksel, Brugge, Anvers
2 Days
Classroom / Virtual Classroom
20 augustus 2024
Brüksel, Brugge, Anvers
2 Days
Classroom / Virtual Classroom
23 augustus 2024
Brüksel, Brugge, Anvers
2 Days
Classroom / Virtual Classroom
24 augustus 2024
Brüksel, Brugge, Anvers
2 Days
Classroom / Virtual Classroom
25 augustus 2024
Brüksel, Brugge, Anvers
2 Days
Symantec (Blue Coat) ProxySG 6.7 Advanced Administration Training Course in Belgium

Belgium, or officially known as Kingdom of Belgium, is located in Northwestern Europe. With the country's 11.5 million population, Belgium is the 6th most densely populated country in Europe. The capital and largest city is Brussels. And other major and popular cities are Antwerp, Ghent, Charleroi, Liège, Bruges, Namur, and Leuven. The population of Belgium consists mostly of Flemings and Walloons. While the Flemings speak Dutch, the Walloons speak French.

The country is known for moules frites (mussels served with french fries) as well as waffles and of course; Belgian chocolate. Chocolate is one of Belgium’s main food exports. Another thing that Belgium is known for is its beautiful city Bruges. Bruges is one of Europe’s most well-preserved medieval towns and has its beautiful canals.

At Bilginç IT Academy, we understand the unique requirements of Belgium and incorporate innovative training methodologies to meet them. Explore our extensive training catalog, featuring diverse Certification Exam preparation courses and accredited corporate training programs that will revolutionize your perception of IT training.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.