Une formation sur mesure ?

Devis immédiat

Nos clients

logos clients Nativo formation
Formations inter / intra entreprise
Revenir aux formations Bluecoat

Formation Symantec ProxySG 6.7 Basic Administration (BCCPA)



2 jours


1590€ ht


By the completion of this course, you will be able to :

  • Describe the major Secure Web Gateway functions of the ProxySG
  • License and configure a ProxySG
  • Deploy a ProxySG in either explicit or transparent mode
  • Use the Visual Policy Manager to write policies to manage web filtering, authentication, and SSL traffic management
  • Use ProxySG access logs to generate reports.


Administrateur ou ingénieurs sécurité.


This course assumes that students have a basic understanding of networking concepts, such as local-area networks (LANs), the Internet, security, and IP protocols.


Module 1 : Introduction to the Symantec ProxySG Secure Web Gateway

  • Describe the functions of a proxy server
  • Differentiate proxy servers from firewalls
  • Describe the key features and benefits of the ProxySG
  • List the various ProxySG models
  • Access online Symantec community resources

Module 2 : ProxySG Security Deployment Options

  • Describe the three network deployment methods
  • Describe the three possible roles of the ProxySG

Module 3 : ProxySG Management Console

  • Describe the relationship between the Management Console and the ProxySG CLI
  • Describe the primary function of the major areas of the Management Console
  • Use the Management Console to access on-box help and Symantec product documentation

Module 4 : Traffic Interception Using Proxy Services

  • Understand the functions of proxy services, listeners, and proxy types
  • Describe the three most common proxy services
  • Explain how the intercept and bypass settings affect what happens to network traffic passing through the ProxySG
  • Explain the function of common global proxy service settings

Module 5 : Hypertext Transfer Protocol

  • Understand how a connection is initiated over the transport layer
  • Identify the components of an HTTP URL
  • Explain the two types of HTTP messages: request and response
  • Identify common response codes

Module 6 : Introduction to the Visual Policy Manager

  • Describe the relationship among the VPM, CPL, and the Management Console
  • Describe the default processing order for policy layers and rules
  • Describe triggers and actions that can be used in writing policy
  • Identify the types of objects that the VPM supports
  • Describe some of the best practices to be followed when using the VPM to create policy

Module 7 : Filtering Web Content

  • Describe the main concepts of web filtering
  • Describe the primary category databases
  • Describe the category types available to policy
  • Describe how WebFilter and WebPulse work together

Module 8 : Using Threat Intelligence to Defend the Network

  • Understand Intelligence Services as provided by the Global Intelligence Network
  • Understand Geolocation and Threat Risk Levels and how they can be used in policy

Module 9 : Ensuring Safe Downloads

  • Describe how malware can be transmitted via HTTP
  • Explain the methods, advantages, and disadvantages of file type detection
  • Describe some of the considerations in deciding what content to block as possible malware sources

Module 10 : Notifying User of Internet Usage Policies

  • Explain the function and various components of built-in and custom exception pages
  • Describe the function of Notify User objects
  • Identify the types of pages that can be sent to users by using Notify User objects
  • Describe splash pages and coaching pages using Notify User objects in the VPM

Module 11 : Access Logging on the ProxySG

  • Describe, at a high level, how the ProxySG performs access logging
  • Describe the components of a ProxySG access log facility
  • Identify default log facilities and log formats
  • Describe common use cases for periodic and continuous uploading of access logs

Moyens et Méthodes Pédagogiques

  • La formation est constituée d’apports théoriques, d’exercices pratiques et de réflexions
  • Un poste par stagiaire
  • Formateur Expert
  • Remise d’une documentation pédagogique papier ou numérique pendant le stage

Validation des acquis

  • Auto évaluation des acquis par le stagiaire via un questionnaire en fin de formation
  • Attestation de fin de stage remise avec la facture