- Module 1 Introduction to the Symantec ProxySG Secure Web Gateway
• Describe the functions of a proxy server
• Differentiate proxy servers from firewalls
• Describe the key features and benefits of the ProxySG
• List the various ProxySG models
• Access online Symantec community resources
- Module 2 ProxySG Security Deployment Options
• Describe the three network deployment methods
• Describe the three possible roles of the ProxySG
- Module 3 ProxySG Management Console
• Describe the relationship between the Management Console and the ProxySG CLI
• Describe the primary function of the major areas of the Management Console
• Use the Management Console to access on-box help and Symantec product documentation
- Module 4 Traffic Interception Using Proxy Services
• Understand the functions of proxy services, listeners, and proxy types
• Describe the three most common proxy services
• Explain how the intercept and bypass settings affect what happens to network traffic passing through the ProxySG
• Explain the function of common global proxy service settings
- Module 5 Hypertext Transfer Protocol
• Understand how a connection is initiated over the transport layer
• Identify the components of an HTTP URL
• Explain the two types of HTTP messages: request and response
• Identify common response codes
- Module 6 Introduction to the Visual Policy Manager
• Describe the relationship among the VPM, CPL, and the Management Console
• Describe the default processing order for policy layers and rules
• Describe triggers and actions that can be used in writing policy
• Identify the types of objects that the VPM supports
• Describe some of the best practices to be followed when using the VPM to create policy
- Module 7 Filtering Web Content
• Describe the main concepts of web filtering
• Describe the primary category databases
• Describe the category types available to policy
• Describe how WebFilter and WebPulse work together
- Module 8 Using Threat Intelligence to Defend the Network
• Understand Intelligence Services as provided by the Global Intelligence Network
• Understand Geolocation and Threat Risk Levels and how they can be used in policy
- Module 9 Ensuring Safe Downloads
• Describe how malware can be transmitted via HTTP
• Explain the methods, advantages, and disadvantages of file type detection
• Describe some of the considerations in deciding what content to block as possible malware sources
- Module 10 Notifying User of Internet Usage Policies
• Explain the function and various components of built-in and custom exception pages
• Describe the function of Notify User objects
• Identify the types of pages that can be sent to users by using Notify User objects
• Describe splash pages and coaching pages using Notify User objects in the VPM
- Module 11 Access Logging on the ProxySG
• Describe, at a high level, how the ProxySG performs access logging
• Describe the components of a ProxySG access log facility
• Identify default log facilities and log formats
• Describe common use cases for periodic and continuous uploading of access logs