Symantec Web Isolation Administration

Partager cette formation
Détails de la formation

The Web Isolation Administration course provides a detailed introduction to Symantec’s Web Isolation solution, including deployment options and use cases.

Delivery Method

Instructor-led and Virtual Academy

Who Should Attend

The Web Isolation Administration course is intended for students who wish to master the fundamentals of Symantec Web Isolation. It is designed for students who have not taken any previous training courses about Web Isolation.

Prerequisites

This course assumes that students have a basic understanding of networking concepts, such as local-area networks (LANs), the Internet, security, and IP protocols.

Hands-On

This course includes practical hands-on exercises that enable you to test your new skills and begin to use those skills in a working environment.

Course Objectives

By the completion of this course, you will be able to:

• Describe the major Web Isolation functions and capabilities
• Write policies to manage selective web isolation
• Use Web Isolation to selectively isolate risky and uncategorized websites, allow privileged users greater access, and defend against phishing and ransomware attacks

  • Module 1 Introduction to Symantec Web Isolation

    • Describe the purpose and function of Web Isolation

    • Describe Symantec Web Isolation architecture

    • Provide an overview of Web Isolation use cases

  • Module 2 Web Isolation Deployment Options

    • Understand classic proxy and downstream proxy deployments

    • Describe components and system requirements

    • Provide an overview of installation tasks

    • Describe how to configure Web Isolation policies

  • Module 3 Enable Broad Web Access and Avoid Over-blocking while Still Protecting the Organization from Unknown or Unsafe Websites

    • Understand the disadvantages of over-blocking

    • Describe how to use Web Isolation to allow secure access to unknown or unsafe websites

    • Provide privileged users greater access to risky websites based on role or group

  • Module 4 Prevent Users from Submitting Corporate Credentials and other Sensitive Information on Unknown or Malicious Sites

    • Describe how to prevent phishing attacks

    • Describe how to isolate web activity launched from emails

  • Module 5 Review of Symantec Web Isolation

    • Describe how to prevent phishing attacks

    • Describe how to isolate web activity launched from emails


Détails de la formation