Web Security Service Planning Implementation & Administration R1.2

Course Description

The Symantec Web Security Service Planning, Implementation, & Administration course is intended for IT professionals who will be configuring, planning, installing, or administering the Symantec Web Security Service (WSS).

Prerequisites

  • Working knowledge of cloud-based solutions
  • Knowledge of internet traffic protocols
  • Basic understanding of principles of authentication.

Target Audience

Hands-On

This course delivers practical hands-on exercises that enable you to rectify your new skills & begin to utilize those skills in a working environment.

 

Learning Objectives

  • Explain the architecture, components, & process flow of WSS
  • Identify installation, configuration, & administration of the core features & products of WSS.
  • Rectify the key elements for planning a WSS deployment.

Content Outline

  •   What is Cloud-Delivered Security
  •   What are the Key Considerations for Having Cloud-Delivered Security
  •   What are the Key Features Needed for Cloud-Delivered Security
  •   WSS Infrastructure
  •   WSS Connection Architecture
  •   WSS Features
  •   WSS Additional Products
  •   Initial Registration
  •   User Administration
  •   Licensing
  •   Data Privacy Settings
  •   Remote Users and Solutions
  •   WSS Agent Access Method
  •   WSS-SEP Access Method
  •   Cloud Connect Defense (CCD) Access
  •   Authentication and WSS
  •   Auth Connector
  •   SAML
  •   Remote Authentication Methods with Auth Connector
  •   Authentication with WSS Agent and WSS-SEP Access Methods
  •   Configure Content Filtering Rules to Determine Internet Usage
  •   Setting Global Content Filtering Policy Rules
  •   Creating Custom Response Pages
  •   Universal Policy Enforcement
  •   WSS Threat Protection
  •   Malware Analysis and WSS
  •   Threat Protection Policies
  •   Creating Threat Protection Policy Rules
  •   Encrypted Traffic
  •   SSL Configuration
  •   Configuring SSL Exceptions
  •   Firewall/VPN (IPsec) Access Method
  •   FQDN-IKEv2 Firewall Access Method
  •   Cert-Based Connection Access Method
  •   TransProxy (Explicit Proxy over IPsec) Access Method
  •   Proxy Forwarding Access Method
  •   Reports Overview
  •   Pre-defined Reports
  •   Simple Reporting
  •   Custom Reporting
  •   Forensic Reporting
  •   Managing and Using Reports
  •   About Mobile Device Security
  •   Authentication for Mobile Users
  •   SEP-Moblie Solution
  •   Android Mobile Access Enrollment Process
  •   Assessment of Needs
  •   Design – Access Methods and Authentication
  •   Design – Policy, Reporting, and Threat Protection
  •   Design Evaluation

FAQs

Network security is a set of technologies that shields the usability & integrity of a company's infrastructure by stopping entry or proliferation within a network of an expansive variety of potential threats.

 

Network security is a broad term covering many technologies, devices, and processes. At its most specific time, it is a set of rules & configurations designed to protect the integrity, confidentiality, & accessibility of computer networks & data using software and hardware technologies.

Broadcom is a leading provider of enterprise security solutions worldwide, leveraging the breadth and depth of hardware and software security expertise.

 

To attend the training session, you should have operational Desktops or Laptops with the required specifications and a good internet connection to access the labs. 

 

We would always recommend you attend the live session to practice & clarify the doubts instantly and get more value from your investment. However, if you have to skip the class due to some contingency, Radiant Tech learning will help you with the recorded session of that particular day. However, those recorded sessions are not meant only for personal consumption and NOT for distribution or any commercial use.

 

Radiant Tech learning has a data center containing a Virtual Training environment for participants' hand-on-practice. Participants can easily access these labs over Cloud with the help of a remote desktop connection. Radiant virtual labs allow you to learn from anywhere in the world and any time zone. 

 

The learners will be enthralled as we engage them the real-world and Oriented industry projects during the training program. These projects will improve your skills and knowledge and give you a better experience. These real-time projects will help you a lot in your future tasks and assignments.

 

You can request a refund if you do not wish to enroll in the course.

 

Yes, you can.

 

We use the ideal standards in Internet security. Any data retained is not communicated with third parties.

 

It is recommended but not mandatory. Being acquainted with the primary course material will enable students and the trainer to move at the desired pace during classes. You can access courseware for most vendors.

 

You can buy online from the page by clicking "Buy Now."You can view alternate payment methods on the payment options page.

 

Yes, students can pay from the course page.

 

The course completion certification will be awarded to all the professionals who have completed the training program & the project assignment given by your instructor. You can use the certificate in future job interviews to help you to l& your dream job.

 

Radiant believes in a practical & creative approach to training & development, distinguishing it from other activity & developmental platforms. Moreover, training courses are undertaken by experts with a range of experience in their domain.

 

Radiant team of experts will be available at e-mail support@radianttechlearning.com to answer your technical queries after the training program.

 

Yes, Radiant will provide you most updated high, value-relevant real-time projects & case studies in each training program.

 

Technical issues are unpredictable & might occur with us as well. Participants must ensure access to the required configuration with good internet speed.

 

Radiant Techlearning offers training programs on weekdays, weekends & combination of weekdays & weekends. We provide you with complete liberty to choose the schedule that suits your need.

 

Radiant has highly intensive selection criteria for Technology Trainers & Consultants who deliver training programs. Our trainers & consultants undergo rigorous technical and behavioral interview and assessment processes before they are boarded in the company.

Our Technology experts/trainers & consultants carry deep-dive knowledge in the technical subject & are certified by the OEM.

Our training programs are practically oriented with 70% – 80% hands-on training technology tools. Our training program focuses on one-on-one interaction with each participant, the latest content in the curriculum, real-time projects, and case studies during the training program.

Our faculty will provide you with the knowledge of each course from the fundamental level quickly, and you are free to ask your doubts any time your respective faculty.

Our trainers have the patience and the ability to explain complex concepts simplistically with depth and width of knowledge.

We provide a support session to ensure quality learning even after the training program.

 

Send a Message.


  • Enroll