FORCEPOINT WSGA Professional Eğitimi

OVERVIEW 
During this four-day training course, you will learn how to install, configure, administer and support Forcepoint Web Security Gateway Anywhere (WSGA). Through instruction, demonstrations and hands-on lab practice exercises, you will learn the requirements and recommendations to successfully deploy WSGA in a variety of network environments. You will develop the skills required to successfully manage an existing deployment and will also be able to successfully deploy WSGA including Web DLP and TruHybrid functionality. 

COURSE OBJECTIVES 

  • Understand the WSGA Architecture 
  • Configure explicit and transparent proxy 
  • Configure multiple methods of identification and authentication 
  • Configure advanced scanning features 
  • Configure SSL content inspection and category bypass 
  • Understand and deploy the WSGA TruHybrid solution 

DURATION

4  DAYS

INTENDED AUDIENCE 
Customers: administrators, developers, Web developers, and managers who are responsible for configuring and tailoring Forcepoint WSGA 

1. Gün

  • Introductions 
    • Participant introductions 
    • Logistics 
    • Course Objectives
  • Forcepoint TRITON Solution Overview
    • WSGA components and their interaction
    • Forcepoint product offerings and their functions 
  • Architecture and Services 
    • TRITON architecture components 
    • Deployment options 
  • Appliance Overview 
    • Compare and contrast the V10000 and V5000 
  • X-Series Overview 
    • Capabilities and features of the X-Series appliance 
  • Application Installation and Configuration 
    • Deployment workflow 
    • Configuration tasks 
    • Installing off-box components 
    • Subscription keys 

2. Gün

  • Understanding HTTP
    • HTTP basics 
    • HTTP transactions 
    • HTTP error codes 
  • Explicit Proxy 
    • Explicit proxy deployment options 
    • PAC files 
    • Web Proxy Auto-Discovery (WPAD) 
  • Understanding WCCP 
    • Key features 
    • WCCP configuration 
    • Verify WCCP status 
  • Transparent Proxy
    • Transparent proxy deployment options
    • The Adaptive Redirection Module (ARM) 
    • Transparent proxy packet flow 
  • Explicit Proxy High Availability 
    • High availability and load balancing methods 
    • Clustering and VIP 
  • Transparent Proxy High Availability 
    • Layer 4 switching 
    • WCCP 
    • Policy Based Routing 

3. Gün

  • Identification and Authentication 
    • User identification 
    • Directory service integration 
    • Transparent identification agents 
    • Authentication and policy flow 
  • XID Agents 
    • Transparent user identification 
    • Troubleshooting XID agents 
    • Combining XID agents 
    • Manual authentication 
  • Proxy Authentication 
    • Explicit and transparent proxy authentication 
    • Credential caching 
    • Multi-realm authentication 
  • Authentication Realms 
    • LDAP authentication 
    • NTLM authentication 
  • Integrated Windows Authentication 
    • Kerberos 
    • Configuring IWA 
  • Understanding Network Agent 
    • Key features 
    • Typical deployment 
    • Advanced deployment 

4. Gün

  • WSGA Management 
    • Planning for Web filtering 
    • How filters and policies work 
    • Delegated administration 
  • Content Scanning 
    • Outbound content scanning 
    • URL link analysis 
    • Scanning exceptions 
    • Web 2.0 reporting 
  • Managing SSL Traffic 
    • Decrypting SSL traffic 
    • SSL Bypass 
    • Configuration 
  • Third-party Integration
    • ICAP, SOCKS, Skype, Google Apps for Business
  • TruHybrid 
    • WSGA deployment options 
    • TruHybrid architecture 
    • Configuring TruHybrid functionality
  • Web DLP
    • Forcepoint Data Loss Prevention 
    • Web DLP deployment and management 
    • Data classification and policies
  • Reporting 
    • Reporting components 
    • SIEM integration 
    • Investigative and presentation 
    • Self-reporting 
    • Real-time monitor