Course 1
Blue Coat Certification Training
Sl. No. | Chapter |
---|---|
Chapter - 1 | Blue Coat Certified PacketShaper Administrator |
Chapter - 1.1 | Blue Coat Family of Products |
Chapter - 1.2 | Blue Coat PacketShaper |
Chapter - 1.3 | PacketShaper Licensing |
Chapter - 1.4 | Initial PacketShaper Configuration |
Chapter - 1.5 | PacketShaper GUI and CLI |
Chapter - 1.6 | Understanding Applications on the Network |
Chapter - 1.7 | Analyzing Applications on the Network |
Chapter - 1.8 | Controlling Applications on the Network |
Chapter - 1.9 | Partitions |
Chapter - 1.10 | Policies |
Chapter - 1.11 | Maintaining PacketShaper |
Chapter - 1.12 | Blue Coat Sky |
Chapter - 2 | Blue Coat Certified PacketShaper Professional |
Chapter - 2.1 | Blue Coat PacketShaper Architecture |
Chapter - 2.2 | Advanced Classification |
Chapter - 2.3 | URL Categorization |
Chapter - 2.4 | Traffic Tree Management |
Chapter - 2.5 | Advanced Bandwidth Management |
Chapter - 2.6 | Understanding Adaptive Response |
Chapter - 2.7 | PacketShaper Reporting Tools |
Chapter - 2.8 | Network Management and Monitoring |
Chapter - 2.9 | Introduction to the Intelligence Center |
Chapter - 2.10 | Introduction to the Policy Center |
Chapter - 3 | Blue Coat Certified WAN Acceleration Administrator |
Chapter - 3.1 | WAN Optimizationjira certification training careerera |
Chapter - 3.2 | WAN Acceleration Deployments |
Chapter - 3.3 | Blue Coat Sky |
Chapter - 3.4 | WCCP Setup |
Chapter - 3.5 | Services |
Chapter - 3.6 | Monitoring Traffic |
Chapter - 3.7 | Configure ADN Roles |
Chapter - 3.8 | Optimizing CIFS |
Chapter - 3.9 | MAPI over ADN |
Chapter - 3.10 | Accelerating Web Traffic |
Chapter - 3.11 | Streaming Media Acceleration |
Chapter - 3.12 | Bandwidth Management |
Chapter - 3.13 | ProxySG Troubleshooting |
Chapter - 3.14 | Configure ADN Roles |
Chapter - 4 | Blue Coat Director |
Chapter - 4.1 | Introduction to Blue Coat Director |
Chapter - 4.2 | Director Architecture |
Chapter - 4.3 | Director Configuration |
Chapter - 4.4 | Administering Director |
Chapter - 4.5 | Adding and Registering Devices |
Chapter - 4.6 | Director Standby |
Chapter - 4.7 | Device Configuration and Management |
Chapter - 4.8 | Content Sync Module Managing Content |
Chapter - 5 | Blue Coat Reporter |
Chapter - 5.1 | Introduction to Blue Coat Reporter |
Chapter - 5.2 | Log Files |
Chapter - 5.3 | Reports |
Chapter - 5.4 | WebAPI |
Chapter - 5.5 | Best Practices |
Chapter - 5.6 | Reporter User Interface |
Chapter - 5.7 | Access Control |
Chapter - 6 | Blue Coat Certified Security Analytics Administrator |
Chapter - 6.1 | Security Analytics Product Introduction |
Chapter - 6.2 | Solution Design |
Chapter - 6.3 | Installation and Setup |
Chapter - 6.4 | Security Analytics User Interface |
Chapter - 6.5 | Reports – What Do They Tell Me? |
Chapter - 6.6 | The Filter Bar |
Chapter - 6.7 | Advanced Filters to Query Report Data |
Chapter - 6.8 | Favourites |
Chapter - 6.9 | File Extraction (Introduction) |
Chapter - 6.10 | Management, Monitoring, and Maintenance |
Chapter - 7 | Blue Coat Certified Security Analytics Professional |
Chapter - 7.1 | Theory of Operation |
Chapter - 7.2 | File Extraction |
Chapter - 7.3 | Data Enrichment |
Chapter - 7.4 | Threat BLADES |
Chapter - 7.5 | Kill Chain Analysis |
Chapter - 7.6 | To Look for Indicators of Compromise (IOCs) |
Chapter - 7.7 | Integration |
Chapter - 7.8 | The Virtual File System (VFS) |
Chapter - 8 | Blue Coat CacheFlow |
Chapter - 8.1 | The CacheFlow Appliance |
Chapter - 8.2 | Planning the Deployment |
Chapter - 8.2 | Access and Initial Setup |
Chapter - 8.3 | Introduction to the User Interface |
Chapter - 8.4 | Caching Architecture |
Chapter - 8.5 | HTTP Proxy |
Chapter - 8.6 | Content Filtering |
Chapter - 8.7 | Access Control Policy |
Chapter - 8.8 | Advanced Deployment Topics |
Chapter - 8.9 | Monitoring and Alerts |
Chapter - 8.10 | SNMP Configuration |
Chapter - 8.11 | Troubleshooting |
Chapter - 9 | Blue Coat Web Application Reverse Proxy |
Chapter - 9.1 | Introduction to Web Application Reverse Proxy |
Chapter - 9.2 | Reverse Proxy Deployments |
Chapter - 9.3 | Caching |
Chapter - 9.4 | Access Controls and Authentication Policies |
Chapter - 9.5 | Reverse Proxy Security Deployment |
Chapter - 10 | Blue Coat Certified ProxySG Administrator |
Chapter - 10.1 | Introduction to ProxySG |
Chapter - 10.2 | ProxySG Security Deployments |
Chapter - 10.3 | ProxySG Initial Security Configuration |
Chapter - 10.4 | ProxySG Management Console |
Chapter - 10.5 | ProxySG Security Licensing |
Chapter - 10.6 | Proxy Services |
Chapter - 10.7 | Hypertext Transfer Protocol |
Chapter - 10.8 | Introduction to Visual Policy Manager |
Chapter - 10.9 | Content Filtering and WebPulse |
Chapter - 10.10 | Managing Downloads |
Chapter - 10.11 | Authenticating users on the ProxySG |
Chapter - 10.12 | Authentication Realms |
Chapter - 10.13 | Authentication with Transparent Proxy |
Chapter - 10.14 | Exceptions and Notifications |
Chapter - 10.15 | Access Logging |
Chapter - 10.16 | Managing SSL Traffic |
Chapter - 10.17 | Basic Troubleshooting |
Chapter - 11 | Blue Coat Certified ProxySG Professional |
Chapter - 11.1 | SGOS Architecture |
Chapter - 11.2 | Caching Architecture |
Chapter - 11.3 | Introduction to CPL |
Chapter - 11.4 | Basic CPL |
Chapter - 11.5 | Intermediate CPL |
Chapter - 11.6 | Policy Tracing |
Chapter - 11.7 | CPL Best Practices |
Chapter - 11.8 | Advanced Authentication Concepts |
Chapter - 11.9 | Guest Authentication and Error Handling |
Chapter - 11.10 | Authentication with BCAAA |
Chapter - 11.11 | Kerberos Authentication |
Chapter - 11.12 | Authentication Troubleshooting |
Chapter - 11.13 | Forwarding |
Chapter - 11.14 | SSL Advanced Topics |
Chapter - 11.15 | ProxySG Performance Monitoring |
Chapter - 11.16 | ProxySG Integration |