Our Courses

Contact Us

+1-800-281-9192 Need Help? Call Us

Enquire Now

+1
4 + 4 =

Course Description:

Blue Coat is a monitor in enterprise security, offering on-premise, hybrid and cloud-based solutions for defending web connectivity, opposing advanced threats, and responding to security openings. Blue Coat is the worldwide market leader safeguarding linkage to the web and sums nearly 80% of the Global Fortune 500 as its patrons. Blue Coat was learned by Bain Capital in March of 2015.

Blue Coat has an extended past of securing organizations, their data, and their workforces. Careerera provides the superlative Blue Coat certification training by greatly skilled trainers. It will let you master all the essentials of Blue Coat from cut to advanced level techniques. You will also get a chance to work on two actual assignments during training which will support you in clearing the Blue Coat Certification Exam.

Audience Profile:

The following job persons will benefit from this training course:

    • Network experts
    • Security professionals.
    • IT Professionals
    • End Users
    • Aspirants targeting for a career in the likely field.

Course Essentials:

Practice in the following facets is essential to take up this training:

      • Working with ProxySG administration.
      • Understanding of the concepts of networking, security, and authentication.

Course Objectives:

After the accomplishment of Blue Coat training at Careerera, you will be capable of:

        • Know the ProxySG Architecture
        • Administer protect Web Gateway Proxy SG tasks
        • Acquire how to make the code in Content Policy language
        • Implement progressive authentication dominions deployments and troubleshoot them
        • Implement advanced tasks of SSL Proxy
        • Monitor and Analyze ProxySG performance
        • Assimilate ProxySG with other Blue Coat security products

Course Highlights:

        • 35 Hours of Instructor-Led online sessions Blue Coat Training
        • Lifetime Access to Recorded Sessions
        • Real World use cases and Scenarios
        • Practical Approach
        • 24*7 Support
        • Expert & Certified Trainers
        • Value advice, tips & practices during sessions gear you well for the examination.
        • 1-day money-back assurance without any query.

Curriculum

  • Sl. No.
  • Chapter
  • Chapter - 1
  • Blue Coat Certified PacketShaper Administrator
  • Chapter - 1.1
  • Blue Coat Family of Products
  • Chapter - 1.2
  • Blue Coat PacketShaper
  • Chapter - 1.3
  • PacketShaper Licensing
  • Chapter - 1.4
  • Initial PacketShaper Configuration
  • Chapter - 1.5
  • PacketShaper GUI and CLI
  • Chapter - 1.6
  • Understanding Applications on the Network
  • Chapter - 1.7
  • Analyzing Applications on the Network
  • Chapter - 1.8
  • Controlling Applications on the Network
  • Chapter - 1.9
  • Partitions
  • Chapter - 1.10
  • Policies
  • Chapter - 1.11
  • Maintaining PacketShaper
  • Chapter - 1.12
  • Blue Coat Sky
  • Chapter - 2
  • Blue Coat Certified PacketShaper Professional
  • Chapter - 2.1
  • Blue Coat PacketShaper Architecture
  • Chapter - 2.2
  • Advanced Classification
  • Chapter - 2.3
  • URL Categorization
  • Chapter - 2.4
  • Traffic Tree Management
  • Chapter - 2.5
  • Advanced Bandwidth Management
  • Chapter - 2.6
  • Understanding Adaptive Response
  • Chapter - 2.7
  • PacketShaper Reporting Tools
  • Chapter - 2.8
  • Network Management and Monitoring
  • Chapter - 2.9
  • Introduction to the Intelligence Center
  • Chapter - 2.10
  • Introduction to the Policy Center
  • Chapter - 3
  • Blue Coat Certified WAN Acceleration Administrator
  • Chapter - 3.1
  • WAN Optimizationjira certification training careerera
  • Chapter - 3.2
  • WAN Acceleration Deployments
  • Chapter - 3.3
  • Blue Coat Sky
  • Chapter - 3.4
  • WCCP Setup
  • Chapter - 3.5
  • Services
  • Chapter - 3.6
  • Monitoring Traffic
  • Chapter - 3.7
  • Configure ADN Roles
  • Chapter - 3.8
  • Optimizing CIFS
  • Chapter - 3.9
  • MAPI over ADN
  • Chapter - 3.10
  • Accelerating Web Traffic
  • Chapter - 3.11
  • Streaming Media Acceleration
  • Chapter - 3.12
  • Bandwidth Management
  • Chapter - 3.13
  • ProxySG Troubleshooting
  • Chapter - 3.14
  • Configure ADN Roles
  • Chapter - 4
  • Blue Coat Director
  • Chapter - 4.1
  • Introduction to Blue Coat Director
  • Chapter - 4.2
  • Director Architecture
  • Chapter - 4.3
  • Director Configuration
  • Chapter - 4.4
  • Administering Director
  • Chapter - 4.5
  • Adding and Registering Devices
  • Chapter - 4.6
  • Director Standby
  • Chapter - 4.7
  • Device Configuration and Management
  • Chapter - 4.8
  • Content Sync Module Managing Content
  • Chapter - 5
  • Blue Coat Reporter
  • Chapter - 5.1
  • Introduction to Blue Coat Reporter
  • Chapter - 5.2
  • Log Files
  • Chapter - 5.3
  • Reports
  • Chapter - 5.4
  • WebAPI
  • Chapter - 5.5
  • Best Practices
  • Chapter - 5.6
  • Reporter User Interface
  • Chapter - 5.7
  • Access Control
  • Chapter - 6
  • Blue Coat Certified Security Analytics Administrator
  • Chapter - 6.1
  • Security Analytics Product Introduction
  • Chapter - 6.2
  • Solution Design
  • Chapter - 6.3
  • Installation and Setup
  • Chapter - 6.4
  • Security Analytics User Interface
  • Chapter - 6.5
  • Reports – What Do They Tell Me?
  • Chapter - 6.6
  • The Filter Bar
  • Chapter - 6.7
  • Advanced Filters to Query Report Data
  • Chapter - 6.8
  • Favourites
  • Chapter - 6.9
  • File Extraction (Introduction)
  • Chapter - 6.10
  • Management, Monitoring, and Maintenance
  • Chapter - 7
  • Blue Coat Certified Security Analytics Professional
  • Chapter - 7.1
  • Theory of Operation
  • Chapter - 7.2
  • File Extraction
  • Chapter - 7.3
  • Data Enrichment
  • Chapter - 7.4
  • Threat BLADES
  • Chapter - 7.5
  • Kill Chain Analysis
  • Chapter - 7.6
  • To Look for Indicators of Compromise (IOCs)
  • Chapter - 7.7
  • Integration
  • Chapter - 7.8
  • The Virtual File System (VFS)
  • Chapter - 8
  • Blue Coat CacheFlow
  • Chapter - 8.1
  • The CacheFlow Appliance
  • Chapter - 8.2
  • Planning the Deployment
  • Chapter - 8.2
  • Access and Initial Setup
  • Chapter - 8.3
  • Introduction to the User Interface
  • Chapter - 8.4
  • Caching Architecture
  • Chapter - 8.5
  • HTTP Proxy
  • Chapter - 8.6
  • Content Filtering
  • Chapter - 8.7
  • Access Control Policy
  • Chapter - 8.8
  • Advanced Deployment Topics
  • Chapter - 8.9
  • Monitoring and Alerts
  • Chapter - 8.10
  • SNMP Configuration
  • Chapter - 8.11
  • Troubleshooting
  • Chapter - 9
  • Blue Coat Web Application Reverse Proxy
  • Chapter - 9.1
  • Introduction to Web Application Reverse Proxy
  • Chapter - 9.2
  • Reverse Proxy Deployments
  • Chapter - 9.3
  • Caching
  • Chapter - 9.4
  • Access Controls and Authentication Policies
  • Chapter - 9.5
  • Reverse Proxy Security Deployment
  • Chapter - 10
  • Blue Coat Certified ProxySG Administrator
  • Chapter - 10.1
  • Introduction to ProxySG
  • Chapter - 10.2
  • ProxySG Security Deployments
  • Chapter - 10.3
  • ProxySG Initial Security Configuration
  • Chapter - 10.4
  • ProxySG Management Console
  • Chapter - 10.5
  • ProxySG Security Licensing
  • Chapter - 10.6
  • Proxy Services
  • Chapter - 10.7
  • Hypertext Transfer Protocol
  • Chapter - 10.8
  • Introduction to Visual Policy Manager
  • Chapter - 10.9
  • Content Filtering and WebPulse
  • Chapter - 10.10
  • Managing Downloads
  • Chapter - 10.11
  • Authenticating users on the ProxySG
  • Chapter - 10.12
  • Authentication Realms
  • Chapter - 10.13
  • Authentication with Transparent Proxy
  • Chapter - 10.14
  • Exceptions and Notifications
  • Chapter - 10.15
  • Access Logging
  • Chapter - 10.16
  • Managing SSL Traffic
  • Chapter - 10.17
  • Basic Troubleshooting
  • Chapter - 11
  • Blue Coat Certified ProxySG Professional
  • Chapter - 11.1
  • SGOS Architecture
  • Chapter - 11.2
  • Caching Architecture
  • Chapter - 11.3
  • Introduction to CPL
  • Chapter - 11.4
  • Basic CPL
  • Chapter - 11.5
  • Intermediate CPL
  • Chapter - 11.6
  • Policy Tracing
  • Chapter - 11.7
  • CPL Best Practices
  • Chapter - 11.8
  • Advanced Authentication Concepts
  • Chapter - 11.9
  • Guest Authentication and Error Handling
  • Chapter - 11.10
  • Authentication with BCAAA
  • Chapter - 11.11
  • Kerberos Authentication
  • Chapter - 11.12
  • Authentication Troubleshooting
  • Chapter - 11.13
  • Forwarding
  • Chapter - 11.14
  • SSL Advanced Topics
  • Chapter - 11.15
  • ProxySG Performance Monitoring
  • Chapter - 11.16
  • ProxySG Integration

FAQs