Blue Coat Certification Training

Learn the Blue Coat Certification Training course online with the most top-class faculty in the world. Kickstart your career with quality education.

Courses

Contact Us

+1-888-259-1905 Need Help? Call Us

Enquire Now

+1
5 + 7 =

Course Description

Curriculum

  • Sl. No.
  • Chapter
  • Chapter - 1
  • Blue Coat Certified PacketShaper Administrator
  • Chapter - 1.1
  • Blue Coat Family of Products
  • Chapter - 1.2
  • Blue Coat PacketShaper
  • Chapter - 1.3
  • PacketShaper Licensing
  • Chapter - 1.4
  • Initial PacketShaper Configuration
  • Chapter - 1.5
  • PacketShaper GUI and CLI
  • Chapter - 1.6
  • Understanding Applications on the Network
  • Chapter - 1.7
  • Analyzing Applications on the Network
  • Chapter - 1.8
  • Controlling Applications on the Network
  • Chapter - 1.9
  • Partitions
  • Chapter - 1.10
  • Policies
  • Chapter - 1.11
  • Maintaining PacketShaper
  • Chapter - 1.12
  • Blue Coat Sky
  • Chapter - 2
  • Blue Coat Certified PacketShaper Professional
  • Chapter - 2.1
  • Blue Coat PacketShaper Architecture
  • Chapter - 2.2
  • Advanced Classification
  • Chapter - 2.3
  • URL Categorization
  • Chapter - 2.4
  • Traffic Tree Management
  • Chapter - 2.5
  • Advanced Bandwidth Management
  • Chapter - 2.6
  • Understanding Adaptive Response
  • Chapter - 2.7
  • PacketShaper Reporting Tools
  • Chapter - 2.8
  • Network Management and Monitoring
  • Chapter - 2.9
  • Introduction to the Intelligence Center
  • Chapter - 2.10
  • Introduction to the Policy Center
  • Chapter - 3
  • Blue Coat Certified WAN Acceleration Administrator
  • Chapter - 3.1
  • WAN Optimizationjira certification training careerera
  • Chapter - 3.2
  • WAN Acceleration Deployments
  • Chapter - 3.3
  • Blue Coat Sky
  • Chapter - 3.4
  • WCCP Setup
  • Chapter - 3.5
  • Services
  • Chapter - 3.6
  • Monitoring Traffic
  • Chapter - 3.7
  • Configure ADN Roles
  • Chapter - 3.8
  • Optimizing CIFS
  • Chapter - 3.9
  • MAPI over ADN
  • Chapter - 3.10
  • Accelerating Web Traffic
  • Chapter - 3.11
  • Streaming Media Acceleration
  • Chapter - 3.12
  • Bandwidth Management
  • Chapter - 3.13
  • ProxySG Troubleshooting
  • Chapter - 3.14
  • Configure ADN Roles
  • Chapter - 4
  • Blue Coat Director
  • Chapter - 4.1
  • Introduction to Blue Coat Director
  • Chapter - 4.2
  • Director Architecture
  • Chapter - 4.3
  • Director Configuration
  • Chapter - 4.4
  • Administering Director
  • Chapter - 4.5
  • Adding and Registering Devices
  • Chapter - 4.6
  • Director Standby
  • Chapter - 4.7
  • Device Configuration and Management
  • Chapter - 4.8
  • Content Sync Module Managing Content
  • Chapter - 5
  • Blue Coat Reporter
  • Chapter - 5.1
  • Introduction to Blue Coat Reporter
  • Chapter - 5.2
  • Log Files
  • Chapter - 5.3
  • Reports
  • Chapter - 5.4
  • WebAPI
  • Chapter - 5.5
  • Best Practices
  • Chapter - 5.6
  • Reporter User Interface
  • Chapter - 5.7
  • Access Control
  • Chapter - 6
  • Blue Coat Certified Security Analytics Administrator
  • Chapter - 6.1
  • Security Analytics Product Introduction
  • Chapter - 6.2
  • Solution Design
  • Chapter - 6.3
  • Installation and Setup
  • Chapter - 6.4
  • Security Analytics User Interface
  • Chapter - 6.5
  • Reports – What Do They Tell Me?
  • Chapter - 6.6
  • The Filter Bar
  • Chapter - 6.7
  • Advanced Filters to Query Report Data
  • Chapter - 6.8
  • Favourites
  • Chapter - 6.9
  • File Extraction (Introduction)
  • Chapter - 6.10
  • Management, Monitoring, and Maintenance
  • Chapter - 7
  • Blue Coat Certified Security Analytics Professional
  • Chapter - 7.1
  • Theory of Operation
  • Chapter - 7.2
  • File Extraction
  • Chapter - 7.3
  • Data Enrichment
  • Chapter - 7.4
  • Threat BLADES
  • Chapter - 7.5
  • Kill Chain Analysis
  • Chapter - 7.6
  • To Look for Indicators of Compromise (IOCs)
  • Chapter - 7.7
  • Integration
  • Chapter - 7.8
  • The Virtual File System (VFS)
  • Chapter - 8
  • Blue Coat CacheFlow
  • Chapter - 8.1
  • The CacheFlow Appliance
  • Chapter - 8.2
  • Planning the Deployment
  • Chapter - 8.2
  • Access and Initial Setup
  • Chapter - 8.3
  • Introduction to the User Interface
  • Chapter - 8.4
  • Caching Architecture
  • Chapter - 8.5
  • HTTP Proxy
  • Chapter - 8.6
  • Content Filtering
  • Chapter - 8.7
  • Access Control Policy
  • Chapter - 8.8
  • Advanced Deployment Topics
  • Chapter - 8.9
  • Monitoring and Alerts
  • Chapter - 8.10
  • SNMP Configuration
  • Chapter - 8.11
  • Troubleshooting
  • Chapter - 9
  • Blue Coat Web Application Reverse Proxy
  • Chapter - 9.1
  • Introduction to Web Application Reverse Proxy
  • Chapter - 9.2
  • Reverse Proxy Deployments
  • Chapter - 9.3
  • Caching
  • Chapter - 9.4
  • Access Controls and Authentication Policies
  • Chapter - 9.5
  • Reverse Proxy Security Deployment
  • Chapter - 10
  • Blue Coat Certified ProxySG Administrator
  • Chapter - 10.1
  • Introduction to ProxySG
  • Chapter - 10.2
  • ProxySG Security Deployments
  • Chapter - 10.3
  • ProxySG Initial Security Configuration
  • Chapter - 10.4
  • ProxySG Management Console
  • Chapter - 10.5
  • ProxySG Security Licensing
  • Chapter - 10.6
  • Proxy Services
  • Chapter - 10.7
  • Hypertext Transfer Protocol
  • Chapter - 10.8
  • Introduction to Visual Policy Manager
  • Chapter - 10.9
  • Content Filtering and WebPulse
  • Chapter - 10.10
  • Managing Downloads
  • Chapter - 10.11
  • Authenticating users on the ProxySG
  • Chapter - 10.12
  • Authentication Realms
  • Chapter - 10.13
  • Authentication with Transparent Proxy
  • Chapter - 10.14
  • Exceptions and Notifications
  • Chapter - 10.15
  • Access Logging
  • Chapter - 10.16
  • Managing SSL Traffic
  • Chapter - 10.17
  • Basic Troubleshooting
  • Chapter - 11
  • Blue Coat Certified ProxySG Professional
  • Chapter - 11.1
  • SGOS Architecture
  • Chapter - 11.2
  • Caching Architecture
  • Chapter - 11.3
  • Introduction to CPL
  • Chapter - 11.4
  • Basic CPL
  • Chapter - 11.5
  • Intermediate CPL
  • Chapter - 11.6
  • Policy Tracing
  • Chapter - 11.7
  • CPL Best Practices
  • Chapter - 11.8
  • Advanced Authentication Concepts
  • Chapter - 11.9
  • Guest Authentication and Error Handling
  • Chapter - 11.10
  • Authentication with BCAAA
  • Chapter - 11.11
  • Kerberos Authentication
  • Chapter - 11.12
  • Authentication Troubleshooting
  • Chapter - 11.13
  • Forwarding
  • Chapter - 11.14
  • SSL Advanced Topics
  • Chapter - 11.15
  • ProxySG Performance Monitoring
  • Chapter - 11.16
  • ProxySG Integration