Chapter 1 : Proxy architecture
Chapter 2 : Identity and access context
Chapter 3 : Policy hierarchy
Course
No LMS account? Contact CCN office to get onboarded.
Average -
4.4★Deepak V
1 month ago
Useful real-world web security labs
Strong practical training for web filtering and inspection policy design.
Kiran P
2 weeks ago
Excellent policy tuning guidance
The course gave clarity on reducing false positives while maintaining strong security controls.
Yes, HTTPS decryption architecture and policy controls are covered in practical labs.
Yes, monitoring, alert triage, and threat response are integrated into the course flow.
Yes, you build layered policies with validation and tuning exercises.
Yes, completion certificate is issued after final evaluation.
Fill out the form below and our counsellor will get in touch with you shortly.
🔒 Your information is safe with us. No spam, ever.
