Course Overview
This course teaches students techniques, tools, and recommended practices that can be used to run a business process, create a business process using the Graphical Process Modeler, explain how to create a service configuration, explain how to track an executable business process, and discuss the basics of Sterling B2B Integrator through a combination of lecture and hands-on labs.
Objectives
After completing this course, students should be able to:
- Provide an overview of Sterling Secure Proxy.
- Complete the installation and configuration of Sterling Secure Proxy.
- Perform HTTP Reverse proxy configuration.
- Perform FTP Reverse proxy configuration.
- Perform Connect: Direct Reverse proxy configuration.
- Set up Single Sign-On for Sterling Secure Proxy Server, Sterling External Authentication
- Server and Sterling File Gateway.
Audience
The intended audience for this course is:
- Enterprise Network Architects
- Network Architect or Engineers
- Information Security Specialists
PreRequisites
Basic understanding of networking and security concepts such as:
- OSI Reference Model
- IP, UDP, TCP
- Directory Service
- Common Network Components
- Address Structure
- Common Exploits and Attacks
- TLS/SSL Implementations
Additional knowledge of IBM Sterling B2B Integrator or IBM Sterling File Gateway is helpful. If you are using Sterling Secure Proxy for IBM Sterling Connect: Direct, a review of Connect: Direct concepts also is helpful.
Topics
The following topics will be covered during this course:
- UNIT 1. INTRODUCTION AND INSTALLATION
- UNIT 2. REVERSE PROXY CONFIGURATION
- UNIT 3. SINGLE SIGN ON CONFIGURATION
- Course Wrap-up
For a Group Training Contact Us
For further details and inquiries about training programs, please get in touch with us.