Cisco Training Courses

Cisco Training Courses

Insoft has been serving IT industry with authorized Cisco courses training, since 2010. Find all the relevant information on Cisco training on this page.

View More

Cisco Certifications

Experience a blended learning approach that combines the best of instructor-led training and self-paced e-learning to help you prepare for your certification exam.

View More

Cisco Learning Credits

Cisco Learning Credits (CLCs) are prepaid training vouchers redeemed directly with Cisco that make planning for your success easier when purchasing Cisco products and services.

Have CLCs and want to redeem them?

Cisco Continuing Education

The Cisco Continuing Education Program offers all active certification holders flexible options to recertify by completing a variety of eligible training items.

View More

Cisco U

Cisco U. is customized to achieve your learning needs as this provides learning paths that includes wide range of topics, including CCNA, Cloud and Network Automation Essentials.

Browse Catalogue

Cisco Business Enablement

The Cisco Business Enablement Partner Program focuses on sharpening the business skills of Cisco Channel Partners and customers.

View More

Fortinet Technical Certifications

Insoft Services´ training capabilities rely on the excellence of our exclusive Fortinet Certified Trainers (FCT). We are dedicated to providing high-quality training to Fortinet Customers and Partners.

View More

Fortinet Technical Courses

Insoft is recognised as Fortinet Authorized Training Center in selected locations across EMEA.

View More

ATC Status

Check our ATC Status across selected countries in Europe.

View More

Fortinet Services Packages

Insoft Services has developed a specific solution to streamline and simplify the process of installing or migrating to Fortinet Products.

Browse Packages

Prepforce Bootcamp

The only comprehensive source available today to prepare for Fortinet NSE 8 certification globally.

View More

Microsoft Training

Insoft Services provides Microsoft training in EMEAR. We provide Microsoft technical training and certification courses that are led by world-class instructors.

View More

Technical Training

The evolution of Extreme Networks Technical Training provides a comprehensive progressive pathway from Associate to Professional accreditation.

View More

ATP Accreditation

As an authorised training partner (ATP), Insoft Services ensures that you receive the highest standards of education available.

View More

What we do

Through our global presence and partner ecosystem, we provide strategic IT consulting services to align IT services with customers' business goals.

View More

 

We are pleased to launch pre-scoped Enterprise Networking Consulting Packages, our ready-made solutions, tailored to ensure efficiency and cost containment.

 

View More

 

We specialize in the deployment of vendor-specific automation tools as well as open-source and vendor-independent solutions, that can be tuned in accordance with the business needs of a specific organization.

 

View More

 

We provide comprehensive IoT consultancy, deployment and support solutions for businesses that want to launch or improve their use of connected technologies.

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

 

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

 

View More
Cisco Training Courses

 

We provide the highest level of expertise on Cisco consultancy services, that target audits of your current network and implementing updates for improved operational performance, secure data and compliant systems.

View More

 

We provide the highest level of expertise on Fortinet consultancy services that target audits of your current network and implementing updates for improved operational performance, secure data and compliant systems.

View More

 

Our team can help enterprises, get the most value from Extreme products and services following our predefined value-added packages or custom ones that fits business needs.

 

View More

 

TXOne Networks provides cybersecurity solutions that ensure the reliability and safety of ICS and OT environments through the OT zero trust methodology protecting assets for their entire life cycle.

 

View More

About Us

Our training portfolio includes a wide range of IT training from IP providers, including Cisco, Extreme Networks, Fortinet, Microsoft, to name a few, in EMEA.

View More

Forcepoint Web Security

Contact Us

We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.

Data Protection & Privacy

I consent to receive emails and/or calls from Insoft Services related to the Insoft Services´ products and services.
I acknowledge that my data will be collected and processed as described in the Insoft Services privacy policy.

Close

Forcepoint Web Security

Enroll Now
Duration
3 Days
Delivery
(Online and onsite)
Price
Price Upon Request

The Forcepoint Web Security course is a three-day hands-on classroom training, where you will gain an understanding of the key core competencies and skills needed to practice as a system administrator who manages Forcepoint Web Security. The core competencies include system architecture, policy creation, incident management, and health assessment of the Forcepoint Web Security system. You will develop skills in web policy creation, reporting, and incident management.

  • Understand the Forcepoint Web Security components and architecture
  • Articulate common deployment topologies
  • Access anduse Security Manager, including other available user interfaces
  • Execute updates and upgrades on Forcepoint Web Security
  • Understand delegated administration
  • Comprehend and perform policy and filter basics
  • Create effective web policies
  • Understand exception management
  • Recognize different user management methods
  • Configure user identification and policy enforcement
  • Create notifications and alerts
  • Understand report types and utilization
  • Create various reports
  • Understand system health alerts and usage monitoring
  • Understand system disaster recovery procedures
  • Learn how to respond to incidents

MODULE 1: UNDERSTANDING AND GETTING STARTED WITH WEB SECURITY

  • Articulate the key features and functions of Web Security
  • Describe features, components, and key integrations that enable Web Security functionalities
  • Compare the advantages and disadvantages of various deployment methodologies
  • Articulate the licensing structure and how and when to enter the key within the Content Gateway
  • Distinguish the key settings in Security Manager, Content Gateway Manager, Forcepoint Security Appliance Manager, and other available user interfaces
  • Describe the differences between Super Administrators and delegated administrators

MODULE 2: POLICY ENFORCEMENT AND FILTERING

  • Describe the full scope and workflow of policy planning
  • Identify standard and custom policies (and related filters) based on your organizations needs
  • Distinguish the key settingsin Security Manager
  • Compare user identification and proxy authentication
  • Explain how Web Security analyses user requests and enforces policies

MODULE 3: MONITORING WEB SECURITY ACTIVITIES

  • Itemize the available notifications and alerts
  • Explain the reporting flow
  • Describe the various reporting options to gain important insights about your environment
  • Identify suspicious network activity using threats dashboard
  • Compare the available reporting tools, including legacy and Report Center features

MODULE 4: DISASTER RESPONSE AND RECOVERY

  • Explain how Web Security responds to incidents
  • Compare and contrast the available update options
  • Distinguish the guidelines related to incident management and disaster recovery
  • Identify system health monitoring capabilities
  • Complete various tasks that will help maintain a healthy Web Security environment•Define the best practice procedures for disaster recovery
  • System Administrators, Network Security Administrators, IT staff, consultants
  • Forcepoint channel partners, integrators, and planners who help customers with Forcepoint Web Security implementations
  • General understanding of system administration and Internet services
  • Basic knowledge of networking and computer security concepts
  • A computer that meets the requirements noted at the end of this document
The Forcepoint Web Security course is a three-day hands-on classroom training, where you will gain an understanding of the key core competencies and skills needed to practice as a system administrator who manages Forcepoint Web Security. The core competencies include system architecture, policy creation, incident management, and health assessment of the Forcepoint Web Security system. You will develop skills in web policy creation, reporting, and incident management.
  • Understand the Forcepoint Web Security components and architecture
  • Articulate common deployment topologies
  • Access anduse Security Manager, including other available user interfaces
  • Execute updates and upgrades on Forcepoint Web Security
  • Understand delegated administration
  • Comprehend and perform policy and filter basics
  • Create effective web policies
  • Understand exception management
  • Recognize different user management methods
  • Configure user identification and policy enforcement
  • Create notifications and alerts
  • Understand report types and utilization
  • Create various reports
  • Understand system health alerts and usage monitoring
  • Understand system disaster recovery procedures
  • Learn how to respond to incidents

MODULE 1: UNDERSTANDING AND GETTING STARTED WITH WEB SECURITY

  • Articulate the key features and functions of Web Security
  • Describe features, components, and key integrations that enable Web Security functionalities
  • Compare the advantages and disadvantages of various deployment methodologies
  • Articulate the licensing structure and how and when to enter the key within the Content Gateway
  • Distinguish the key settings in Security Manager, Content Gateway Manager, Forcepoint Security Appliance Manager, and other available user interfaces
  • Describe the differences between Super Administrators and delegated administrators

MODULE 2: POLICY ENFORCEMENT AND FILTERING

  • Describe the full scope and workflow of policy planning
  • Identify standard and custom policies (and related filters) based on your organizations needs
  • Distinguish the key settingsin Security Manager
  • Compare user identification and proxy authentication
  • Explain how Web Security analyses user requests and enforces policies

MODULE 3: MONITORING WEB SECURITY ACTIVITIES

  • Itemize the available notifications and alerts
  • Explain the reporting flow
  • Describe the various reporting options to gain important insights about your environment
  • Identify suspicious network activity using threats dashboard
  • Compare the available reporting tools, including legacy and Report Center features

MODULE 4: DISASTER RESPONSE AND RECOVERY

  • Explain how Web Security responds to incidents
  • Compare and contrast the available update options
  • Distinguish the guidelines related to incident management and disaster recovery
  • Identify system health monitoring capabilities
  • Complete various tasks that will help maintain a healthy Web Security environment•Define the best practice procedures for disaster recovery
  • System Administrators, Network Security Administrators, IT staff, consultants
  • Forcepoint channel partners, integrators, and planners who help customers with Forcepoint Web Security implementations
  • General understanding of system administration and Internet services
  • Basic knowledge of networking and computer security concepts
  • A computer that meets the requirements noted at the end of this document