The Forcepoint Web Security course is a three-day hands-on classroom training, where you will gain an understanding of the key core competencies and skills needed to practice as a system administrator who manages Forcepoint Web Security. The core competencies include system architecture, policy creation, incident management, and health assessment of the Forcepoint Web Security system. You will develop skills in web policy creation, reporting, and incident management.
Contact Us
We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.
Duration
3 Days
3 Days
Delivery
(Online and onsite)
(Online and onsite)
Price
Price Upon Request
Price Upon Request
- Understand the Forcepoint Web Security components and architecture
- Articulate common deployment topologies
- Access anduse Security Manager, including other available user interfaces
- Execute updates and upgrades on Forcepoint Web Security
- Understand delegated administration
- Comprehend and perform policy and filter basics
- Create effective web policies
- Understand exception management
- Recognize different user management methods
- Configure user identification and policy enforcement
- Create notifications and alerts
- Understand report types and utilization
- Create various reports
- Understand system health alerts and usage monitoring
- Understand system disaster recovery procedures
- Learn how to respond to incidents
MODULE 1: UNDERSTANDING AND GETTING STARTED WITH WEB SECURITY
- Articulate the key features and functions of Web Security
- Describe features, components, and key integrations that enable Web Security functionalities
- Compare the advantages and disadvantages of various deployment methodologies
- Articulate the licensing structure and how and when to enter the key within the Content Gateway
- Distinguish the key settings in Security Manager, Content Gateway Manager, Forcepoint Security Appliance Manager, and other available user interfaces
- Describe the differences between Super Administrators and delegated administrators
MODULE 2: POLICY ENFORCEMENT AND FILTERING
- Describe the full scope and workflow of policy planning
- Identify standard and custom policies (and related filters) based on your organizations needs
- Distinguish the key settingsin Security Manager
- Compare user identification and proxy authentication
- Explain how Web Security analyses user requests and enforces policies
MODULE 3: MONITORING WEB SECURITY ACTIVITIES
- Itemize the available notifications and alerts
- Explain the reporting flow
- Describe the various reporting options to gain important insights about your environment
- Identify suspicious network activity using threats dashboard
- Compare the available reporting tools, including legacy and Report Center features
MODULE 4: DISASTER RESPONSE AND RECOVERY
- Explain how Web Security responds to incidents
- Compare and contrast the available update options
- Distinguish the guidelines related to incident management and disaster recovery
- Identify system health monitoring capabilities
- Complete various tasks that will help maintain a healthy Web Security environment•Define the best practice procedures for disaster recovery
- System Administrators, Network Security Administrators, IT staff, consultants
- Forcepoint channel partners, integrators, and planners who help customers with Forcepoint Web Security implementations
- General understanding of system administration and Internet services
- Basic knowledge of networking and computer security concepts
- A computer that meets the requirements noted at the end of this document
The Forcepoint Web Security course is a three-day hands-on classroom training, where you will gain an understanding of the key core competencies and skills needed to practice as a system administrator who manages Forcepoint Web Security. The core competencies include system architecture, policy creation, incident management, and health assessment of the Forcepoint Web Security system. You will develop skills in web policy creation, reporting, and incident management.
- Understand the Forcepoint Web Security components and architecture
- Articulate common deployment topologies
- Access anduse Security Manager, including other available user interfaces
- Execute updates and upgrades on Forcepoint Web Security
- Understand delegated administration
- Comprehend and perform policy and filter basics
- Create effective web policies
- Understand exception management
- Recognize different user management methods
- Configure user identification and policy enforcement
- Create notifications and alerts
- Understand report types and utilization
- Create various reports
- Understand system health alerts and usage monitoring
- Understand system disaster recovery procedures
- Learn how to respond to incidents
MODULE 1: UNDERSTANDING AND GETTING STARTED WITH WEB SECURITY
- Articulate the key features and functions of Web Security
- Describe features, components, and key integrations that enable Web Security functionalities
- Compare the advantages and disadvantages of various deployment methodologies
- Articulate the licensing structure and how and when to enter the key within the Content Gateway
- Distinguish the key settings in Security Manager, Content Gateway Manager, Forcepoint Security Appliance Manager, and other available user interfaces
- Describe the differences between Super Administrators and delegated administrators
MODULE 2: POLICY ENFORCEMENT AND FILTERING
- Describe the full scope and workflow of policy planning
- Identify standard and custom policies (and related filters) based on your organizations needs
- Distinguish the key settingsin Security Manager
- Compare user identification and proxy authentication
- Explain how Web Security analyses user requests and enforces policies
MODULE 3: MONITORING WEB SECURITY ACTIVITIES
- Itemize the available notifications and alerts
- Explain the reporting flow
- Describe the various reporting options to gain important insights about your environment
- Identify suspicious network activity using threats dashboard
- Compare the available reporting tools, including legacy and Report Center features
MODULE 4: DISASTER RESPONSE AND RECOVERY
- Explain how Web Security responds to incidents
- Compare and contrast the available update options
- Distinguish the guidelines related to incident management and disaster recovery
- Identify system health monitoring capabilities
- Complete various tasks that will help maintain a healthy Web Security environment•Define the best practice procedures for disaster recovery
- System Administrators, Network Security Administrators, IT staff, consultants
- Forcepoint channel partners, integrators, and planners who help customers with Forcepoint Web Security implementations
- General understanding of system administration and Internet services
- Basic knowledge of networking and computer security concepts
- A computer that meets the requirements noted at the end of this document
- ` Date on Request