See how Insoft Services is responding to COVID-19

Forcepoint Web Security

X

Contact Us

We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.

Subscribe

I'd like to receive emails with the latest updates and promotions from Insoft.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.


Upcoming Courses


Dec 7 - Dec 9, 2020
09:00 - 17:00 (CEST)
Online

Forcepoint Web Security
3 days  (Instructor Led Online)  |  Web Security

Course Details

The Forcepoint Web Security course is a three-day hands-on classroom training, where you will gain an understanding of the key core competencies and skills needed to practice as a system administrator who manages Forcepoint Web Security. The core competencies include system architecture, policy creation, incident management, and health assessment of the Forcepoint Web Security system. You will develop skills in web policy creation, reporting, and incident management.

 

See other Forcepoint courses

Objectives

  • Understand the Forcepoint Web Security components and architecture
  • Articulate common deployment topologies
  • Access anduse Security Manager, including other available user interfaces
  • Execute updates and upgrades on Forcepoint Web Security
  • Understand delegated administration
  • Comprehend and perform policy and filter basics
  • Create effective web policies
  • Understand exception management
  • Recognize different user management methods
  • Configure user identification and policy enforcement
  • Create notifications and alerts
  • Understand report types and utilization
  • Create various reports
  • Understand system health alerts and usage monitoring
  • Understand system disaster recovery procedures
  • Learn how to respond to incidents

Outline

MODULE 1: UNDERSTANDING AND GETTING STARTED WITH WEB SECURITY

  • Articulate the key features and functions of Web Security
  • Describe features, components, and key integrations that enable Web Security functionalities
  • Compare the advantages and disadvantages of various deployment methodologies
  • Articulate the licensing structure and how and when to enter the key within the Content Gateway
  • Distinguish the key settings in Security Manager, Content Gateway Manager, Forcepoint Security Appliance Manager, and other available user interfaces
  • Describe the differences between Super Administrators and delegated administrators

MODULE 2: POLICY ENFORCEMENT AND FILTERING

  • Describe the full scope and workflow of policy planning
  • Identify standard and custom policies (and related filters) based on your organizations needs
  • Distinguish the key settingsin Security Manager
  • Compare user identification and proxy authentication
  • Explain how Web Security analyses user requests and enforces policies

MODULE 3: MONITORING WEB SECURITY ACTIVITIES

  • Itemize the available notifications and alerts
  • Explain the reporting flow
  • Describe the various reporting options to gain important insights about your environment
  • Identify suspicious network activity using threats dashboard
  • Compare the available reporting tools, including legacy and Report Center features

MODULE 4: DISASTER RESPONSE AND RECOVERY

  • Explain how Web Security responds to incidents
  • Compare and contrast the available update options
  • Distinguish the guidelines related to incident management and disaster recovery
  • Identify system health monitoring capabilities
  • Complete various tasks that will help maintain a healthy Web Security environment•Define the best practice procedures for disaster recovery

Target Audience

  • System Administrators, Network Security Administrators, IT staff, consultants
  • Forcepoint channel partners, integrators, and planners who help customers with Forcepoint Web Security implementations

Prerequisites

  • General understanding of system administration and Internet services
  • Basic knowledge of networking and computer security concepts
  • A computer that meets the requirements noted at the end of this document