Казахстан, г. Алматы, ул. Шевченко 90, БЦ «Каратал», офис 53
Казахстан, г. Астана, ул. Иманова 19, БЦ Деловой Дом "Алма-Ата", офис 612

направление: Forcepoint кол-во дней: 3
вендор: Информационная безопасность кол-во часов: 24

During this three-day hands-on classroom training, you will gain an understanding of the key core competencies and

skills needed to practice as a system administrator who manages Forcepoint Web Security. The core competencies

include system architecture, policy creation, incident management, and health assessment of the Forcepoint Web

Security system. You will develop skills in web policy creation, reporting, and incident management.

Certification exams

This course prepares you to take and pass the Certified Forcepoint Web Security Administrator Exam. The exam is included in the price of the course, but the execution of the exam is not accomplished during the course. A minimum score of 80% on the multiple-choice online exam is required to obtain certification.

Prerequisites for attendance:

  • General understanding of system administration and Internet services

  • Basic knowledge of networking and computer security concepts

  • A computer that meets the requirements noted at the end of this document

Course objectives

  • Understand the Forcepoint Web Security components and architecture

  • Articulate common deployment topologies

  • Access and use Security Manager, including other available user interfaces

  • Execute updates and upgrades on Forcepoint Web Security

  • Understand delegated administration

  • Comprehend and perform policy and filter basics

  • Create effective web policies

  • Understand exception management

  • Recognize different user management methods

  • Configure user identification and policy enforcement

  • Create notifications and alerts

  • Understand report types and utilization

  • Create various reports

  • Understand system health alerts and usage monitoring

  • Understand system disaster recovery procedures

  • Learn how to respond to incidents

Target Audience:

  • System Administrators, Network Security Administrators, IT staff, consultants

  • Forcepoint channel partners, integrators, and planners who help customers with Forcepoint Web Security implementations

MODULE 1: UNDERSTANDING AND GETTING STARTED WITH WEB SECURITY

  • Articulate the key features and functions of Web Security

  • Describe features, components, and key integrations that enable Web Security functionalities

  • Compare the advantages and disadvantages of various deployment methodologies

  • Articulate the licensing structure and how and when to enter the key within the Content Gateway

  • Distinguish the key settings in Security Manager, Content Gateway Manager, Forcepoint Security

  • Appliance Manager, and other available user interfaces
  • Describe the differences between Super Administrators and delegated administrators

MODULE 2: POLICY ENFORCEMENT AND FILTERING

  • Describe the full scope and workflow of policy planning

  • Identify standard and custom policies (and related filters) based on your organizations needs

  • Distinguish the key settings in Security Manager

  • Compare user identification and proxy authentication

  • Explain how Web Security analyses user requests and enforces policies

MODULE 3: MONITORING WEB SECURITY ACTIVITIES

  • Itemize the available notifications and alerts

  • Explain the reporting flow

  • Describe the various reporting options to gain important insights about your environment

  • Identify suspicious network activity using threats dashboard

  • Compare the available reporting tools, including legacy and Report Center features

MODULE 4: DISASTER RESPONSE AND RECOVERY

  • Explain how Web Security responds to incidents

  • Compare and contrast the available update options

  • Distinguish the guidelines related to incident management and disaster recovery

  • Identify system health monitoring capabilities

  • Complete various tasks that will help maintain a healthy Web Security environment

  • Define the best practice procedures for disaster recovery