During this three-day hands-on classroom training, you will gain an understanding of the key core competencies and
skills needed to practice as a system administrator who manages Forcepoint Web Security. The core competencies
include system architecture, policy creation, incident management, and health assessment of the Forcepoint Web
Security system. You will develop skills in web policy creation, reporting, and incident management.
Certification exams
This course prepares you to take and pass the Certified Forcepoint Web Security Administrator Exam. The exam is included in the price of the course, but the execution of the exam is not accomplished during the course. A minimum score of 80% on the multiple-choice online exam is required to obtain certification.
Prerequisites for attendance:
General understanding of system administration and Internet services
Basic knowledge of networking and computer security concepts
A computer that meets the requirements noted at the end of this document
Course objectives
Understand the Forcepoint Web Security components and architecture
Articulate common deployment topologies
Access and use Security Manager, including other available user interfaces
Execute updates and upgrades on Forcepoint Web Security
Understand delegated administration
Comprehend and perform policy and filter basics
Create effective web policies
Understand exception management
Recognize different user management methods
Configure user identification and policy enforcement
Create notifications and alerts
Understand report types and utilization
Create various reports
Understand system health alerts and usage monitoring
Understand system disaster recovery procedures
Learn how to respond to incidents
Target Audience:
System Administrators, Network Security Administrators, IT staff, consultants
Forcepoint channel partners, integrators, and planners who help customers with Forcepoint Web Security implementations
MODULE 1: UNDERSTANDING AND GETTING STARTED WITH WEB SECURITY
Articulate the key features and functions of Web Security
Describe features, components, and key integrations that enable Web Security functionalities
Compare the advantages and disadvantages of various deployment methodologies
Articulate the licensing structure and how and when to enter the key within the Content Gateway
Distinguish the key settings in Security Manager, Content Gateway Manager, Forcepoint Security
Describe the differences between Super Administrators and delegated administrators
MODULE 2: POLICY ENFORCEMENT AND FILTERING
Describe the full scope and workflow of policy planning
Identify standard and custom policies (and related filters) based on your organizations needs
Distinguish the key settings in Security Manager
Compare user identification and proxy authentication
Explain how Web Security analyses user requests and enforces policies
MODULE 3: MONITORING WEB SECURITY ACTIVITIES
Itemize the available notifications and alerts
Explain the reporting flow
Describe the various reporting options to gain important insights about your environment
Identify suspicious network activity using threats dashboard
Compare the available reporting tools, including legacy and Report Center features
MODULE 4: DISASTER RESPONSE AND RECOVERY
Explain how Web Security responds to incidents
Compare and contrast the available update options
Distinguish the guidelines related to incident management and disaster recovery
Identify system health monitoring capabilities
Complete various tasks that will help maintain a healthy Web Security environment
Define the best practice procedures for disaster recovery