szkolenia i warsztaty (Palo Alto Networks, Juniper, Check Point, inne)
Forcepoint Web Security Administrator Training - Virtual Instructor Led Training | język: pl, Online | 2025-04-22 wolne: 8 miejsc | 1018.8,- eur | Rejestracja |
Audience
System administrators, network security administrators, IT staff, consultants
Forcepoint channel partners, integrators, and planners who help customers with Forcepoint Web Security implementations Course objectives
Access, find, and modify key user interface options to accomplish administrative tasks.
Customize and manage Web Security policies to meet your organization’s filtering needs.
Extend and combine available reporting options to gain actionable insights related to Web Security detections.
Leverage Web Security configuration options and available tools to respond to incidents.
Prerequisites for attendance
Basic knowledge of Active Directory/User Directory concepts
Basic knowledge of networking concepts (IP addresses, protocols,
URLs, proxies, gateways, firewalls)
User experience with platforms on which Forcepoint Web Security will be deployed Module 1: Understanding and Getting Started with Web Security
Describe features, components, and key integrations that enable Web Security functionalities.
Articulate the licensing structure for Web Security and related modules.
Distinguish key settings in Security Manager, Content Gateway Manager, Forcepoint Security Appliance Manager, and other available user interfaces.
Describe the differences between Super Administrators and delegated administrators. Module 2: Policy Enforcement and Filtering
Describe the full scope and workflow of policy planning.
Identify standard and custom policies, including related filters.
Distinguish key settings in Security Manager.
Compare user identification and proxy authentication.
Explain how Web Security analyses user requests and enforces policies. Module 3: Monitoring Web Security Activities
Itemize Web Security notifications and alerts.
Diagram the reporting flow.
Describe various reporting options to gain important insights about your environment.
Identify suspicious network activity using threats dashboard.
Compare reporting tools, including legacy and Report Center features. Module 4: Disaster Response and Recovery
Explain how Web Security responds to incidents.
Compare and contrast Web Security update options.
Distinguish guidelines related to incident management and disaster recovery.
Identify system health monitoring capabilities.
Complete various tasks that help maintain a healthy Web Security environment.
Define best practice procedures for disaster recovery.Harmonogram / Schedule
Dzień / Day 1 10:00 - 15:00
Dzień / Day 2 10:00 - 15:00
Dzień / Day 3 10:00 - 15:00
Dzień / Day 4 10:00 - 15:00
Uprawnienia/Certyfikaty / Competences/Certificates