Forcepoint Data Loss Prevention Administrator Virtual Training

Course Overview

The Forcepoint Data Loss Prevention  Administrator course guides you how to test an existing deployment, administer policies & reports, handle incidents and endpoints & upgrade and manage the Forcepoint DLP system. One will develop skills in creating data policies,  performing system maintenance, building custom classifiers,& using predefined policies, incident management and reports.

 

Prerequisites

  • General understanding of system administration and internet services
  • Basic knowledge of networking and computer security concepts
  • A computer that meets the requirements noted at the end of this document

Audience Profile

  • System administrators, data security administrators, IT staff
  • Sales engineers, consultants, implementation specialists
  • Forcepoint channel partners and IT staff
  • DLP incident and forensic analysts

Learning Objectives

  • Identify and define core DLP terminology, resources, and architecture.
  • Define and create each type of DLP classifier.
  • Define and create each type of DLP resource, including URL categories, action plans, and notifications.
  • Define and create each type of DLP policy, rule, and exception.
  • Manage policies and rules using bulk updates and policy levels.
  • Explain and test the capabilities and modes of OCR.
  • Build, deploy, and manage the Forcepoint One Endpoint.
  • Define the terms specific to DLP incident reporting.
  • List and explain the report types in the report catalog.
  • Manage and customize incident reports.
  • Analyze and perform each type of workflow on a DLP incident.
  • Explain the features of the Incident Risk Ranking dashboard.
  • Create and configure an administrator with role-based permissions.
  • Define and perform discovery activities.
  • Define and perform fingerprinting and machine learning activities.
  • Explain the functionality of file tagging and how DLP integrates with it.
  • Import and apply file tags, create classifiers, and use them in a policy and rule.
  • Review the operational status of DLP components and services.
  • Identify the elements included in a DLP backup and restore procedure and then perform this procedure.
  • Identify and analyze the primary logs used in DLP security manager.

Content Outline

  • Describe a DLP implementation and define core DLP terms.
  • Identify available Forcepoint DLP product information resources and where they can be accessed.
  • List and explain each Forcepoint classifier type.
  • Create a functional example of each Forcepoint classifier type.
  • Access the list of predefined script classifiers and identify several commonly used categories.
  • Configure the parameters of a predefined script classifier.
  • List and explain each Forcepoint DLP resource.
  • Configure a connection to and import a user directory.
  • Create a functional example of each Forcepoint DLP resource.
  • Import URL categories by enabling the linking service.
  • List and explain the default action plans.
  • Create a custom action plan.
  • List and explain the default notifications.
  • Use dynamic variables in notifications.
  • Configure the default notification.
  • Define what a DLP policy is, identify three broad types of them, and explain what they do.
  • Explain how cumulative rules can be used in DLP.
  • Configure, deploy, and test a quick policy.
  • Configure and test a predefined policy.
  • Configure, deploy, and test a custom policy and rule.
  • Explain the purpose and function of a rule exception.
  • Explain how to perform a bulk update of multiple policies and rules.
  • Explain how policy levels provide scope and processing order for policies, then create a new policy level and assign policies to it.
  • Explain the capabilities and modes of OCR.
  • Configure a policy engine to work with an OCR server.
  • Submit a transaction to the OCR engine and examine the results.
  • Identify the core features of the Forcepoint One Endpoint.
  • Explain the endpoint global and profile settings.
  • Deploy the Forcepoint One Endpoint.
  • Identify supported endpoint encryption methods.
  • Use the Forcepoint One Endpoint to encrypt files copied to removable media.
  • Explain the DLP endpoint temporary bypass feature.
  • Test the temporary bypass feature.
  • Configure the endpoint browser extension to work in monitor-only mode.
  • Test the endpoint browser extension in monitor-only mode.
  • Explain the DLP endpoint employee coaching feature.
  • Confirm the function of the employee coaching feature.
  • Define the core terminology of Forcepoint DLP incident reporting.
  • List and explain the report types in the report catalog
  • Analyze an incident in an Incident List report.
  • Perform each UI-based incident workflow action.
  • Explain the function of DLP incident batch operations.
  • Perform a remediation operation on a batch of incidents.
  • Explain the features of the incident risk ranking dashboard.
  • Summarize attributes of delegated administrators and role-based permissions
  • Configure a delegated administrator to have role-based permissions.
     
  • Define terminology specific to discovery.
  • Perform discovery activities, including configuration, task execution, and analysis of discovery incidents.
  • Define terminology specific to fingerprinting and machine learning.
  • Perform file fingerprinting activities, including configuration, task execution, and tuning of results.
  • Perform machine learning activities, including configuration, task execution, and tuning of results.
  • Explain the functionality of classification labels and how to integrate them into the DLP data labeling framework.
  • Integrate Boldon James into the DLP data labeling framework.
  • Create a file labeling classifier to manage files that contain sensitive or proprietary information.
  • Create and deploy a data usage policy using a file labeling classifier.
  • Create and deploy a discovery policy with an action plan capable of assigning file classification labels.
  • Examine the DLP system health dashboard for sustained high usage.
  • Review the operational status of each registered system module.
  • Identify and analyze the primary logs used by the DLP security manager.
  • Export information found in the primary logs.
  • Explain the functionality of DLP system alerts.
  • Identify the items included in a DLP backup.
  • Configure and perform a DLP backup task.

Certification

This course prepares you to take and pass the DLP Administrator certification exam. One exam attempt is included in the price of the course, but the exam is not administered during the course. A minimum score of 80% on the multiple-choice online exam is required to pass.

 

FAQs

A: Forcepoint is an American cyber security company that develops security software and data protection, cloud access security broker, firewall and cross-domain solutions. Recently, a move has been made to sun-set legacy products and migrate to Forcepoint One.

 

A: Forcepoint is the leading user and data security cybersecurity company, entrusted to safeguard organizations while driving digital transformation and growth. Our solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value.

 

Forcepoint is the leading user and data security cybersecurity company, entrusted to safeguard organizations while driving digital transformation and growth. Our solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value.

A: Forcepoint NGFW is an award-winning next generation firewall that blocks malicious attacks and prevents the theft of data and intellectual property while transforming infrastructure and increasing the efficiency of your operations.

 

Forcepoint, an American multinational corporation software company headquartered in Austin, Texas, that develops computer security software and data protection, cloud access security broker, firewall and cross-domain solutions.

 

A: To attend the training session, you should have operational Desktops or Laptops with the required specifications, along with a good internet connection to access the labs.

A: We would always recommend you attend the live session to practice & clarify the doubts instantly and get more value from your investment. However, if, due to some contingency, you have to skip the class, Radiant Tech learning will help you with the recorded session of that particular day. However, those recorded sessions are not meant only for personal consumption and NOT for distribution or any commercial use.

 

A: Radiant Tech learning has a data center containing the Virtual Training environment for the purpose of participant hand-on-practice. Participants can easily access these labs over Cloud with the help of a remote desktop connection. Radiant virtual labs provide you the flexibility to learn from anywhere in the world and in any time zone. 

 

A: The learners will be enthralled as we engage them in real-world and Oriented industry projects during the training program. These projects will improve your skills and knowledge, and you will gain a better experience. These real-time projects will help you a lot in your future tasks and assignments.

 

A: You can request a refund if you do not wish to enroll in the course.

 

A: We utilize the best standards in Internet security. Any data retained is not communicated with third parties.

 

A: It is recommended but not mandatory. Being acquainted with the primary course material will enable students and the trainer to move at the desired pace during classes. You can access courseware for most vendors.

 

A: You can buy online from the page by clicking on "Buy Now". You can view alternate payment methods on the payment options page.

 

A:Yes, students can pay from the course page.

 

A: The course completion certification will be awarded to all the professionals who have completed the training program & the project assignment given by your instructor. You can use the certificate in your future job interviews which will surely help you to acquire your dream job.

 

Ans- Radiant believes in a practical & creative approach to training & development, which distinguishes it from other training & development platforms. Moreover, training courses are undertaken by some experts with a range of experience in their domain.

 

 A:  Radiant team of experts will be available at e-mail support@radianttechlearning.com to answer your technical queries even after the training program.

 A:  Yes, Radiant will provide you with the most updated high, value & relevant real-time projects & case studies in each training program.

 

A:  Technical issues are unpredictable & might occur with us as well. Participants have to ensure they have access to the required configuration with good internet speed.

 

 A: Radiant Techlearning offers training programs on weekdays, weekends & combination of weekdays & weekends. We provide you with complete liberty to choose the schedule that suits your needs.

 

A: Radiant has highly intensive selection criteria for Technology Trainers & Consultants, who deliver you training programs. Our trainers & consultants undergo rigorous technical and behavioral interview and assessment processes before they are on board in the company.

Our Technology experts/trainers & consultants carry deep-dive knowledge in the technical subject & are certified from the OEM.

Our training programs are practically oriented with 70% – 80% hands on the training technology tool.  Our training program focuses on one-on-one interaction with each participant, latest content in curriculum, real-time projects and case studies during the training program.

Our faculty will provide you with the knowledge of each course from the fundamental level in an easy way and you are free to ask your doubts any time from your respective faculty.

Our trainers have patience and ability to explain difficult concepts in a simplistic way with depth and width of knowledge.

To ensure quality learning, we provide a support session even after the training program.

 

Send a Message.


  • Enroll