Forcepoint NGFW Administrator Virtual Training

Course Overview

In this 16-hour hands-on virtual instructor-led training course, you will learn the skills required to practice as a system administrator accountable for installation, configuration, administration, & support of Forcepoint NGFW. Through instructional content, demonstrations, & hands-on lab practice exercises, one will learn the requirements & 

suggestions to successfully deploy Forcepoint NGFW in a wide variety of network environments. One will develop expertise in creating security rules & policies, managing users & authentication, configuring VPNs, performing deep traffic inspection, & accomplishing common administration tasks including status monitoring & reporting.

 

Prerequisites

  • General comprehending of system administration and Internet services
  • Fundamental knowledge of networking and computer security concepts
  • A computer that meets the needs noted at the end of this document

 

 

  •  

Audience Profile

  • New and existing customers of Forcepoint NGFW
  • Forcepoint channel partners
  • Forcepoint NGFW end users

Learning Objectives

 

  • Access the virtual activity environment, class materials and lab environment.
  • Articulate the NGFW System advantanges and differentiators.
  • Recognize the components of the SMC & their roles.
  • Administer the SMC parts and use them to manage and monitor NGFW firewalls.
  • Configure security policies and access control.
  • Configure network address translation.
  • Configure a Sidewinder Proxy.
  • Execute deep inspection through policies and templates.
  • Execute file filtering and malware detection.
  • Execute alerting and notification.
  • Handle users and authentication.
  • Configure mobile VPN solutions.
  • Configure a site-to-site VPN.
  • Handle log collection and storage.
  • Operate monitoring, statistics, & reporting.
  • Make usage of policy management tools.
  • Perform fundamental troubleshooting of NGFW

Content Outline

Prepare to utilize the virtual training environment.

  • List NGFW advantages and/or differentiators.
  • Describe the differences between the operating roles.
  • Explain the NGFW engine and appliances.
  • Explain at least one of the installation methods.
  • Explain the 3 platforms on which the NGFW can be positioned.
  • Explain the Security Management Center and its key features.
  • Explain the NGFW system architecture.
  • Identify the ports utilized for communication between SMC parts.
  • Describe the use of locations and contact addresses.
  • Describe the use of SMC Domains.
  • Explain the management client and how it works.
  • Develop system backups.
  • Explain SMC high availability options.
  • Configure SMC Administrator Access
  • Execute configuration to NGFW engines.
  • Explain how logs work.
  • Explain the types of NGFW policies.
  • Define firewall policy templates.
  • Develop a firewall policy hierarchy.
  • Explain the benefits of aliases & continue rules.
  • Describe how traffic is matched in access rules.
  • Describe the different types of access rules.
  • Explain the actions for processing traffic in access rules.
  • Describe the different kinds of NAT.
  • Configure NAT rules.
  • Describe the difference between service, service with protocol, & proxy.
  • Describe enhanced access control methods.
  • Describe different ways to control applications.
  • List the detection procedures used in the NGFW Inspection.
  • Explain AETs and normalization.
  • Explain TLS Inspection.
  • Configure Snort inspection on the NGFW.
  • List the Forcepoint products that combine with the NGFW.
  • Describe how to send traffic for deep packet inspection.
  • Explain Situations and how to use them.
  • Define the different types of rules in the inspection policy.
  • Tune an inspection policy.
  • List the distinct options for detecting malware.
  • Describe how to send traffic for malware detection.
  • Configure a file filtering policy.
  • Combine the NGFW with a Data Loss Prevention system
  • Describe the alert escalation process in the NGFW system.
  • Develop an alert policy & alert chain to escalate an alert.
  • Recognize supported directory servers and authentication methods.
  • Describe the browser-based user authentication mechanism.
  • Configure user authentication.
  • Distinguish between user authentication & user identification.
  • Describe the difference between the Forcepoint FUID & ECA.
  • Configure user behavior monitoring
  • List NGFW Mobile VPN Access options.
  • Explain the SSL VPN Portal and the URL Rewrite translation method.
  • Configure a SSL VPN Portal.
  • Describe the terms used in NGFW VPN Terminology.
  • Describe how Site-to-site VPNs work
  • Explain Full Mesh, Star and Hub VPN topologies
  • List SD-WAN components supported by the NGFW.
  • Configure a Policy-Based VPN.
  • Explain How a Route-based VPN Works.
  • Depict the log entry types available in the NGFW.
  • Utilize the interface to interpret & analyze logs.
  • Configure and Manage Logs.
  • Develop permanent filters.
  • Explore how pruning filters affect log data.
  • Configure the log server to forward logs to third-party SIEM systems.
  • Explain the methods available for managing the space consumed by log data.
  • Explain the benefits of Policy Snapshots.
  • Search rules in an NGFW Policy.
  • Explore policy structure & apply tools to optimize the access rules.
  • Observe the system and firewall activity.
  • Explain the use of overviews in the SMC user interface.
  • Configure & generate reports.
  • Observe third-party components.
  • Describe the troubleshooting process.
  • Utilize the SMC to troubleshoot your systems.
  • Describe how to collect diagnostics for Support.
  • Resolve common SMC issues.
  • Describe how NGFW packet processing works.
  • Depict NGFW deployment options.
  • List components specific to single firewalls.
  • Configure a single firewall in the SMC.
  • Configure an NGFW engine for initial contact with the SMC.
  • Designate the trust between SMC & a newly installed NGFW engine.
  • Recognize key features new to the NGFW in version 6.10.
  • Locate the documentation required to implement these features.

Certification

This course prepares you for the Certified Forcepoint Next Generation Firewall Administrator exam. One exam attempt is included in the price of the course, but the execution of the exam is not accomplished during the course. A minimum score of 80% on the multiple-choice online exam is required to obtain certification.

 

FAQs

A: Forcepoint is an American cyber security company that develops security software and data protection, cloud access security broker, firewall and cross-domain solutions. Recently, a move has been made to sun-set legacy products and migrate to Forcepoint One.

 

A: Forcepoint is the leading user and data security cybersecurity company, entrusted to safeguard organizations while driving digital transformation and growth. Our solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value.

 

Forcepoint is the leading user and data security cybersecurity company, entrusted to safeguard organizations while driving digital transformation and growth. Our solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value.

 

A: Forcepoint NGFW is an award-winning next generation firewall that blocks malicious attacks and prevents the theft of data and intellectual property while transforming infrastructure and increasing the efficiency of your operations.

 

Forcepoint, an American multinational corporation software company headquartered in Austin, Texas, that develops computer security software and data protection, cloud access security broker, firewall and cross-domain solutions.

 

A: To attend the training session, you should have operational Desktops or Laptops with the required specifications, along with a good internet connection to access the labs. 

 

A: We would always recommend you attend the live session to practice & clarify the doubts instantly and get more value from your investment. However, if, due to some contingency, you have to skip the class, Radiant Tech learning will help you with the recorded session of that particular day. However, those recorded sessions are not meant only for personal consumption and NOT for distribution or any commercial use.

 

A: Radiant Tech learning has a data center containing the Virtual Training environment for the purpose of participant hand-on-practice. Participants can easily access these labs over Cloud with the help of a remote desktop connection. Radiant virtual labs provide you the flexibility to learn from anywhere in the world and in any time zone. 

 

A: The learners will be enthralled as we engage them in real-world and Oriented industry projects during the training program. These projects will improve your skills and knowledge, and you will gain a better experience. These real-time projects will help you a lot in your future tasks and assignments.

 

A: You can request a refund if you do not wish to enroll in the course.

 

A: Yes you can.

 

A: We utilize the best standards in Internet security. Any data retained is not communicated with third parties.

A: It is recommended but not mandatory. Being acquainted with the primary course material will enable students and the trainer to move at the desired pace during classes. You can access courseware for most vendors.

 

A: You can buy online from the page by clicking on "Buy Now". You can view alternate payment methods on the payment options page.

 

A:Yes, students can pay from the course page.

 

A: The course completion certification will be awarded to all the professionals who have completed the training program & the project assignment given by your instructor. You can use the certificate in your future job interviews which will surely help you to acquire your dream job.

 

Ans- Radiant believes in a practical & creative approach to training & development, which distinguishes it from other training & development platforms. Moreover, training courses are undertaken by some experts with a range of experience in their domain.

 

 A:  Radiant team of experts will be available at e-mail support@radianttechlearning.com to answer your technical queries even after the training program.

 

 A:  Yes, Radiant will provide you with the most updated high, value & relevant real-time projects & case studies in each training program.

 

A:  Technical issues are unpredictable & might occur with us as well. Participants have to ensure they have access to the required configuration with good internet speed.

 

 A: Radiant Techlearning offers training programs on weekdays, weekends & combination of weekdays & weekends. We provide you with complete liberty to choose the schedule that suits your needs.

 

A: Radiant has highly intensive selection criteria for Technology Trainers & Consultants, who deliver you training programs. Our trainers & consultants undergo rigorous technical and behavioral interview and assessment processes before they are on board in the company.

Our Technology experts/trainers & consultants carry deep-dive knowledge in the technical subject & are certified from the OEM.

Our training programs are practically oriented with 70% – 80% hands on the training technology tool.  Our training program focuses on one-on-one interaction with each participant, latest content in curriculum, real-time projects and case studies during the training program.

Our faculty will provide you with the knowledge of each course from the fundamental level in an easy way and you are free to ask your doubts any time from your respective faculty.

Our trainers have patience and ability to explain difficult concepts in a simplistic way with depth and width of knowledge.

To ensure quality learning, we provide a support session even after the training program.

 

Send a Message.


  • Enroll