Forcepoint ONE Administrator Blended Learning

Course Overview

The Forcepoint ONE Administrator Blended Learning course is for administrators tasked with deploying and managing the Forcepoint ONE Secure Access Service Edge (SASE) platform.
This blended learning includes the self-paced training scenarios that are part of the Forcepoint ONE Administrator E- learning course and adds live instructor sessions and a hands-on lab environment to enable attendees to practice what they have learned

 

Prerequisites

  • General understanding of Software as a Service (SaaS) principles.
  • General knowledge of cloud applications.
  • Basic knowledge of Active Directory/User Directory concepts.
  • Basic knowledge of IPv4 networking concepts (IP addresses, routing, URLs, proxies, gateways, firewalls).
  • User experience with platforms on which Forcepoint ONE will be deployed.
  • Basic familiarity with privacy standard terminology and their acronyms (such as HIPPA, PII, GDPR, and PCIDSS).

 

 

Audience Profile

  • System administrators, data security administrators, network security administrators, IT staff
  • Sales engineers, consultants, implementation specialists
  • Forcepoint channel partners and IT staff

Learning Objectives

  • Explain the Forcepoint ONE Secure Access Service Edge (SASE) platform.
  • Navigate the Forcepoint ONE portal.
  • Configure identity management.
  • Administer users and identity management.
  • Introduce advanced threat protection and login policies.
  • Add applications in Forcepoint ONE.
  • Control access to configured applications.
  • Configure login control policies.
  • Configure the Salesforce application for unmanaged device access.
  • Configure the Microsoft 365 application for managed device access.
  • Use the SmartEdge Secure Web Gateway and discover Shadow IT.
  • Configure DLP patterns, proxy policies, and alerts.
  • Install the SmartEdge agent and configure a proxy policy.
  • Configure advanced DLP patterns and policies.
  • Work with cloud DLP policies and Cloud Security Posture Management (CSPM).
  • Discover ZTNA capabilities.
  • Manage the security posture for cloud and SaaS environments.
  • Install and configure ZTNA.
  • Monitor and analyze traffic in Forcepoint ONE.

Content Outline

Live Session: Introducing Your Learning Experience

  • Become familiar with the course structure, schedule, and content.
  • Review the lab environment and architecture.
  • Verify lab access.
  • Access lab documentation and help resources.
  • Prepare for the day ahead.
     

Module: Explaining the Forcepoint ONE Secure Access Service Edge (SASE) Platform

  • Summarize the problem Forcepoint ONE solves.
  • Explain multi-mode Cloud Access Security Broker (CASB).
  • Describe SmartEdge SWG.
  • Explain ZTNA in Forcepoint ONE.
  • Describe the SASE architecture.

 

Module: Navigating the Forcepoint ONE Portal

  • Navigate the Forcepoint ONE portal: Analyze.
  • Navigate the Forcepoint ONE portal: Protect.
  • Navigate the Forcepoint ONE portal: IAM.
  • Navigate the Forcepoint ONE portal: Settings.
     

Module: Configuring Identity Management

  • Describe the authentication process.
  • Provision new domains.
  • Set authentication options for each domain.
  • Add user groups.
  • Assign users to policies.
  • Configure portal account management.
     

Lab: Administering Users and Identity Management

  • Manage users and groups.
  • Manage roles.
  • Configure a third-party Identity Provider (IDP).
  •  Test identity management.

Live Session: Daily Review, Q&A, and Overview Session

  • Review key points from content covered so far.
  • Participate in the Q&A session.
  • Prepare for the day ahead.

 

Module: Introducing Advanced Threat Protection and Login Policies

  • Summarize Advanced Threat Protection (ATP).
  • Configure login policies.
     

Module: Adding Applications

  • Add predefined managed applications.
  • Add custom managed applications.
     

Module: Controlling Application Access

  • Configure contextual access control rules.
  • Manage client certificates.
  • Create device profiles.
  • Create custom locations.
     

Lab: Configuring Login Control Policies

  • Configure login control policies.
  • Verify configured login policies.
     

Lab: Configuring the Salesforce Application for Unmanaged Device Access

  • Configure Single Sign-On (SSO) for Salesforce.
  • Configure contextual access control for Salesforce.
  • Verify the access control settings.

 

Lab: Configuring the Microsoft 365 Application for Managed Device Access

  • Add Microsoft 365 as a predefined application.
  • Configure Microsoft 365 access control policies.

Live Session: Daily Review, Q&A, and Overview Session

  • Review key points from content covered so far.
  • Participate in the Q&A session.
  • Prepare for the day ahead.
     

Module: Using the SmartEdge Secure Web Gateway and Discovering Shadow IT

  • Explore Shadow IT.
  • Control unmanaged applications through forward proxy.
  • Install and configure the SmartEdge agent.
  • Control traffic using Secure Web Gateway (SWG) policies.
     

Module: Configuring DLP Patterns, Proxy Policies, and Alerts

  • Describe predefined DLP patterns.
  • Create custom DLP patterns.
  • Configure DLP policies and actions.
     

Lab: Installing the SmartEdge Agent and Configuring a Proxy Policy

  • Install the SmartEdge proxy.
  • Configure web proxy policies.
  • Configure contextual access control for Microsoft 365.

 

Lab: Configuring Advanced DLP Patterns and Policies

  • Configure DLP patterns.
  • Configure a proxy DLP policy.

Live Session: Daily Review, Q&A, and Overview Session

  • Review key points from content covered so far.
  • Participate in the Q&A session.
  • Prepare for the day ahead.
     

Module: Working with Cloud DLP Policies and Cloud Security Posture Management

  • Create an API.
  • Configure an API policy.
  • Report an API connection.
  • Describe Cloud Security Posture Management (CSPM).
     

Module: Discovering ZTNA Capabilities

  • Introduce ZTNA and SASE: The challenges and the solution.
  • Provide contractors Zero Trust Network Access (ZTNA) to private applications using Forcepoint ONE.
  • Deploy the ZTNA connector for Forcepoint ONE.
  • Set up a ZTNA application in Forcepoint ONE.
  • Create a policy for ZTNA applications in Forcepoint ONE.
     

Lab: Managing the Security Posture for Cloud and SaaS Environments

  • Enable an API for SaaS Security Posture Management (SSPM).
  • Verify the Salesforce API and test SSPM.
  • Enable an API for Cloud Security Posture Management (CSPM). *
  • Verify the AWS API and test CSPM. *
  • CSPM labs are optional and require the learner to have access to their own AWS instance.
     

Lab: Installing and Configuring ZTNA

  • Install and configure the ZTNA connector.
  • Configure ZTNA applications.
  • Test your ZTNA configuration.
     

Lab: Monitoring and Analyzing Traffic in Forcepoint ONE

  • Monitor the Dashboard and review report settings.
  • Configure log filters.
  • Configure SIEM integration

Certification

This course prepares you to take and pass the Forcepoint ONE Administrator certification exam. One exam attempt is included in the price of the course, but the exam is not administered during the course. A minimum score of 80% on the multiple-choice online exam is required to pass.

 

FAQs

A: Forcepoint is an American cyber security company that develops security software and data protection, cloud access security broker, firewall and cross-domain solutions. Recently, a move has been made to sun-set legacy products and migrate to Forcepoint One.

 

A: Forcepoint is the leading user and data security cybersecurity company, entrusted to safeguard organizations while driving digital transformation and growth. Our solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value.

 

Forcepoint is the leading user and data security cybersecurity company, entrusted to safeguard organizations while driving digital transformation and growth. Our solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value.

 

A: Forcepoint NGFW is an award-winning next generation firewall that blocks malicious attacks and prevents the theft of data and intellectual property while transforming infrastructure and increasing the efficiency of your operations.

Forcepoint, an American multinational corporation software company headquartered in Austin, Texas, that develops computer security software and data protection, cloud access security broker, firewall and cross-domain solutions.

 

A: To attend the training session, you should have operational Desktops or Laptops with the required specifications, along with a good internet connection to access the labs.

A: We would always recommend you attend the live session to practice & clarify the doubts instantly and get more value from your investment. However, if, due to some contingency, you have to skip the class, Radiant Tech learning will help you with the recorded session of that particular day. However, those recorded sessions are not meant only for personal consumption and NOT for distribution or any commercial use.

 

A: Radiant Tech learning has a data center containing the Virtual Training environment for the purpose of participant hand-on-practice. Participants can easily access these labs over Cloud with the help of a remote desktop connection. Radiant virtual labs provide you the flexibility to learn from anywhere in the world and in any time zone. 

 

A: The learners will be enthralled as we engage them in real-world and Oriented industry projects during the training program. These projects will improve your skills and knowledge, and you will gain a better experience. These real-time projects will help you a lot in your future tasks and assignments.

A: You can request a refund if you do not wish to enroll in the course.

 

A: Yes you can.

A: We utilize the best standards in Internet security. Any data retained is not communicated with third parties.

A: It is recommended but not mandatory. Being acquainted with the primary course material will enable students and the trainer to move at the desired pace during classes. You can access courseware for most vendors.

 

A: You can buy online from the page by clicking on "Buy Now". You can view alternate payment methods on the payment options page.

 

A:Yes, students can pay from the course page.

 

A: The course completion certification will be awarded to all the professionals who have completed the training program & the project assignment given by your instructor. You can use the certificate in your future job interviews which will surely help you to acquire your dream job.

 

Ans- Radiant believes in a practical & creative approach to training & development, which distinguishes it from other training & development platforms. Moreover, training courses are undertaken by some experts with a range of experience in their domain.

 

 A:  Radiant team of experts will be available at e-mail support@radianttechlearning.com to answer your technical queries even after the training program.

 

 A:  Yes, Radiant will provide you with the most updated high, value & relevant real-time projects & case studies in each training program.

A:  Technical issues are unpredictable & might occur with us as well. Participants have to ensure they have access to the required configuration with good internet speed.

 

 A: Radiant Techlearning offers training programs on weekdays, weekends & combination of weekdays & weekends. We provide you with complete liberty to choose the schedule that suits your needs.

 

A: Radiant has highly intensive selection criteria for Technology Trainers & Consultants, who deliver you training programs. Our trainers & consultants undergo rigorous technical and behavioral interview and assessment processes before they are on board in the company.

Our Technology experts/trainers & consultants carry deep-dive knowledge in the technical subject & are certified from the OEM.

Our training programs are practically oriented with 70% – 80% hands on the training technology tool.  Our training program focuses on one-on-one interaction with each participant, latest content in curriculum, real-time projects and case studies during the training program.

Our faculty will provide you with the knowledge of each course from the fundamental level in an easy way and you are free to ask your doubts any time from your respective faculty.

Our trainers have patience and ability to explain difficult concepts in a simplistic way with depth and width of knowledge.

To ensure quality learning, we provide a support session even after the training program.

 

Send a Message.


  • Enroll