Forcepoint DLP: Data Loss Prevention System Engineer Virtual Training

Course Overview

During this five-day hands-on instructor-led course, you will create and test a Forcepoint DLP deployment, perform in- depth analysis of DLP component architecture, integrate Forcepoint DLP with other products, build policies, and leverage configurable script classifiers. Using the knowledge you have gained from the Forcepoint DLP Administrator course, you will create and fine tune fingerprint and machine learning classifiers; configure discovery tasks to crawl files and databases; build, install, and manage DLP endpoints; and use data endpoints for application control, encryption, and discovery. You will perform advanced incident data management and maintenance tasks through Security Manager, such as dealing with failovers, upgrades and troubleshooting, including advanced debugging of DLP logs.

 

Prerequisites

  • Completion of the Forcepoint DLP Administrator Course and certification
  • Intermediate knowledge of networking and computer security concepts

Audience Profile

  • System engineers, high level system administrators, IT staff, professional services, and technical support
  • Consultants, sales engineers, system architects, network architects,
    implementation specialists, deployment specialists

Learning Objectives

  • Summarize the history of Forcepoint DLP.
  • Identify the primary Forcepoint DLP components.
  • Describe the Forcepoint DLP installation process.
  • Configure the DLP base environment.
  • Install the Analytics Engine to enable data analysis.
  • Install Protector for web scanning.
  • Describe DLP Policy Engine architecture and event lifecycle.
  • Summarize the DLP Policy structure and test a DLP policy.
  • Describe the Analytics Engine architecture
  • Explain and test incident data flow.
  • Describe the benefits of deploying a Supplemental Server.
  • Install and configure a Supplemental Server.
  • Create and test Fingerprinting and Machine Learning.
  • Install F1E to protect your sensitive data.
  • Test F1E anti-tampering and temporary bypass functions.
  • Identify Endpoint log files.
  • Trace Endpoint agent issues.
  • Exclude applications from DLP Endpoint.
  • Debug F1E using log files.
  • Create and run a Network Discovery task and an Endpoint Discovery task.
  • Run DLP reports.
  • Configure DLP roles.
  • Generate Discovery reports and troubleshoot the crawler.
  • Identify and run remediation scripts.
  • Describe the DLP component update process.
  • Describe automatic DLP component synchronization.
  • Configure backup and restore procedures.
  • Use the upgrade validation tool and upgrade DLP.
  • Describe the infrastructure database.
  • Investigate Policy Engine timeouts.

Content Outline

  • Data security story
  • Forcepoint story
     
  • Identifying the primary Forcepoint DLP components
  • Preparing for installation
  • Installing Forcepoint Security Manager
  • Configuring DLP base environment
  • Configuring Protector for email scanning
  • Performing initial testing of DLP
     
  • DLP module review
  • Installing Analytics Engine
  • Installing Protector for web
     
  • Describing Policy Engine architecture and event life cycle
  • Summarizing DLP policy structure
  • Testing Policy Engine
  • Describing the Analytics Engine architecture and algorithm
  • Running Analytics Engine manually
  • Testing Analytics Engine
  • Describing the benefits of deploying Supplemental Server.
  • Installing Supplemental Server.
  • Describing the classifiers created by crawlers
  • Configuring advanced file fingerprint
  • Configuring advanced database fingerprinting
  • Configuring machine learning
  • Describing Endpoint Server architecture and endpoint communication
  • Installing Forcepoint One Endpoint (F1E) to include anti-tampering
  • Using Forcepoint One Endpoint (F1E)
  • Troubleshooting endpoint agents
  • Tracing endpoint agent issues
  • Excluding applications from DLP endpoint
  • Debugging F1E
     
  • Discovering hidden data
  • Load balancing the crawler
  • Creating a Network Discovery task
  • Using Endpoint Discovery
  • Identifying and running reports
  • Configuring DLP roles
  • Generating Discovery task reports
  • Deleting a discovery job
  • Identifying types of remediation script
  • Running a remediation script
  • Inspecting a remediation script
  • Updating DLP components
  • Moving and replacing forensics
  • Describing automatic DLP component synchronization
  • Recording fingerprint task
  • Configuring DLP backup and DSS restore procedures
  • Performing a DLP backup
  • Using the upgrade validation tool
  • Fixing common SQL issues
  • Describing the Forcepoint infrastructure
  • Investigating Policy Engine timeouts
  • Identifying types of classifier
  • Building a data security policy
  • Combining multiple classifiers
  • Describing nested transactions logic

Certification

This course prepares you for the Certified Forcepoint DLP System Engineer exam. The exam is included in the price of the course. Both a hands-on practical exam and a 40-question multiple choice exam will be administered on the final day of the course. A minimum score of 80% is required to obtain certification.

 

FAQs

A: Forcepoint is an American cyber security company that develops security software and data protection, cloud access security broker, firewall and cross-domain solutions. Recently, a move has been made to sun-set legacy products and migrate to Forcepoint One.

 

A: Forcepoint is the leading user and data security cybersecurity company, entrusted to safeguard organizations while driving digital transformation and growth. Our solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value.

 

Forcepoint is the leading user and data security cybersecurity company, entrusted to safeguard organizations while driving digital transformation and growth. Our solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value.

 

A: Forcepoint NGFW is an award-winning next generation firewall that blocks malicious attacks and prevents the theft of data and intellectual property while transforming infrastructure and increasing the efficiency of your operations.

 

Forcepoint, an American multinational corporation software company headquartered in Austin, Texas, that develops computer security software and data protection, cloud access security broker, firewall and cross-domain solutions.

 

A: To attend the training session, you should have operational Desktops or Laptops with the required specifications, along with a good internet connection to access the labs. 

 

A: We would always recommend you attend the live session to practice & clarify the doubts instantly and get more value from your investment. However, if, due to some contingency, you have to skip the class, Radiant Tech learning will help you with the recorded session of that particular day. However, those recorded sessions are not meant only for personal consumption and NOT for distribution or any commercial use.

 

A: Radiant Tech learning has a data center containing the Virtual Training environment for the purpose of participant hand-on-practice. Participants can easily access these labs over Cloud with the help of a remote desktop connection. Radiant virtual labs provide you the flexibility to learn from anywhere in the world and in any time zone. 

 

A: The learners will be enthralled as we engage them in real-world and Oriented industry projects during the training program. These projects will improve your skills and knowledge, and you will gain a better experience. These real-time projects will help you a lot in your future tasks and assignments.

 

A: You can request a refund if you do not wish to enroll in the course.

 

A: Yes you can.

 

A: We utilize the best standards in Internet security. Any data retained is not communicated with third parties.

 

A: It is recommended but not mandatory. Being acquainted with the primary course material will enable students and the trainer to move at the desired pace during classes. You can access courseware for most vendors.

 

A: You can buy online from the page by clicking on "Buy Now". You can view alternate payment methods on the payment options page.

 

A:Yes, students can pay from the course page.

 

A: The course completion certification will be awarded to all the professionals who have completed the training program & the project assignment given by your instructor. You can use the certificate in your future job interviews which will surely help you to acquire your dream job.

 

Ans- Radiant believes in a practical & creative approach to training & development, which distinguishes it from other training & development platforms. Moreover, training courses are undertaken by some experts with a range of experience in their domain.

 

 A:  Radiant team of experts will be available at e-mail support@radianttechlearning.com to answer your technical queries even after the training program.

 

 A:  Yes, Radiant will provide you with the most updated high, value & relevant real-time projects & case studies in each training program.

A:  Technical issues are unpredictable & might occur with us as well. Participants have to ensure they have access to the required configuration with good internet speed.

 A: Radiant Techlearning offers training programs on weekdays, weekends & combination of weekdays & weekends. We provide you with complete liberty to choose the schedule that suits your needs.

 

A: Radiant has highly intensive selection criteria for Technology Trainers & Consultants, who deliver you training programs. Our trainers & consultants undergo rigorous technical and behavioral interview and assessment processes before they are on board in the company.

Our Technology experts/trainers & consultants carry deep-dive knowledge in the technical subject & are certified from the OEM.

Our training programs are practically oriented with 70% – 80% hands on the training technology tool.  Our training program focuses on one-on-one interaction with each participant, latest content in curriculum, real-time projects and case studies during the training program.

Our faculty will provide you with the knowledge of each course from the fundamental level in an easy way and you are free to ask your doubts any time from your respective faculty.

Our trainers have patience and ability to explain difficult concepts in a simplistic way with depth and width of knowledge.

To ensure quality learning, we provide a support session even after the training program.

 

A: Radiant has highly intensive selection criteria for Technology Trainers & Consultants, who deliver you training programs. Our trainers & consultants undergo rigorous technical and behavioral interview and assessment processes before they are on board in the company.

Our Technology experts/trainers & consultants carry deep-dive knowledge in the technical subject & are certified from the OEM.

Our training programs are practically oriented with 70% – 80% hands on the training technology tool.  Our training program focuses on one-on-one interaction with each participant, latest content in curriculum, real-time projects and case studies during the training program.

Our faculty will provide you with the knowledge of each course from the fundamental level in an easy way and you are free to ask your doubts any time from your respective faculty.

Our trainers have patience and ability to explain difficult concepts in a simplistic way with depth and width of knowledge.

To ensure quality learning, we provide a support session even after the training program.

 

Send a Message.


  • Enroll