Courses by Forcepoint

  • Course: Next Generation Firewall (NGFW)
  • Length: 4 days

Forcepoint Next Generation Firewall (NFGW)

  • Course: Forcepoint Web Security Administrator
  • Length: 3 days

Forcepoint Web Security Administrator

  • Course: Forcepoint DLP Administrator
  • Length: 3 Days


During the three days, you will learn how to test an existing deployment, how to administer policies and reports, handle incidents and endpoints, upgrade and manage the Forcepoint DLP system. You will develop skills in creating data policies, building custom classifiers and using predefined policies, incident management, reporting, and system maintenance.

Intended audience

End-User/Customers: System administrators, network security administrators, IT staff

Channel Partners: Sales Engineers, consultants, implementation specialists

Course objectives

Understand simple Forcepoint DLP product deployments

Create and use custom classifiers

Use predefined classifiers, rules and policies

Control various channels of potential data leaks – in TCP networking, discovery and by endpoint Manipulate incidents and reports

Configure incident workflows using TRITON GUI or email

Perform the backup and restore

Topic 1: Forcepoint DLP Architecture

1) AP-DATA Product and Basic Deployment

a)Forcepoint product overview

b)What is DLP

a)What is new in the 8.x versions

b)Simple Forcepoint DLP deployments, network topology before and after

c)Management consoles

d)Forcepoint DLP key configurations

e)Registering CG and Forcepoint Email Security

f)ICAP-mode Protector

g)Data security in cloud deployments

2) Forcepoint DLP Components, Transaction Processing

a)Involved machines, OS, virtualization, processes

b)Load Balancing and Policiy Engine Interface (PEI)

c)Processing data transactions, Policy Engine (PE)

d)Testing DLP channels

e)CLI tools to extract plaintext and test policies

f)Custom logic in rule conditions

g)Testing limits of file size, large ZIPs and timeouts.


Topic 2: DLP Policies

1) Custom and Predefined Classifiers

a)Keyphrases and dictionaries

b)Regular expressions

c)File classifiers

d)Script overview. “Supporting terms” near sensitive data; context analysis

e)Credit cards: PCI audit rules, CCN classifiers, Luhn check, prefixes


f)Policy exceptions for custom LDAP

groups, domains, etc.

g)Cumulative rules (Drip DLP)

2) Fingerprinting and ML

a)File fingerprinting; possibly with ignored sections

b)Database fingerprinting

c)Scheduling, exporting and synchronizing fingerprints

d)Machine Learning

Register Now