Cybersecurity Leadership Certification

Winter Semester 2023

2022 graduates, renew your badges for 2023 here.

Proofpoint Certified Identity Threat Specialist

Courses

Friday, November 3rd

10 am PT | 1pm ET

Foundations of Identity Threat Defense

Friday, November 10th

10 am PT | 1 pm ET

The Problem with Conventional Identity Threat Defense

Friday, November 17th

10 am PT | 1pm ET

How to Build a Comprehensive Identity Threat Protection Program

Course 1

Foundations of Identity Threat Defense

To effectively protect against identity threats, you must first understand the fundamentals of how digital identities function and how organizations manage them—from authorization and access to monitoring to threat response. 

In the first course of our three-part certification program, we will explore: 

  • The definition of identity and key identity terms 
  • The history of Active Directory and why 95% of organizations leverage it2 
  • The cross-functional teams typically responsible for managing identities 

2 Adaxes. “Active Directory Facts. Infographics.” 2023. 

Enroll Now

Course 2

The Problem with Conventional Identity Threat Defense

Today, most organizations deploy Multi-Factor Authentication (MFA) and/or Privilege Access Management (PAM) to authenticate users and manage their access to sensitive data. However, because of the volatility and ever-changing threat landscape, these privilege access and authentication solutions are not enough.

In our second course, we will dive into the vulnerabilities of this traditional MFA and PAM approach and why organizations must implement more controls to uncover attack paths and stop lateral movement.

Join us to learn about:

  • How attackers get access to highly privileged accounts in environments that leverage PAM 
  • How attackers get around MFA protections, from adversary-in-the-middle phishing to stale and service accounts 
  • How to address common implementation gaps of these tools 

Enroll Now

Course 3

How to Build a Comprehensive Identity Threat Protection Program

Understanding the core aspects of your identity-based environment is important—but it’s not enough to keep your people and data safe from identity-based threats.

To effectively defend your organization, you need to understand what it takes to build a comprehensive identity threat protection program—one that uncovers attack paths before attackers do, and stops lateral movement. 

In our last course of the certification series, you’ll learn: 

  • How to assess your organization’s identity threat posture 
  • The best practices for building an identity threat defense program, including people, process, and technology 
  • How to move from point-in-time analyses of identity threats, like red teams, to operationalize identity risk mitigation  

Enroll Now

FAQs

There are some questions:

What email should I use to register?

Keep in mind that in order to be able to take the exams, you must use a business email. Please do not register with a personal email such as those with the domain “gmail” or “yahoo.” 

Please consistently use the same email you registered with throughout the program to ensure the accuracy of tracking your attendance towards getting certified.

I can't get into the live session, it says it's full.

Please note that our live sessions have a seat limitation and will be on a first-come first-served basis. If you are unable to join the live session, you can always watch the recording on-demand to count towards your certification.

What if I am unable to attend one of the live sessions?

If you are unable to attend a live session, you may watch the recording and take the exam by Dec. 22nd, 5 PM PT. All live sessions will be recorded, and you may access the videos from an email that will be sent soon!

What is considered a passing grade for each course?

To pass a course, you would have to attend the session either live or watch on-demand and take the exam at the end of the course. You need to score 100% on each exam to pass the course.

How many times can I retake the exams?

You have unlimited attempts to take the exams to get 100% scores to pass the courses.

How long will the recordings and exams be available for me to access?

You will have until Dec. 22nd, 5 PM PT to access the course recordings and exams to complete your certification.

How long is each course?

Each course is about 1 hour long. 

How much does the certification cost?

The courses and certification are free.

Do I need to watch all three sessions?

Yes. You are required to watch all three sessions (either on-demand or live) to be eligible for your certification in addition to passing all of your exams. 

When will I receive my exam link?

After you have watched the session (live or on-demand), you will receive an email within 1-3 business days after the live session, with the exam link.

I can't take my exam, it won't allow me access.

If you are running into problems accessing the exam, here are some ways you can try to resolve the issue:

  • Please try to get the exam link whitelisted
  • Turn off your company VPN, it might be blocking the website
  • Use a personal computer to take the exam
I've completed the exams. How do I redeem my badge & certificate?

We will review your submission/attendance and issue your certificate during the beginning of January. You will receive an email from our trusted vendor Credly (admin@credly.com) with instructions on how to access your digital badge and certificate.

 

For the AI/ML Certification, you will be issued your badge and certificate via Credly at the beginning of October.

My badge expired, how can I get it renewed?

All 2022 graduates for Ransomware, DLP, and Phishing are eligible to get their badge(s) and certificate(s) renewed for 2023. Follow the instructions at the link here.

Enroll now to get certified!