Cybersecurity Leadership Certification

Enrollment is now closed, please join our waitlist! 

Proofpoint Certified Phishing Specialist

DLP Badge

Fridays on December 2nd, 9th & 16th | 10-11 am PT | 1-2 pm ET

Thank you for showing interest in the Proofpoint Cybersecurity Leadership Program. Unfortunately enrollment is full. Please join our waitlist and we'll email you when the next enrollment opens up!

Phishing threats continually evolve to bypass security programs and human detection, and it only takes one person to fall for phishing to incite a severe data breach. So how do you remain aware and protected in the changing phishing landscape? How do you educate your employees to recognize the warning signs and avoid revealing sensitive information? 

Our Certified Phishing Specialist program is designed to train you on the latest trends and tactics used in modern phishing attacks, provide valuable insight into phishing prevention, and demonstrate how Proofpoint’s people-centric approach can help you better protect your company.  

Becoming certified is easy. Just register and attend the three 1-hour courses listed below, pass the exam at the end of each course, and earn your certification! 

*This track is intended for all levels of cybersecurity administration roles. These are NOT technical training sessions. For product or solution-specific education, please visit our web-based accreditation and instructor-led technical coursesAll courses are eligible for CPE credits through ISC(2).

Course 1

Anatomy of the Phish – Breaking Down the Latest Phishing Attacks

The migration to working from home has forced many security teams to drastically change their defensive strategies to protect end users. In response, threat actors have become more devious, more targeted, and more highly motivated to compromise your sensitive data.   

Attackers are working harder than ever, using new methods and new bait to lure and hook their victims. You’ll learn from the most recent real-world examples of phishing attacks seen by Proofpoint, which utilize Microsoft office collaboration tools and OAuth permissions, TOAD (telephone-oriented attack delivery) methods, text messages, PhaaS supply chains and others. By understanding the way phishers operate, you’ll be better prepared to recognize and combat attacks when they occur in your organization. 

In the first session, we will discuss: 

  • How phishing has evolved in the last several years 
  • Modern phishing techniques including BEC/EAC, advanced social engineering, and more 
  • Recent examples of phishing attacks seen in the wild 
  • Phishing trends to watch out for in the future 

Enroll Now

Course 2

Built to Scale – Creating a Platform for Phishing Prevention

As you learned in our first session, phishing emails come in a variety of forms and flavors, with advanced features designed to bypass even the most cutting-edge security solutions. It’s no surprise then, that phishing attacks like business email compromise are incredibly costly, accounting for more than $2.4B in losses last year alone1.  

Modern threat actors have created entire platforms in hopes of completing a single successful attack. To protect your users and secure all your organization’s potential threat vectors, you need a platform of your own. 

Building a layered security approach with multiple attack stop-gaps and fail-safes is especially crucial to stopping phish. Learn how phishing attacks rely on, and take advantage of various technologies employed by your end users, and how to implement more adaptive controls to reduce your overall attack exposure.  

In the second session, we will discuss: 

  • How a phishing attack can move through your network 
  • Identifying phishing vulnerabilities within your security infrastructure 
  • Why and how to build a layered security approach against phishing 

1Federal Bureau of Investigations (FBI). “Internet Crime Report 2021.” 2021. 

Enroll Now

Course 3

Human Firewall— Prepping Your Users to Fight Phishing

People are the primary target of cybercriminals. And it only takes one person to fall for phishing to incite significant financial loss or a severe data breach. To fight phishing, you need to empower users with the right knowledge and tools, so they can become a strong last line of defense.  

While 73% of organizations conduct formal security awareness training, only 53% of working adults know what the term “phishing” means1. Organizations struggle to improve users’ learning retention and detection efficacy with their current security awareness programs. 

In the third and final session, we will discuss: 

  • How phishing has impacted various industries 
  • The challenges with security awareness training 
  • Best practices for educating your end users 
  • How to measure behavior change 

1(Proofpoint, Inc.). “2022 State of the Phish.” 2022. 

Enroll Now


There are some questions:
  • I've completed the exams. How do I redeem my badge & certificate?

    We will review your submission/attendance and issue your certificate by January 25th, 2023. You will receive an email from our trusted vendor Credly ( with instructions on how to access your digital badge and certificate.

  • What email should I use to register?

    Keep in mind that in order to be able to take the exams, you must use a business email. Please do not register with a personal email such as those with the domain “gmail” or “yahoo.” 

    Please consistently use the same email you registered with throughout the program to ensure the accuracy of tracking your attendance towards getting certified.

  • What if I am unable to attend one of the live sessions?

    If you are unable to attend a live session, you may watch the recording and take the exam by January 6th. All live sessions will be recorded, and you may access the videos from an email that will be sent soon!

  • What is considered a passing grade for each course?

    To pass a course, you would have to attend the session either live or watch on-demand and take the exam at the end of the course. You need to score 100% on each exam to pass the course.

  • How many times can I retake the exams?

    You have unlimited attempts to take the exams to get 100% scores to pass the courses.

  • How long will the recordings and exams be available for me to access?

    You will have until Friday, January 6th, 2023 at 5PM PST to access the course recordings and exams to complete your certification.

  • How long is each course?

    Each course is about 1 hour long. 

  • How much does the certification cost?

    The courses and certification is free.

  • Do I need to watch all three sessions?

    Yes. You are required to watch all three sessions (either on-demand or live) to be eligible for your certification in addition to passing all of your exams. 

  • When will I receive my exam link?

    After you have watched the session (live or on demand), you will receive an email within 1-3 business days after the live session, with the exam link.

Course Instructors

Brian Reed

Senior Director of Cybersecurity Strategy

Brian Reed is the Sr. Director of Strategy at Proofpoint. He comes to Proofpoint from Gartner where he focused on a wide variety of topics - cloud security, data security, incident response, insider threats and security awareness. Since 2015, he published over 50 thought-leading research notes at Gartner. Previous to Gartner, he spent over 15 years in a variety of business development, product management, sales and system engineering roles. He is well known in the information security industry and has spoken at numerous Gartner events, as well as other industry events globally. 

Mark Harris

Cybersecurity Advisor

Mark Harris was a Sr Director Analyst at Gartner where he covered a number of security topics and was the lead author on the Market Guide for Email Security. He authored numerous research notes as well as vendor reports. Prior to Gartner he spent over 20 years in a variety of Software engineering roles at both McAfee and Sophos including 8 years running the threat research labs at Sophos. He has over a dozen patents around cyber security and is an experienced speaker having presented at many conferences including RSA, InfoSec, Hacker Halted as well as TV and Radio interviews. 

Rob Smith

Cybersecurity Advisor

Rob Smith advises Proofpoint on the latest trends and innovations in cybersecurity to assist in keeping Proofpoint as an industry thought leader and innovator. Prior to joining Proofpoint, he was lead analyst for remote access and covered endpoint security and management for Gartner. Mr. Smith was author of numerous industry leading research documents where he defined the cybersecurity industry and its future. He also founded the world’s largest dedicated MSSP and numerous other successful cybersecurity start-ups where he authored 7 industry patents covering VPN access and endpoint security.