Web-based Training

Web-based Accreditation Courses

The Level 1 accreditation gives customers the following benefits:

  • Level 1 course completion prepares students and meets the pre-requisites for attending instructor-led training offered by Proofpoint.
  • Support Portal access is enabled for customers who complete the accreditation within 90 days of product purchase.

Need more Proofpoint Level UP! accounts for your team? Submit a Proofpoint Customer Success Center Case: 
        How to submit a Training Request
Or - Contact your Proofpoint Account Manager to request Proofpoint Level UP! access

LEVEL 1

The Level 1 courses are offered as complementary self-paced learning, through Proofpoint Level UP!. These courses cover a full range of topics across our suite of products and are available from anywhere, anytime. Each of the following courses includes an exam that requires a 75% passing score to attain accreditation.

  • Email Protection
  • Information Protection
  • Threat Response
  • Email Fraud Defense
  • Digital Risk
  • Essentials
  • Archive
  • Targeted Attack Protection (TAP)

Level 1 — Email Protection Web-Based Accreditation

The Level 1 – Email Protection course introduces students to the concepts of email architecture and protection with an emphasis on protecting customers from unwanted or malicious email entering an enterprise. Students have an opportunity to test their knowledge by taking the Level 1 Exam – Email Protection. This Level 1 course is based on PPS 8.8.

Module 1: Email Messages - Describe the process of how SMTP mail servers communicate with each other to send and/or receive mail.
Module 2: PPS Message Path - Explore the many PPS modules as well as the message path process.
Module 3: PPS Deployment - Describe the various deployment options for PPS.
Module 4: PPS Management UI - Describe how to navigate the PPS Administrator interface.
Module 5: Filtering - Discuss the PPS delivery and module precedence order.
Module 6: Rules - Describe a rule and discuss the basics of policy routes, quarantines, and dispositions.
Module 7: User Repository - Describe the user repository as it relates to user hierarchy and filtering.
Exam: Level 1 — Email Protection - Test your knowledge and earn the Level 1 for Threat Response for Administrators certificate.

Duration: 1.5 hours

Click here to view the Course Data Sheet.

Level 1 — Information Protection Web-Based Accreditation

The Level 1 – Information Protection course introduces students to the concepts of email architecture and information protection with an emphasis on identifying and protecting sensitive data in-transit and at-rest. Students have an opportunity to test their knowledge by taking the  Level 1 — Information Protection. This Level 1 course is based on PPS 8.8.

Module 1: Email Messages - Describe the process of how SMTP mail servers communicate with each other to send and/or receive mail.
Module 2: PPS Message Path - Explore the many PPS modules as well as the message path process.
Module 3: PPS Deployment - Describe the various deployment options for PPS.
Module 4: PPS Management UI - Describe how to navigate the PPS Administrator interface.
Module 5: Filtering - Discuss the PPS delivery and module precedence order.
Module 6: Rules - Describe a rule and discuss the basics of policy routes, quarantines, and dispositions.
Module 7: User Repository - Describe the user repository as it relates to user hierarchy and filtering
Exam: Level 1 — Information Protection - Test your knowledge and earn the Level 1 for Threat Response for Administrators certificate.

Duration: 1.5 hours

Click here to view the Course Data Sheet.

Level 1  Threat Response Auto-Pull

The Level 1 – Threat Response Auto-Pull (TRAP) course examines TRAP installation and configuration from the point-of-view of customers working with Professional Services. This Level 1 course is based on Threat Response version 3.5.

Module 1: Course Overview - Describe how the course aligns with Professional Services and how to get the most from the course.
Module 2: TRAP Kickoff - Explore what happens during and after the kickoff call including follow-up tasks such as information gathering and VM installation.
Module 3: Configuration - Describe how to add users, configure email alerts, and communicate with Targeted Attack Protection (TAP).
Module 4: Configuring Microsoft O365 - Describe how to create quarantine and service accounts in O365 and how to configure TRAP to automatically quarantine messages.|
Module 5: Configuring G Suite - Describe how to create a project and quarantine account in G Suite and how to configure TRAP to automatically quarantine messages.
Module 6: Navigation - Describe how to navigate the TRAP user interface and identify the portions that are needed to get the most out of TRAP.
Module 7: Threat Response Usage - Describe how to quarantine email imported from Smart Search, CSV files, and the Abuse Mailbox monitor.
Module 8: Appliance Maintenance - Describe how to backup and restore configuration, perform system upgrades, and collect information for technical support.
Exam: Level 1 for Threat Response Auto-Pull Exam - Test your knowledge and earn the Level 1 for Threat Response Auto-Pull certificate.

Duration: 1.5 hours

Click here to view the Course Data Sheet.

 

Level 1 — Threat Response for Administrators Web-Based Accreditation

The Level 1 – Threat Response (PTR) for Administrators course provides instruction on the implementation, configuration, and maintenance of Proofpoint Threat Response. This Level 1 course is based on Threat Response version 3.1.

Module 1: Planning and Installing Proofpoint Threat Response - Describe the VM and port requirements and how to install PTR.
Module 2: Configuring Threat Response I - Describe the initial configuration processes required to place Threat Response on the network.
Module 3: Configure Threat Response II - Describe how to configure PTR to communicate with the Domain Controller and Active Directory.
Module 4: Configure Threat Response III - Describe how to configure information sources in the System Settings menu including STIX/TAXII feeds, PC Data Collection, and Exchange Server configuration.
Module 5: Sources - Describe how to add alert sources through the main interface.
Module 6: Devices - Describe how to add devices through the main interface.
Module 7: Lists - Describe how to create lists in the main interface.
Module 8: Dashboard - Describe how to navigate the dashboards in PTR.
Module 9: Incidents - Describe how PTR processes alerts and creates incidents.
Module 10: Reports - Describe how to create reports in Threat Response.
Exam: Level 1 for Threat Response for Administrators - Test your knowledge and earn the Level 1 for Threat Response for Administrators certificate.

Duration: 2 hours

Click here to view the Course Data Sheet.

 

Level 1 — Threat Response for Security Analysts Web-Based Accreditation

The Level 1 – Threat Response for Security Analysts course identifies processes that Security Analysts can use to respond to incidents from multiple sources. The Level 1 – Threat Response for Security Analysts course is based on Threat Response version 3.2.

Module 1: Threat Response Overview - Describe the role of Proofpoint Threat Response (PTR) and where it fits into a security architecture.
Module 2: The Security Admins’ Interface - Describe what information is available within the Threat Response interface and how to navigate the interface.
Module 3: Incidents - Describe how to use Proofpoint Threat Response to investigate multiple types of security incidents.
Module 4: Enrichment - Describe how to display and configure information on enrichment sources, discuss the connection between lists and devices, and how to display and export reports.
Exam: Level 1 for Threat Response for Security Analysts - Test your knowledge and earn the Level 1 for Threat Response for Security Analysts certificate.

Duration: 2 hours

Click here to view the Course Data Sheet.

Level 1 — Email Fraud Defense Web-Based Accreditation

The Level 1 – Email Fraud Defense course provides an overview of Proofpoint Email Fraud Defense, a thorough grounding in understanding email fraud, and how to use Email Fraud Defense and Email Brand Defense to protect against it.

Module 1: Email Fraud Threats - Provides an overview of the mail fraud threats, including spam, phishing, spoofing, and explains how Email Fraud Defense and Email Brand defense can help protect against them.
Module 2: Email Authentication - Looks at the 3 main authentication protocols, SPF, DKIM, and DMARC. Explains the importance of DMARC as the only means to ensure email authentication for your domains.
Module 3: Implementation Requirements - Examines the product onboarding process, email governance and monitoring, policy enforcement and evaluation, and ongoing maintenance.
Module 4: UI Overview - Explores the Email Fraud Defense UI and looks at domains, data filtering, reports and alerts.
Module 5: Email Brand Defense - Gives a detailed explanation of the product’s Email Brand Defense functionality. Looking at filtering, details views, and how to create brand defense whitelists.
Exam: Level 1 for Proofpoint Email Fraud Defense - Test your knowledge and earn the Level 1 for Proofpoint Email Fraud Defense certificate.

Duration: 1.5 hours

Click here to view the Course Data Sheet.

Level 1 — Social Media Protection (Digital Risk) Web-Based Accreditation

The Level 1 – Social Media course introduces students to both SocialDiscover and SocialPatrol. Students have an opportunity to test their knowledge by taking the Level 1 Exam — Email Protection.

Module 1: Advantages of Social Media - Describe why it is important for organizations to manage security for social media.
Module 2: SocialDiscover - Describe the purpose of SocialDiscover.
Module 3: Authenticate - Describe the authentication process for SocialDiscover.
Module 4: Find Accounts - Describe how to locate social media accounts using SocialDiscover.
Module 5: Tagging - Discuss how to tag an account in SocialDiscover.
Module 6: Reporting - Describe how to report on a list of accounts using SocialDiscover.
Module 7: SocialPatrol - Describe the purpose and installation SocialPatrol.
Module 8: Policies - Describe content and custom policies within SocialPatrol.
Module 9: Profile Lock - Describe how to enable Profile Lock within SocialPatrol.
Module 10: Incident Notification - Describe how to configure a notification policy in SocialPatrol.
Module 11: Moderate Content - Explore the process of content moderation within SocialPatrol.
Module 12: View Administrators - Describe how to view Account Administrators within SocialPatrol.
Exam: Level 1 for Social Media Protection - Test your knowledge and earn the Level 1 for Social Media Protection certificate.

Duration: 1.5 hours

Click here to view the Course Data Sheet.

 

Level 1 — Digital Risk: System Settings

The Level 1 – Digital Risk course reviews each of the seven system settings.

Lesson 1: Introduction, Permissions and Access Introduction, permissions and accessing Digital Risk system settings
Lesson 2: My Info Describes two factor authentication, connecting social media accounts, edit user and company information and uploading a list of emails for Profile Management
Lesson 3: Manage Clients Describes what clients are, how to create new, edit and delete clients
Lesson 4: Manage Users Describes how to add a new, terminate or disable a user and reset a user’s password
Lesson 5: Manage Roles Describes how to built-in system roles and how to create a new, edit, customize (duplicate) or delete a role
Lesson 6: Manage Teams Describes how to what teams are and benefits of usage and how to add new, edit existing or delete teams
Lesson 7: External Apps Describes how to integrate publishing application using a key
Lesson 8: Audit Logs Describes how to access and export logs with information regarding system changes including date, type, name, actor and changes made

Duration: 1 hour
Prerequisite: Successful completion of Level 1 — Fundamentals of Social Patrol WBT

Click here to view the Course Data Sheet.

 

Level 1 — Digital Risk: Fundamentals of Social Patrol

The Level 1 – Digital Risk course provides an overview of Digital Risk: Social Patrol including a review of product use cases, benefits, features, digital compliance and user success stories.

Lesson 1: Digital Risk Overview
Describes the increased risk associated with the use of corporate and employee social media accounts Introduction, permissions and accessing Digital Risk system settings
Lesson 2: Use Cases
Describes uses of Social Patrol for protection against digital risk
Lesson 3: Patrol Advantages
Describes the seven benefits associated with the Social Patrol product
Lesson 4: Social Patrol Features in a "Flash"
Learn about key concepts associated with the Digital Compliance product including: Dashboard and Reporting, Content Supervision, Archive Delivery, Compliance Policies, Social Selling, Profile Management and Review Options
Lesson 5: User Success Stories
Understand the digital challenges of today and the successes of implementing and using Social Patrol and Digital Compliance

Duration: 15 minutes

Click here to view the Course Data Sheet.

 

Level 1 — Social Patrol: Managing Configurations

The Level 1 – Social Patrol covers the best practices, step-by-step processes, case examples and videos for managing Proofpoint Social Patrol configurations. These include Profile Notifications, Incident Notifications, Install Overview Page and Install URL.

Lesson 1: Configuration Menu Understand how to access the configuration menu.
Lesson 2: Profile Notifications Describes the process to create a new rule using ProfileLock or Profile Manager, edit and delete For All Changes Notify: and For Changes Classified as: for a notification rule.
Lesson 3: Incident Notifications Describes the process to create, edit and delete an incident notification policy.
Lesson 4: Install Overview Pages Describes the process to create, access, incorporate, edit and delete an overview page.
Lesson 5: Install URL Describes the process of using the Install URL option, including how to create, edit and delete a URL configuration.

Duration: 40 minutes
Prerequisite: Successful completion of Level 1 — Fundamentals of Social Patrol, System Settings WBT

Click here to view the Course Data Sheet.

 

Level 2 — Digital Risk: Social Patrol Conquering Content Policies

The Level 2 – Digital Risk course incorporates best practices, step-by-step processes and short videos for content policies including key concepts, built-in policies, content categories, classifiers actions, how to create a new, edit, duplicate to customize, revert and delete a policy, access, filter and export an audit log.

Lesson 1: Definition, Permissions and Access Understand content policies, required system permissions and how to access content policies in Social Patrol
Lesson 2: Key Terms in a "Flash" Understand key terms associated with content policies including Brand (Outbound) Policy, Brand Social Media Accounts, Built-In Policies, Classifiers, Classifiers Actions, Commenter (Inbound) Policy, Dynamic/Interactive Content, Individual Social Media Accounts, Scan-Only, Social Selling Media Accounts and Static Content
Lesson 3: Built-in Policies and Classifiers Understand built-in policies, benefits, classifiers and brand versus commenter content
Lesson 4: Content Classifier Actions Describes the five actions taken on a content policy classifier: none, log, notify, hide and/or delete
Lesson 5: Informational Categorizations Describes when the “Notify” action is selected Lesson 6: Customize a Content Policy: Two Options Describes how to customize a content policy using the create new or by duplicating a built-in policy
Lesson 7: Edit a Content Policy Describes how to edit a current content policy category classifier action
Lesson 8: Delete a Content Policy Describes how to delete a customized policy
Lesson 9: Revert a Content Policy Describes how to undo clear policy classifier actions
Lesson 10: Audit Policy Changes Log Describes how to access and review audit log changes by date and user and exporting a log to a CSV file

Duration: 40 minutes
Prerequisite: Successful completion of Level 1 — Fundamentals of Social Patrol WBT

Click here to view the Course Data Sheet.

Level 1 — Essentials Web-Based Accreditation

The Level 1 – Proofpoint Essentials course provides an overview of Proofpoint Essentials and a thorough grounding in the common set-up and on-going maintenance tasks carried out by Essentials administrators.

Module 1: Essentials Overview - Provides an overview of the course; looks at the Essentials user interface, how licensing works in the product, and common administration tasks.
Module 2: Domain Management - Covers adding and testing domains in Proofpoint Essentials. The module also looks at setting up sending servers, enabling hosted services like O365 and Google apps, and configuring relaying for O365.
Module 3: User Management - Looks at adding and managing users’ groups in the Essentials user repository. Including managing admin users, and emergency inbox.
Module 4: Filters and Sender Lists - Explores how filters work in Essentials, including how to set up encryption and extension filters, as well as how to use filters for data loss prevention. In addition, we look at how to set up blocked and safe sender lists at company, group and user levels.
Module 5: Spam and Digest Management - Explains how to use Essentials to manage spam and set up and manage quarantine digests. The module looks at configuring the URL Defense URL rewriting service, and provides an overview of the Attachment Defense attachment scanning service.
Module 6: Branding, Notifications and Disclaimers - Examines how to brand Essentials end-user communications with your own look and feel, configure notifications, and add disclaimer text to emails.
Module 7: Logs and Reports - Shows how to access logs for different accounts types, search logs for messages, and perform actions such as reporting false negatives or positives. This module also looks at Essentials’ default reports, creating custom reports, and report scheduling.
Module 8: Archiving - Goes into depth on setting up SMTP and O365 connections for the Essentials Archive, configuring retention periods, and searching for archived mail.
Exam: Level 1 for Proofpoint Essentials - Test your knowledge and earn the Level 1 for Proofpoint Essentials certificate.

Duration: 1.5 hours

Click here to view the Course Data Sheet.

Level 1 — Archive: Intelligent Supervision Web-Based Accreditation

The Level 1 – Proofpoint Intelligent Supervision course provides instruction on basic use of Intelligent Supervision including message review and monitoring. This Level 1 course is based on Proofpoint Enterprise Archive version 4.0.

Module 1: Intelligent Supervision Overview - Describe the needs addressed by Proofpoint Enterprise Archive and the features and benefits of Proofpoint Intelligent Supervision.
Module 2: The Dashboard - Interpret and use items on the Supervision dashboard based on your assigned role, quickly identify a backlog, and quickly access the message review screen.
Module 3: Message Review - Access, review, and take action on assigned messages, quickly view a violation and its text, filter contents of the message list, and view messages in a conversation thread.
Module 4: Past Review and Search - Use Past Review to review actions taken on messages, use Find Related to search for similar messages in the full Archive and use Search to locate and group messages for quick review.
Module 5: Exports - Create an Export job to a selected format, identify the meaning of the Export job status, share, upload, and download export results.
Module 6: Reports and Alerts - Select and create appropriate reports as required, create reports for immediate display, schedule reports to run at set times, and create and share alerts with specific individuals.
Exam: Level 1 for Proofpoint Enterprise Archive Intelligent Supervision Exam - Test your knowledge and earn the Level 1 for Proofpoint Enterprise Archive Intelligent Supervision certificate.

Duration: 2 hours

Click here to view the Course Data Sheet.

 

Level 1 — Proofpoint Enterprise Archive Administration 

The Level 1 – Proofpoint Enterprise Archive Administration course provides instruction on basic use of the archive and an overview of how the archive works and its administrative functions.  This Level 1 course is based on Proofpoint Enterprise Archive version 4.0.

Module 1: Search - Describe how the conduct a basic search in the message subject, body, and attachments, and review the results of your search.
Module 2: Advanced Search - Explore additional options when searching the archive to expand the filters to further refine the search results beyond parameters available in a basic search.
Module 3: Saved Search - Describe how to save and organize search criteria to re-use the search criteria later to make your search process more efficient.
Module 4: Folders - Describe how to collect and organize your Personal Archive search results into archive folders to store specific search results.
Module 5: Exports - Describe how to export messages from the archive for use on external systems.
Module 6: Archive Administration Overview - Describe how Proofpoint Enterprise Archive works, the name resolution process, control of user permissions, use of info tags, message retention policies, disposition process, use of roles, departments, and partners, archive audit trail and reporting, and how to effectively work with Product Support.
Exam: Level 1 for Proofpoint Enterprise Archive Administration Exam - Test your knowledge and earn the Level 1 for Proofpoint Enterprise Archive Administration certificate.

Duration: 0.75 hours

Click here to view the Course Data Sheet.

Targeted Attack Protection (TAP) for Level 1

Training course (no accreditation exam) – Web Based Training

TAP Overview: This video describes how TAP fits into the overall inbound email process.
TAP Attachment Defense: This video describes how Attachment Defense works as well as an overview of the settings and supported files.
TAP URL Defense: This video describes how URL Defense works as well as an overview of the settings and rewrite function.
TAP Dashboard: This video describes the many tools, settings, and search functions within the TAP Dashboard.

Duration: 0.75 hours

Click here to view the Course Data Sheet.