Websense Data Security Suite 201
Overview
During this three‐day training course, delegates will learn how to configure, administer and support Websense Data Security Suite (DSS). Through instruction, demonstrations and hands‐on lab practice exercises, delegates will learn the requirements and recommendations to successfully deploy DSS in a variety of network environments. Delegates will develop expertise in creating data security policies, fingerprinting structured and unstructured content, data discovery, endpoint configuration and deployment, incident management, reporting and system architecture.
Prerequisites
Delegates attending this course should first complete the on-line Level 101 Technical Training.
Who should atte…
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Overview
During this three‐day training course, delegates will learn how to configure, administer and support Websense Data Security Suite (DSS). Through instruction, demonstrations and hands‐on lab practice exercises, delegates will learn the requirements and recommendations to successfully deploy DSS in a variety of network environments. Delegates will develop expertise in creating data security policies, fingerprinting structured and unstructured content, data discovery, endpoint configuration and deployment, incident management, reporting and system architecture.
Prerequisites
Delegates attending this course should first complete the
on-line Level 101 Technical Training.
Who should attend
• Channel Partners: Consultants, system architects, integrators and
planners who help customers with Websense DSS implementations
• Websense Sales Engineers: Websense personnel who provide
pre‐sales and post‐sales support for DSS
• Websense End Users
Delegates will learn how to
At the end of the course, delegates will be able to:
• Understand the DSS Architecture
• Configure initial settings
• Configure the DSS Protector
• Understand various enforcement points
• Understand fingerprinting and discovery
• Identify large scale deployments
• Create different policy levels
• Configure the Protector as an explicit MTA
• Understand the integration between WSGA and DSS
• Configure SMTP agents
• Understand the best practices for configuring and
implementing
Course Outline.
• Introductions
• DLP Introduction and Overview
• Policy Creation
• Key Phrases
• Data Discovery
• PreciseID Database Fingerprinting
• Precise ID File Fingerprinting
• Incidents and Reports
• Sources and Destinations
• Policy Management – Advanced Options
• Protector
• Agent Overview
• Enforcement Points
• Data Endpoint
• Large Scale Deployments
QA reserves the right to improve the specification and format of its courses for the benefit of its customers without notice to the customer.
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
