Labs and Certifications
Labs and Certifications
Labs and Certifications

Better insights, bolstered credentials

Get skills and training to future-proof your career and your security operations

Certification Exams
Enhance your security. Advance your career.

Become a Proofpoint Certified Guardian at Proofpoint Protect 2025

Earn your technical credentials to validate your expertise in the Proofpoint human-centric security platform, industry trends, and best practices—while demonstrating your commitment to continuous learning.

Proofpoint is excited to announce the launch of our brand-new Administrator-level certifications. This is your opportunity to gain industry-recognized credentials in our Threat Protection and Data Security tracks—two of the most in-demand fields today.

Image
Guardian Badge
Proofpoint certified guard

Whether it’s to deepen your expertise, level up or validate your skills, now’s the perfect time to take the next step.

For more details on Proofpoint technical trainings and certifications, please visit the Proofpoint Cybersecurity Academy.

Proofpoint Protect 2025 offers five unique technical Guardian certifications

Certified Threat Protection Administrator

Exam Duration Up to 90 Minutes

Exam Duration Up to 90 Minutes

Validates a security administrator’s expertise in configuring, maintaining, and troubleshooting the Threat Protection platform, including components such as Email Protection, the TAP dashboard, and Threat Response Auto-Pull.

Focuses on the core Proofpoint Threat Protection platform, including Email Protection, Targeted Account Protection, and Threat Response Auto-Pull.

Certified Data Security Administrator

Exam Duration Up to 90 Minutes

Exam Duration Up to 90 Minutes

Validates a cybersecurity administrator’s expertise in configuring and maintaining the Data Security platform, including system setup, organizational security policy configuration, DLP identifiers and detector sets, as well as performing ongoing maintenance and reporting tasks.

Focuses on the Proofpoint Data Security platform, including Platform administration, Endpoint DLP, Insider Threat Management and CASB.

Certified Essentials Administrator

Exam Duration Up to 90 Minutes

Exam Duration Up to 90 Minutes

Validates a cybersecurity administrator's ability to configure and administer the Proofpoint Essentials platform, including security awareness training, data loss prevention, email continuity, archiving and social media protection.

Focuses on the Proofpoint Essentials platform.

Certified People Protection Analyst

Exam Duration Up to 90 Minutes

Exam Duration Up to 90 Minutes

Validates a professional's in-depth knowledge and hands-on experience with Proofpoint’s leading security products by earning a certification that showcases the ability to defend against complex cyberthreats.

Focuses on using the comprehensive Proofpoint suite, including Targeted Account Protection, Threat Response Auto-Pull, and Email Protection.

Certified Information Protection Analyst

Exam Duration Up to 90 Minutes

Exam Duration Up to 90 Minutes

Validates analysts' skills needed to ensure the integrity and confidentiality of critical data assets, focusing on on key cybersecurity tasks such as sophisticated data analysis, proactive threat containment and comprehensive incident management.

Focuses on the Proofpoint advanced analytics dashboard, Insider Threat Management, and Cloud DLP products.

Certification Prep
Certification Prep

Access exclusive resources to prep for your certification exam

Why certify?Hear from Proofpoint Certififed Guardians

Benefits of training

Hands-On Labs
Take advantage of our hands-on training labs, available all day. Drop in at your convenience to sharpen your skills, practice key concepts, and get exam ready!

Benefits of training

Study Pod
Step into our designated study pod, where expert instructors lead engaging content reviews, answer your questions, and help you solidify key concepts to excel in your exams.

Benefits of training

Online Training Courses
We offer online training courses, complimentary as a part of your Proofpoint Protect registration. Once registered, you’ll receive an email to access our training materials in our Cybersecurity Academy.

Protect Onsite Labs
Protect Onsite Labs

Get hands-on experience with the latest Proofpoint innovations

learn at your own pace

Learn at your own pace

Our Certification and Discovery Labs are self-paced, so you can explore and learn on your terms. This ensures a personalized and thorough understanding of the solutions that comprise the Proofpoint human-centric security platform.

Explore cutting-edge topics

Attendees have the opportunity to deep dive into Proofpoint technologies while getting prepared for their certification exams—from advanced threat protection to data loss prevention and beyond. 

Explore cutting-edge topics
Proofpoint Protect Labs
Real-world cyber challenges. Simulate, investigate, solve.

Your gateway to cutting-edge cybersecurity insights and hands-on learning

Designed for security professionals, this immersive experience features two specialized tracks:

  • Threat Protection Track – Dive deep into the evolving threat landscape with real-world attack scenarios, advanced threat intelligence, and best practices for stopping threats before they reach your people.
  • Data Security Track – Explore how to safeguard sensitive data across cloud, email, and endpoints. Discover how to prevent data loss, detect insider threats, and ensure compliance in a rapidly evolving digital environment.

Whether you're focused on stopping threats or securing data, Proofpoint Protect Labs equips you with the knowledge and tools to stay ahead.

Data Security and Governance

Data Loss Prevention and Insider Threat Management – Better Together

Protect against insider threats with on-demand visibility

Protect against insider threats with on-demand visibility

In this lab, you will simulate an insider threat by exfiltrating data via USB and generative AI platforms using multiple vectors. You will then transition to an analyst role to perform forensic investigation and generate a report for HR/Legal. The lab demonstrates Proofpoint’s advanced detection, GenAI-assisted investigation, and Dynamic Policy Orchestration capabilities for comprehensive insider threat response.

  • Understand the difference between DLP and ITM Visibility
  • See how Dynamic Policy automatically escalates the monitoring based on risky activity
  • Learn how Proofpoint protects against proprietary data leaving the organization through GenAI
  • Experience the simplicity of searching and reporting with Proofpoint’s Data Security Workbench
Data Security and Governance

Preventing Data Leaks with DSPM and DLP

Identifying and mitigating sensitive data exposure in M365 with DSPM and DLP

Identifying and mitigating sensitive data exposure in M365 with DSPM and DLP

Participants will investigate an insider threat scenario involving a disgruntled Royalties Analyst. After identifying overshared sensitive files in M365, they’ll analyze DSPM findings, revoke shared links, and apply DLP policies to mitigate exposure—demonstrating how DSPM enables proactive risk detection and remediation.

  • Detect over-permissive sharing of sensitive data in SharePoint and OneDrive
  • Investigate user behavior and file sharing patterns using DSPM metadata
  • Use DSPM to remove improperly shared links
  • Apply MIP labels to sensitive files for future enforcement
  • Understand how DSPM fits into an insider threat response workflow
Data Security and Governance

Adaptive Email DLP

Catch risky insiders exfiltrating sensitive data and sending misdirected emails

Catch risky insiders exfiltrating sensitive data and sending misdirected emails

In this lab, we use multiple cases to demonstrate how Adaptive Email DLP (AEDLP) automatically detects and prevents misdirected emails, misattached files, and the sending of sensitive data to personal or unauthorized email accounts.

  • Explore real-world email data exfiltration scenarios
  • Experience behavioral AI in action
  • Learn how contextual banners prevent misdirected emails
  • Test the platform in a cloud-hosted lab environment
Data Security and Governance

Digital Communications Governance

"Preserving Truth, uncovering evidence – Lock it. Find it. Prove it."

"Preserving Truth, uncovering evidence – Lock it. Find it. Prove it."

In this lab, you will learn to easily respond to regulatory inquiries while saving time and reducing legal discovery costs. We will preserve the data of disgruntled employee and investigate to identify incriminating data to produce as evidence. This lab will highlight our sophisticated feature set to find the proverbial “needle in a hay stack".

  • Experience the robust feature set of the Data Communications Governance (DCG) solution
  • Learn to identify, preserve, and collect relevant digital evidence from sources in a forensically sound manner
  • Learn skills to analyze and interpret digital evidence to support legal or investigative objectives
  • Learn to apply legal, ethical, and regulatory considerations related to e-discovery and digital data handling
Threat Protection

PRIME: User Protection

Multichannel Protection. Multistage Detection. Human-Centric Resilience

Multichannel Protection. Multistage Detection. Human-Centric Resilience

In this 40-minute lab, analysts will investigate a multi-vector attack involving blocked phishing and Teams payloads, triggering ZenGuide-driven training. As the attacker escalates and bypasses MFA, ATO Protection detects the compromise, maps the full kill chain, and initiates automated remediation.

  • See how Collab Protection identifies and blocks malicious links delivered through platforms like Teams or Slack, protecting users beyond email
  • Learn how ZenGuide automatically assigns targeted training to users at risk or actively being attacked, based on behavior and role
  • Explore how Account Takeover Protection (ATO) correlates threat actor activity across the attack sequence and remediates compromised accounts in real time
Threat Protection

Core Email Protection – Secure Email Gateway and Threat Protection Platform

Protecting Your Favorite Comic Book Heroes

Protecting Your Favorite Comic Book Heroes

In this hands-on lab, you’ll see how Proofpoint’s Core Email Protection Gateway can quickly find threats, in-depth threat details, auto remediation, and the new Threat Workbench for SOC analysts. You should walk away with a high-level understanding of the Proofpoint Threat Protection Platform.

  • Understand how to find emails with Smart Search
  • See how quickly you can find in-depth threat details in the TAP Dashboard
  • Experience the simplicity of searching and reporting with Proofpoint’s Threat Protection Workbench
  • Learn how to seamlessly use the Proofpoint Threat Protection Platform to protect the organization
Threat Protection

Core Email Protection – API

Augment Microsoft 365 with Proofpoint for Better Protection and Fewer Headaches

Augment Microsoft 365 with Proofpoint for Better Protection and Fewer Headaches

In this lab, you'll explore how Proofpoint’s Core Email Protection API integrates with M365 to enhance threat detection, automate response, and streamline investigations. You'll leverage advanced search, forensic reporting, and Microsoft-integrated user feedback to reduce false positives and accelerate remediation workflows.

  • See email threat metrics in Insights
  • Investigate threats in Security Events
  • View ATOs in Compromised Accounts
  • Search in Investigation & Response
Threat Protection

A Proactive Strategy to Combat Impersonation Attacks – Practical Application

Protect from being impersonated, secure your application email, and proactively takedown lookalike domains—All in 1-hour!

Protect from being impersonated, secure your application email, and proactively takedown lookalike domains—All in 1-hour!

SOC Admin combats impersonation by implementing a robust DMARC policy for user- and application-generated email and proactively shuts down malicious lookalikes, thereby protecting his company’s brand reputation.

  • Basic understanding of Proofpoint’s Email Authentication capabilities
  • How to secure application email as part of your DMARC Journey
  • How to proactively take down malicious domains and URLs
Threat Protection

SaaS and Identity Posture Management Lab

Uncover shadow apps and SaaS misconfigurations to reduce exposure and risk

Uncover shadow apps and SaaS misconfigurations to reduce exposure and risk

This lab explores key SIPM use cases: detecting shadow SaaS to assess risk, enabling secure offboarding, reducing license sprawl, and remediating SaaS misconfigurations. You'll also see how SIPM addresses root-cause posture issues to prevent recurring cloud DLP incidents.

  • Discover the shadow SaaS landscape.
  • Understand SaaS MFA coverage gaps and how to address them.
  • Learn how to effectively remediate SaaS vulnerabilities.
  • Put the platform to the test in a cloud-hosted lab.