
Get skills and training to future-proof your career and your security operations
Earn your technical credentials to validate your expertise in the Proofpoint human-centric security platform, industry trends, and best practices—while demonstrating your commitment to continuous learning.
Proofpoint is excited to announce the launch of our brand-new Administrator-level certifications. This is your opportunity to gain industry-recognized credentials in our Threat Protection and Data Security tracks—two of the most in-demand fields today.
For more details on Proofpoint technical trainings and certifications, please visit the Proofpoint Cybersecurity Academy.
Exam Duration Up to 90 Minutes
Exam Duration Up to 90 Minutes
Validates a security administrator’s expertise in configuring, maintaining, and troubleshooting the Threat Protection platform, including components such as Email Protection, the TAP dashboard, and Threat Response Auto-Pull.
Focuses on the core Proofpoint Threat Protection platform, including Email Protection, Targeted Account Protection, and Threat Response Auto-Pull.
Exam Duration Up to 90 Minutes
Exam Duration Up to 90 Minutes
Validates a cybersecurity administrator’s expertise in configuring and maintaining the Data Security platform, including system setup, organizational security policy configuration, DLP identifiers and detector sets, as well as performing ongoing maintenance and reporting tasks.
Focuses on the Proofpoint Data Security platform, including Platform administration, Endpoint DLP, Insider Threat Management and CASB.
Exam Duration Up to 90 Minutes
Exam Duration Up to 90 Minutes
Validates a cybersecurity administrator's ability to configure and administer the Proofpoint Essentials platform, including security awareness training, data loss prevention, email continuity, archiving and social media protection.
Focuses on the Proofpoint Essentials platform.
Exam Duration Up to 90 Minutes
Exam Duration Up to 90 Minutes
Validates a professional's in-depth knowledge and hands-on experience with Proofpoint’s leading security products by earning a certification that showcases the ability to defend against complex cyberthreats.
Focuses on using the comprehensive Proofpoint suite, including Targeted Account Protection, Threat Response Auto-Pull, and Email Protection.
Exam Duration Up to 90 Minutes
Exam Duration Up to 90 Minutes
Validates analysts' skills needed to ensure the integrity and confidentiality of critical data assets, focusing on on key cybersecurity tasks such as sophisticated data analysis, proactive threat containment and comprehensive incident management.
Focuses on the Proofpoint advanced analytics dashboard, Insider Threat Management, and Cloud DLP products.
Why certify?Hear from Proofpoint Certififed Guardians
Hands-On Labs
Take advantage of our hands-on training labs, available all day. Drop in at your convenience to sharpen your skills, practice key concepts, and get exam ready!
Study Pod
Step into our designated study pod, where expert instructors lead engaging content reviews, answer your questions, and help you solidify key concepts to excel in your exams.
Online Training Courses
We offer online training courses, complimentary as a part of your Proofpoint Protect registration. Once registered, you’ll receive an email to access our training materials in our Cybersecurity Academy.
Our Certification and Discovery Labs are self-paced, so you can explore and learn on your terms. This ensures a personalized and thorough understanding of the solutions that comprise the Proofpoint human-centric security platform.
Attendees have the opportunity to deep dive into Proofpoint technologies while getting prepared for their certification exams—from advanced threat protection to data loss prevention and beyond.
Designed for security professionals, this immersive experience features two specialized tracks:
Whether you're focused on stopping threats or securing data, Proofpoint Protect Labs equips you with the knowledge and tools to stay ahead.
Protect against insider threats with on-demand visibility
Protect against insider threats with on-demand visibility
In this lab, you will simulate an insider threat by exfiltrating data via USB and generative AI platforms using multiple vectors. You will then transition to an analyst role to perform forensic investigation and generate a report for HR/Legal. The lab demonstrates Proofpoint’s advanced detection, GenAI-assisted investigation, and Dynamic Policy Orchestration capabilities for comprehensive insider threat response.
Identifying and mitigating sensitive data exposure in M365 with DSPM and DLP
Identifying and mitigating sensitive data exposure in M365 with DSPM and DLP
Participants will investigate an insider threat scenario involving a disgruntled Royalties Analyst. After identifying overshared sensitive files in M365, they’ll analyze DSPM findings, revoke shared links, and apply DLP policies to mitigate exposure—demonstrating how DSPM enables proactive risk detection and remediation.
Catch risky insiders exfiltrating sensitive data and sending misdirected emails
Catch risky insiders exfiltrating sensitive data and sending misdirected emails
In this lab, we use multiple cases to demonstrate how Adaptive Email DLP (AEDLP) automatically detects and prevents misdirected emails, misattached files, and the sending of sensitive data to personal or unauthorized email accounts.
"Preserving Truth, uncovering evidence – Lock it. Find it. Prove it."
"Preserving Truth, uncovering evidence – Lock it. Find it. Prove it."
In this lab, you will learn to easily respond to regulatory inquiries while saving time and reducing legal discovery costs. We will preserve the data of disgruntled employee and investigate to identify incriminating data to produce as evidence. This lab will highlight our sophisticated feature set to find the proverbial “needle in a hay stack".
Multichannel Protection. Multistage Detection. Human-Centric Resilience
Multichannel Protection. Multistage Detection. Human-Centric Resilience
In this 40-minute lab, analysts will investigate a multi-vector attack involving blocked phishing and Teams payloads, triggering ZenGuide-driven training. As the attacker escalates and bypasses MFA, ATO Protection detects the compromise, maps the full kill chain, and initiates automated remediation.
Protecting Your Favorite Comic Book Heroes
Protecting Your Favorite Comic Book Heroes
In this hands-on lab, you’ll see how Proofpoint’s Core Email Protection Gateway can quickly find threats, in-depth threat details, auto remediation, and the new Threat Workbench for SOC analysts. You should walk away with a high-level understanding of the Proofpoint Threat Protection Platform.
Augment Microsoft 365 with Proofpoint for Better Protection and Fewer Headaches
Augment Microsoft 365 with Proofpoint for Better Protection and Fewer Headaches
In this lab, you'll explore how Proofpoint’s Core Email Protection API integrates with M365 to enhance threat detection, automate response, and streamline investigations. You'll leverage advanced search, forensic reporting, and Microsoft-integrated user feedback to reduce false positives and accelerate remediation workflows.
Protect from being impersonated, secure your application email, and proactively takedown lookalike domains—All in 1-hour!
Protect from being impersonated, secure your application email, and proactively takedown lookalike domains—All in 1-hour!
SOC Admin combats impersonation by implementing a robust DMARC policy for user- and application-generated email and proactively shuts down malicious lookalikes, thereby protecting his company’s brand reputation.
Uncover shadow apps and SaaS misconfigurations to reduce exposure and risk
Uncover shadow apps and SaaS misconfigurations to reduce exposure and risk
This lab explores key SIPM use cases: detecting shadow SaaS to assess risk, enabling secure offboarding, reducing license sprawl, and remediating SaaS misconfigurations. You'll also see how SIPM addresses root-cause posture issues to prevent recurring cloud DLP incidents.