Menlo Security Academy

Maximize your isolation-powered cloud security or on-premise platform investment. Menlo Security offers a comprehensive training program that is designed to give you the skills to use the Menlo Security Isolation Platform to its fullest potential.

Our academy provides both On-Demand e-Learning courses and Instructor-Led Training taught in EMEA, US, and APAC time zones.

The e-Learning training contains a selection of Learning Plans to guide you through the configuration of the platform to the additional features such as Menlo Security Client, Secure Application Access, Browser Extension, HEAT Shield and Browsing Forensics. At the end of each module, you will be able to test your knowledge with a selection of questions.

Our Instructor-Led classes offer 2 and 3 days of training and are delivered via a live virtual class. This provides a cost-effective learning choice without compromising on quality. The classes are taught by our highly experienced training team using interactive sessions and hands-on labs.

Register now and start your learning journey with Menlo Security. For any questions please contact training@menlosecurity.com

Register Now

The Instructor-Led Training Program Includes the Following Modules:

Administration of the Menlo Security Enterprise Browser

Prerequisites

Optional: Foundation - An Introduction to Menlo Security (e-Learning)

What will you learn?

This 1-day course will give you an overview of the concepts of the Menlo Security Secure Cloud Browser including recognizing the flexibility you have to control access, remove web threats, prevent credential theft, and eliminate document malware.

Who should take this course?

Menlo Security administrators and anyone else responsible for the setup, configuration, and administration of their organization’s Internet access deployment.

Key topics covered:
  • Connectivity: PAC, Pre-pend, Redirect, Certificates

  • Policy: Fundamentals, Policy Exceptions, SSL Decryption, Categories and Threats, Web Applications, Menlo File Security (formerly Votiro) Integration and Policy, Content Inspection, File, Document and Archive Policy.

  • Authentication: Admin Access Control, SAML Single Sign-On, Roles, Cookies, Two Factor Authentication, Restricted Admin IP Access, Anonymous Authentication, User Management

  • Logging: Dashboard, Logs, and Insights

Menlo Security Enterprise Browser - Advanced Features

Prerequisites
  • Recommended attendance of the 1-day Administration course

  • Optional Foundation: An Introduction to Menlo Security (e-Learning)

  • Optional Foundation Core Plus - Additional Features (e-Learning)

What will you learn?

After attending the course, you will be able to understand how Menlo can protect you using a variety of features which can be configured to suit your environment.

Who should take this course?

System/IT Administrators and Security Administrators

Key topics covered:
  • Browsing Forensics

  • Secure Application Access

  • Menlo Security Client

  • Firewall as a Service (FwaaS)

  • HEAT Shield

  • Browser Posture Manager: CIS Standards and Configuration

  • The Browser Extension

  • Last-Mile Data Protection: DLP, Copy/Paste Controls and Watermarking

Troubleshooting, Additional Features and Private Cloud (On-Premise) Deployment

This one-day course focuses on practical guidance for troubleshooting issues including tools and techniques used to diagnose and resolve problems effectively. It includes an overview of the additional features available, email isolation and the deployment and maintenance of the Private Cloud (On-Premise) Solution.

Prerequisites
  • You must have attended the 1-day Administration course.

What will you learn?

During this one-day course, you will receive advice on troubleshooting tools and techniques, hear about the additional features available, including email Isolation, and learn about the concepts and configuration of Menlo Security Private Cloud (On-Premise) deployment.

Key topics covered:
  • Troubleshooting: Files & Documents, Split Session Debugging, Utilities, Authentication Issues, Tools of the Trade, ACR, and APIs

  • Private Cloud:

  • Configuration: Cluster Creation, Template Management.

  • Certificates: SSL Inspection and Centralized Certificate Management.

  • Upgrades: Scheduling and Management across the Cluster.

  • Email Isolation: Configuration and Policy Management