Labs and Certifications
Labs and Certifications
Labs and Certifications

Better insights, bolstered credentials

Get skills and training to future-proof your career and your security operations

Certified guardians
Enhance your security. Advance your career.

Become a Proofpoint Certified Guardian at Proofpoint Protect 2025

Earn your technical credentials to validate your expertise in the Proofpoint human-centric security platform, industry trends, and best practices—while demonstrating your commitment to continuous learning.

Proofpoint is excited to announce the launch of our brand-new Administrator-level certifications. This is your opportunity to gain industry-recognized credentials in our Threat Protection and Data Security tracks—two of the most in-demand fields today.

Image
Proofpoint certified guard

Whether it’s to deepen your expertise, level up or validate your skills, now’s the perfect time to take the next step.

For more details on Proofpoint technical trainings and certifications, please visit the Proofpoint Cybersecurity Academy.

Proofpoint Protect 2025 offers five unique technical Guardian certifications

Certified Threat Protection Administrator

Exam Duration Up to 90 Minutes

Exam Duration Up to 90 Minutes

Validates a security administrator’s expertise in configuring, maintaining, and troubleshooting the Threat Protection platform, including components such as Email Protection, the TAP dashboard, and Threat Response Auto-Pull.

Focuses on the core Proofpoint Threat Protection platform, including Email Protection, Targeted Account Protection, and Threat Response Auto-Pull.

Certified Data Security Administrator

Exam Duration Up to 90 Minutes

Exam Duration Up to 90 Minutes

Validates a cybersecurity administrator’s expertise in configuring and maintaining the Data Security platform, including system setup, organizational security policy configuration, DLP identifiers and detector sets, as well as performing ongoing maintenance and reporting tasks.

Focuses on the Proofpoint Data Security platform, including Platform administration, Endpoint DLP, Insider Threat Management and CASB.

Certified Essentials Administrator

Exam Duration Up to 90 Minutes

Exam Duration Up to 90 Minutes

Validates a cybersecurity administrator's ability to configure and administer the Proofpoint Essentials platform, including security awareness training, data loss prevention, email continuity, archiving and social media protection.

Focuses on the Proofpoint Essentials platform.

Certified People Protection Analyst

Exam Duration Up to 90 Minutes

Exam Duration Up to 90 Minutes

Validates a professional's in-depth knowledge and hands-on experience with Proofpoint’s leading security products by earning a certification that showcases the ability to defend against complex cyberthreats.

Focuses on using the comprehensive Proofpoint suite, including Targeted Account Protection, Threat Response Auto-Pull, and Email Protection.

Certified Information Protection Analyst

Exam Duration Up to 90 Minutes

Exam Duration Up to 90 Minutes

Validates analysts' skills needed to ensure the integrity and confidentiality of critical data assets, focusing on on key cybersecurity tasks such as sophisticated data analysis, proactive threat containment and comprehensive incident management.

Focuses on the Proofpoint advanced analytics dashboard, Insider Threat Management, and Cloud DLP products.

Proofpoint Certified Guardian

Why get certified at Protect 2025?

Enhance your skills

Proofpoint certifications help you deepen your expertise and expand your knowledge of key products, making you more effective and confident in your role.

Advance your career

Stand out to employers and unlock new career opportunities by validating your skills with industry-recognized certifications.

Exclusive savings onsite

Make the most of our exclusive, complimentary training resources and exam discounts to earn your certificates—only at Protect 2025.

Certification offerings
Onsite Certification Resources

Access our exclusive onsite certification offerings

Why certify?Hear from Proofpoint Certififed Guardians

Benefits of training

Hands-On Labs
Take advantage of our hands-on training labs, available all day. Drop in at your convenience to sharpen your skills, practice key concepts, and get exam ready!

Benefits of training

Study Pod
Step into our designated study pod, where expert instructors lead engaging content reviews, answer your questions, and help you solidify key concepts to excel in your exams.

Benefits of training

Take Your Exams
Choose from a range of certifications to match your career goals. Take and pass your exam at your convenience — testing is available all day.

Onsite labs
Onsite Labs

Get hands-on experience with the latest Proofpoint innovations

learn at your own pace

Learn at your own pace

Our Certification and Discovery Labs are self-paced, so you can explore and learn on your terms. This ensures a personalized and thorough understanding of the solutions that comprise the Proofpoint human-centric security platform.

Explore cutting-edge topics

Attendees have the opportunity to deep dive into Proofpoint technologies while getting prepared for their certification exams—from advanced threat protection to data loss prevention and beyond. 

Explore cutting-edge topics

Proofpoint Protect Labs

Proofpoint Protect Labs is your gateway to cutting-edge cybersecurity insights and hands-on learning. Designed for security professionals, this immersive experience features two specialized tracks:

  • Threat Protection Track – Dive deep into the evolving threat landscape with real-world attack scenarios, advanced threat intelligence, and best practices for stopping threats before they reach your people.
  • Data Security Track – Explore how to safeguard sensitive data across cloud, email, and endpoints. Discover how to prevent data loss, detect insider threats, and ensure compliance in a rapidly evolving digital environment.

Whether you're focused on stopping threats or securing data, Proofpoint Protect Labs equips you with the knowledge and tools to stay ahead.

Protect against insider threats with on-demand visibility

Data Loss Prevention and Insider Threat Management – Better Together

Data Security and Governance Learner

Data Security and Governance Learner

In this lab, you will simulate an insider threat by exfiltrating data via USB and generative AI platforms using multiple vectors. You will then transition to an analyst role to perform forensic investigation and generate a report for HR/Legal. The lab demonstrates Proofpoint’s advanced detection, GenAI-assisted investigation, and Dynamic Policy Orchestration capabilities for comprehensive insider threat response.

  • Understand the difference between DLP and ITM Visibility
  • See how Dynamic Policy automatically escalates the monitoring based on risky activity
  • Learn how Proofpoint protects against proprietary data leaving the organization through GenAI
  • Experience the simplicity of searching and reporting with Proofpoint’s Data Security Workbench
Identifying and mitigating sensitive data exposure in M365 with DSPM and DLP

Preventing Data Leaks with DSPM and DLP

Data Security and Governance Learner

Data Security and Governance Learner

Participants will investigate an insider threat scenario involving a disgruntled Royalties Analyst. After identifying overshared sensitive files in M365, they’ll analyze DSPM findings, revoke shared links, and apply DLP policies to mitigate exposure—demonstrating how DSPM enables proactive risk detection and remediation.

  • Detect over-permissive sharing of sensitive data in SharePoint and OneDrive
  • Investigate user behavior and file sharing patterns using DSPM metadata
  • Use DSPM to remove improperly shared links
  • Apply MIP labels to sensitive files for future enforcement
  • Understand how DSPM fits into an insider threat response workflow
Catch risky insiders exfiltrating sensitive data and sending misdirected emails Data Security and Governance

Adaptive Email DLP

Data Security and Governance

Data Security and Governance

In this lab, we use multiple cases to demonstrate how Adaptive Email DLP (AEDLP) automatically detects and prevents misdirected emails, misattached files, and the sending of sensitive data to personal or unauthorized email accounts.

  • Explore real-world email data exfiltration scenarios
  • Experience behavioral AI in action
  • Learn how contextual banners prevent misdirected emails
  • Test the platform in a cloud-hosted lab environment
Preserving Truth, uncovering evidence – Lock it. Find it. Prove it.

Digital Communications Governance

Data Security and Governance Learner

Data Security and Governance Learner

In this lab, you will learn to easily respond to regulatory inquiries while saving time and reducing legal discovery costs. We will preserve the data of disgruntled employees and investigate to identify incriminating data to produce as evidence. This lab will highlight our sophisticated feature set to find the proverbial “needle in a haystack.

  • Experience the robust feature set of the Data Communications Governance (DCG) solution
  • Learn to identify, preserve, and collect relevant digital evidence from sources in a forensically sound manner
  • Learn skills to analyze and interpret digital evidence to support legal or investigative objectives
  • Learn to apply legal, ethical, and regulatory considerations related to e-discovery and digital data handling