1. Home
  2. Proofpoint
  3. PPAN01 Exam Syllabus

Proofpoint PPAN01 Exam Syllabus

Start Free PPAN01 Exam Practice After Reviewing the Topics

Before starting your PPAN01 exam preparation, it is recommended to review the complete Proofpoint Certified Threat Protection Analyst Exam syllabus and carefully go through the exam objectives listed below. Once you understand the exam structure and objectives, you should practice using our free PPAN01 questions. We also provide premium PPAN01 practice test, fully updated according to the latest exam objectives, to help you accurately assess your preparedness for the actual exam.

Proofpoint PPAN01 Exam Objectives

Section Objectives
Incident Response Foundations In this lesson, you will learn:
  • Threat Protection components, including Email Protection, TAP, TRAP, CTR, and NPRE
  • The Incident Response Life Cycle and why following accepted guidelines is good for your organization
  • The responsibilities of an incident responder based on the NIST SP800-61 r2 Computer Security Incident Handling Guidelines
The Preparation Phase In this lesson, you will learn:
  • Development of a security infrastructure
  • Roles and responsibilities of an incident responder
  • Incident response procedures and run books
  • How to investigate event logging locations and identify escalation paths
  • Various incident response tools used by analysts to monitor security events
  • How changes to threat landscapes impact analysts
Detection and Analysis In this lesson, you will learn how to:
  • Identify tools and detection mechanisms used to analyze potential security incidents
  • Perform operational checks on Threat Protection components
  • Identify and report out of policy configurations and recommend system configurations in response to threat insights
  • Investigate at-risk users and analyze system logs to detect suspicious activities
  • Monitor system consoles for alerts, prioritize threats and escalate as required
  • Identify common threats such as spam, virus, malware, BEC, commodity and phishing
  • Review logs for click patterns and suggest security awareness content and targets
Containment, Eradication, and Recovery In this lesson, you will learn how to:
  • Arrange similar threat patterns into a single investigation and assign threat urgency based on threat, context, and target
  • Explain manual remediation steps of threats post-delivery and verify results of automated remediation actions
  • Eliminate common false positives and open support cases when required
  • Make recommendations for threat protection, including updating workflows, custom spam rules, VIP users, and custom blocklists
Post-Incident Activity In this lesson, you will learn how to:
  • Prepare incident reports and show the trends over time
  • Make recommendations regarding the installation, configuration, and maintenance of security tools
  • Present a completed incident report detailing the activity and alerts associated with incidents, including the timeline, users, devices, and tactics involved
  • Present recommendations on ways to avoid this type of event in the future

 
Official Information https://www.proofpoint.com/sites/default/files/data-sheets/Threat-Protection-Analyst-Full-Datasheet.pdf