PIC Square Logo Primary
8753  Reviews star_rate star_rate star_rate star_rate star_half

PingOne Protect Administration

This course shows students how to deploy, configure, and administer PingOne Protect. Through a combination of guided instruction and hands-on exercises, students work in a live environment to learn...

Read More
Duration 3 days
Course Code P1P-400
Available Formats Classroom, Virtual

Overview

Course Description

This course shows students how to deploy, configure, and administer PingOne Protect. Through a combination of guided instruction and hands-on exercises, students work in a live environment to learn how to implement risk-based policies, integrate with PingOne DaVinci (DaVinci), and monitor threats using real-time dashboards. Students are provided with a functional PingOne Protect environment where they learn how to configure risk predictors and policies, orchestrate risk-based multi-factor authentication (MFA) experiences, and reduce MFA fatigue while maintaining strong security controls. The course also guides students through preventing Account Takeover (ATO) and New Account Fraud (NAF) by correlating risk signals, tuning policies, and applying best practices to optimize fraud detection and minimize false positives.

Skills Gained

Upon completion of this course, you should be able to:

  • Learn how to deploy PingOne Protect
  • Analyze risk signals and adjust MFA requirements using DaVinci orchestration flows to balance security and user experience
  • Identify complex fraud patterns and implement risk-based policies to proactively mitigate ATO and NAF across your environments

Who Can Benefit

The target audiences for this course include:

  • Ping Identity Administrators
  • Security Administrators
  • System Architects
  • System Developers
  • Visual Data Analysts
  • Data Scientists
  • Business Analysts

Prerequisites

Completion of the following courses available at: https://training.pingidentity.com/on-demand/category/PING

  • Introduction to PingOne Protect
  • Introduction to PingOne DaVinci
  • Introduction to PingOne MFA
|
View Full Schedule

Course Details

Course Details

Chapter 1: Deploying PingOne Protect

Learn how to deploy PingOne Protect.

Lesson 1: Introducing PingOne Protect

Describe the core features of PingOne Protect and how it fits within the PingOne Identity Platform (Identity Platform):

  • Identify PingOne Protect
  • Analyze scenarios
  • Set up the Ping Identity environment

Lesson 2: Reviewing Architecture and Components

Get an overall understanding of how PingOne Protect integrates with DaVinci, define its core operational components (predictors and risk policies), and examine the architecture connecting these elements:

  • Define risk predictors
  • Administrate risk predictors
  • Configure risk policies
  • Create risk policies

Lesson 3: Integrating and Monitoring Threat Protection

Learn about the PingOne Protect connector and how to use the Threat Protection Dashboard:

  • Integrate PingOne Protect with DaVinci
  • Monitor risk with the Threat Protection Dashboard

Chapter 2: Optimizing MFA for Risk and Experience

Analyze risk signals and adjust MFA requirements using DaVinci orchestration flows to balance security and user experience.

Lesson 1: Understanding Risk-Based MFA

Learn how risk-based MFA differs from traditional static MFA and how to configure your environment to support MFA:

  • Contrast traditional and risk-based MFA
  • Configure the environment post-MFA setup

Lesson 2: Implementing MFA Scenarios

Configure MFA for PingOne Protect and execute DaVinci workflows to observe and troubleshoot different risk-based login scenarios:

  • Initiate a new user account interaction
  • Log in as a High-Risk user
  • Log in as a Medium-Risk user
  • Log in as a Low-Risk user

Lesson 3: Reducing MFA Fatigue

Learn about techniques and configurations that minimize unnecessary MFA prompts without compromising security:

  • Understand MFA fatigue
  • Mitigate MFA fatigue
  • Test risk-based authentication flows

Chapter 3: Preventing Account Takeover and New Account Fraud

Identify complex fraud patterns and implement risk-based policies to proactively mitigate ATO and NAF across your environments.

Lesson 1: Understanding the Fraud Cycle

Analyze fraud stages, map indicators to risk signals, and configure the Protect Synthesizer (ProtectSynth) to implement ATO and NAF risk policies that disrupt fraudulent activity:

  • Define the fraud cycle
  • Disrupt the fraud cycle using PingOne Protect
  • Illustrate fraud cycle scenarios
  • Create ATO and NAF risk policies
  • Install and configure ProtectSynth

Lesson 2: Configuring Risk Policies to Prevent ATO

Correlate PingOne Protect predictors with risk signals, simulate user events, and optimize risk policies to maximize detection accuracy while minimizing false positives and negatives:

  • Correlate ATO risk patterns with predictors
  • Deploy composite predictors to minimise false negatives
  • Mitigate ATO risk using composite predictors

Lesson 3: Configuring Risk Policies to Prevent NAF

Configure and validate a NAF risk policy in PingOne Protect, by correlating risk predictors and detecting coordinated fraud patterns.:

  • Correlate and detect NAF risk patterns
  • Configure and validate the NAF risk policy

Lesson 4: Optimizing Risk Policies for ATO and NAF

Learn how to apply ATO and NAF prevention best practices and tune corresponding risk policies to optimize fraud detection effectively, while minimizing false positives and any operational impact:

  • Describe best practices to prevent ATO and NAF
  • Implement best practices to prevent ATO and NAF
  • Tune the ATO risk policy
  • Tune the NAF risk policy

Schedule

3 options available

  • May 18, 2026 - May 20, 2026 (3 days)
    Live Virtual | 9:00AM 5:00PM EDT
    Language English
    Select from 1 option(s) below
    Live Virtual | 9:00AM 5:00PM EDT
    Live Virtual | 9:00AM 5:00PM EDT
    Enroll
    Enroll Add to quote
  • Aug 26, 2026 - Aug 28, 2026 (3 days)
    Live Virtual | 9:00AM 5:00PM EDT
    Language English
    Select from 1 option(s) below
    Live Virtual | 9:00AM 5:00PM EDT
    Live Virtual | 9:00AM 5:00PM EDT
    Enroll
    Enroll Add to quote
  • Nov 18, 2026 - Nov 20, 2026 (3 days)
    Live Virtual | 9:00AM 5:00PM EST
    Language English
    Select from 1 option(s) below
    Live Virtual | 9:00AM 5:00PM EST
    Live Virtual | 9:00AM 5:00PM EST
    Enroll
    Enroll Add to quote

FAQ

Does the course schedule include a Lunchbreak?

Classes typically include a 1-hour lunch break around midday. However, the exact break times and duration can vary depending on the specific class. Your instructor will provide detailed information at the start of the course.

What languages are used to deliver training?

Most courses are conducted in English, unless otherwise specified. Some courses will have the word "FRENCH" marked in red beside the scheduled date(s) indicating the language of instruction.

What does GTR stand for?

GTR stands for Guaranteed to Run; if you see a course with this status, it means this event is confirmed to run. View our GTR page to see our full list of Guaranteed to Run courses.

Does Ascendient Learning deliver group training?

Yes, we provide training for groups, individuals and private on sites. View our group training page for more information.

What does vendor-authorized training mean?

As a vendor-authorized training partner, we offer a curriculum that our partners have vetted. We use the same course materials and facilitate the same labs as our vendor-delivered training. These courses are considered the gold standard and, as such, are priced accordingly.

Is the training too basic, or will you go deep into technology?

It depends on your requirements, your role in your company, and your depth of knowledge. The good news about many of our learning paths, you can start from the fundamentals to highly specialized training.

How up-to-date are your courses and support materials?

We continuously work with our vendors to evaluate and refresh course material to reflect the latest training courses and best practices.

Are your instructors seasoned trainers who have deep knowledge of the training topic?

Ascendient Learning instructors have an average of 27 years of practical IT experience and have also served as consultants for an average of 15 years. To stay current, instructors spend at least 25 percent of their time learning new, emerging technologies and courses.

Do you provide hands-on training and exercises in an actual lab environment?

Lab access is dependent on the vendor and the type of training you sign up for. However, many of our top vendors will provide lab access to students to test and practice. The course description will specify lab access.

Will you customize the training for our company’s specific needs and goals?

We will work with you to identify training needs and areas of growth.  We offer a variety of training methods, such as private group training, on-site of your choice, and virtually. We provide courses and certifications that are aligned with your business goals.

How do I get started with certification?

Getting started on a certification pathway depends on your goals and the vendor you choose to get certified in. Many vendors offer entry-level IT certification to advanced IT certification that can boost your career. To get access to certification vouchers and discounts, please contact info@ascendientlearning.com.

Will I get access to content after I complete a course?

You will get access to the PDF of course books and guides, but access to the recording and slides will depend on the vendor and type of training you receive.

How do I request a W9 for Ascendient Learning?

View our filing status and how to request a W9.

Reviews

They were very good. They made sure everyone was able to get into the training and got all of the material needed for class.

Brandon was a great instructor. The virtual course materials and labs provided were very informative.

Class was easy to sign up for and ExitCertified provided very good communication

The course was informative, and I learnt a new skill. The instructor was up to the point.

Simply great training provider that I can go for updating/acquiring my skill sets.