In this course, you will learn about FortiMonitor architecture. The theory lessons and hands-on labs will take you through the process of configuring monitoring for local servers, network devices, and VMware infrastructure, as well as incident handling, alerts, maintenance schedules, countermeasures, and reports.

(ISC)² CPE Training Hours: 3
(ISC)² CPE Lab Hours: 5
(ISC)² CISSP Domains: Security Operations

Our custom training service allows customers to have training with condensed, customized agendas of training modules from the NSE curriculum plus, optionally, ad-hoc content for products or services not part of our certification training. 

Click for more information

In this course, you will explore practical use of 3rd party (open source) and Fortinet solutions for malware analysis. Comprised of theory lessons and hands-on labs, you will learn about the fundamental concepts of malware analysis, perform basic analysis using open-source tools, and leverage Fortinet solutions for advanced and automated malware analysis. Finally, you will work with live malware samples to analyze their characteristics and behavior using Fortinet solutions and 3rd party tools.

(ISC)² CPE Training Hours: 7
(ISC)² CPE Lab Hours: 7
(ISC)² CISSP Domains: Security Operations

In this course, you will explore web application threats and countermeasures focused on Fortinet solutions. Comprised of theory lessons and hands-on labs, this course will guide you from the very motivations of attacks on web applications through to understanding and executing attack techniques. You will gain insight into recognizing such attacks, and, finally, configure Fortinet solutions to mitigate them.

(ISC)² CPE Training Hours: 3
(ISC)² CPE Lab Hours: 4
(ISC)² CISSP Domains: Security Operations
In this course, you will explore the practical use of Fortinet solutions as threat intelligence and threat hunting platforms. You will explore fundamental concepts about cyber threat intelligence and how to leverage Fortinet solutions to perform threat intelligence management (collection, enrichment, and so on) and threat hunting.
In this two-day course, you will explore the practical use of Fortinet security operations solutions to detect, investigate, and respond to Advanced Persistent Threats (APTs). Comprised of theory lessons and hands-on labs, this course will guide you to understand how to execute advanced threats, how threat actors behave, and how security operations handle such threats. You will leverage widely adopted industry frameworks and models to comprehend advanced complex attacks (APTs) and adversary behavior. Then, you will use these foundations to build detection capabilities and emulate adversary activity. Finally, you will go through industry guidelines for incident handling and practical utilization of Fortinet solutions to detect, analyze, and respond to the previously emulated incident.
The Fast Track Program is a series of concise, technical hands-on workshops focusing on the most essential Fortinet solutions. Through the introduction of market drivers, detailed use-cases, and enabling technologies, participants not only understand how they can benefit from Fortinet’s broad, integrated, and high-performance approach to security, but also gain direct hands-on experience implementing each component of the comprehensive security fabric. In this course, you will learn how to deliver Fast Track training sessions.

Click here to see an overview of the Fast Track Workshop