In this interactive course, you will learn how to use FortiSOAR to design simple to complex playbooks, examine the role of FortiSOAR in mitigating malicious indicators, and learn how to create interactive dashboards to display relevant information about alerts and incidents. You will also learn how to integrate FortiSOAR with FortiGate, FortiSIEM, and FortiMail.

(ISC)² CPE Training Hours: 10
(ISC)² CPE Lab Hours: 7
(ISC)² CISSP Domains: Security Operations
In this self-paced course, you will learn about the essentials of data communication and the basic functions of computer networking.

In this module, you will learn key LAN, WLAN, and WAN concepts.

In this module, you will learn about the OSI reference model, also known as the seven layer model, and the operations and functions that occur within each layer.

In this module, you will learn about internet layer protocols that are within the TCP/IP model, such as IPv4 and IPv6.

In this module, you will learn how devices, such as bridges, switches, routers, repeaters, hubs, and collision and broadcast domains, operate at the different network layers.

In this module, you will learn about the TCP/IP protocol stack and the fundamentals of the transport layer.

In this module, you will learn about VLANs and VLAN tagging.

In this module, you will learn about common WAN technologies and key differences between private and public WANs.

In this module, you will learn about basic virtualization and cloud concepts.

In this course, you will learn how to protect your organization and improve its security against advance threats that bypass traditional security controls. You will learn about how FortiSandbox detects advanced threats. You will also learn about how FortiSandbox dynamically generates local threat intelligence, and how other advanced threat protection (ATP) components leverage this threat intelligence information to protect organizations from advanced threats.

(ISC)² CPE Training Hours: 7
(ISC)² CPE Lab Hours: 7
(ISC)² CISSP Domains: Security Operations
This course offers a quiz to help test your knowledge of FortiSandbox 4.2. Questions are based off the FortiSandbox 4.2 training course.
In this course, you will learn how to form network baseline data, and how to recognize and mitigate individual and distributed denial of service attacks while preserving service and network performance.

(ISC)² CPE Training Hours: 6
(ISC)² CPE Lab Hours: 4
(ISC)² CISSP Domains: Communication and Network Security
In this course, you will learn how to create custom parsers to extend the integration capability of FortiSIEM to a wider range of devices and custom applications. You will learn how parsers recognize the type of device or application that sent the data extract and save key information from the log, and map the device type and log information to an event type.

(ISC)² CPE Training Hours: 4
(ISC)² CPE Lab Hours: 6
(ISC)² CISSP Domains: Security Operations
In this course, you will learn how to configure and administer the most commonly used features of FortiADC. You will explore Layer 4 and Layer 7 server load balancing, link load balancing, global load balancing, high availability (HA), firewall policies, advanced routing, and more.

(ISC)² CPE Training Hours: 6
(ISC)² CPE Lab Hours: 6
(ISC)² CISSP Domains: Communication and Network Security
This course offers a quiz to help test your knowledge of FortiADC 6.2. Questions are based off the FortiADC 6.2 training course.
In this course, you will learn how to use FortiProxy features, including policy types, content analysis, and security profiles. You will also explore FortiProxy policies, deployment, user authentication, high availability, monitoring, and how to protect your web traffic using content inspection, such as IPS, antivirus, web filtering, application control, and logging.

(ISC)² CPE Training Hours: 8
(ISC)² CPE Lab Hours: 4
(ISC)² CISSP Domains: Security Operations
OLDER VERSION of course. Newer version available (https://training.fortinet.com/local/staticpage/view.php?page=library_fortisoar-design-and-development).

In this interactive course, you will learn how to use FortiSOAR to design simple to complex playbooks, examine the role of FortiSOAR in mitigating malicious indicators, and learn how to create interactive dashboards to display relevant information about alerts and incidents. You will also learn how to integrate FortiSOAR with FortiGate, FortiSIEM, and FortiMail.

(ISC)² CPE Training Hours: 11
(ISC)² CPE Lab Hours: 7
(ISC)² CISSP Domains: Security Operations
In this interactive course, you will learn how to configure FortiVoice systems, including using the phones. In the interactive labs, you will explore FortiVoice profiles, extension set ups, trunk configurations, and call features.

(ISC)² CPE Training Hours: 9
(ISC)² CPE Lab Hours: 5
(ISC)² CISSP Domains: Communication and Network Security
This course offers a quiz to help test your knowledge of FortiVoice 6.0. Questions are based off the FortiVoice 6.0 training course.
In this interactive course, you will learn how to deploy, configure, and troubleshoot FortiPortal. FortiPortal enables service providers to delegate the configuration and analytics to end customers, business units, and departments in a multi-tenant environment, allowing them to monitor client bandwidth usage, and monetize through automation.

(ISC)² CPE Hours: 10.1
(ISC)² CISSP Domains: Security Operations
This course offers a quiz to help test your knowledge of FortiPortal 5.3. Questions are based off the FortiPortal 5.3 training course.
OLDER VERSION of course. Newer version available (https://training.fortinet.com/local/staticpage/view.php?page=library_fortigate-chassis-administrator).

In this interactive course, you will learn about the key features of session-aware load balance cluster (SLBC) and the FortiGate 7000 chassis-based firewall series. Topics include product architecture, as well as system configuration, troubleshooting, and monitoring.

(ISC)² CPE Hours: 9.25
(ISC)² CISSP Domains: Security Operations
OLDER VERSION of course. Newer version available (https://training.fortinet.com/local/staticpage/view.php?page=library_fortisiem-parser).

In this interactive course, you will learn how to create custom parsers to extend FortiSIEM’s scope to as-yet-unknown devices and custom applications whose log formats would not otherwise be understood by FortiSIEM. You will learn how parsers recognize the type of device or application that sent the data, extract and save key information from the log, and map the device type and log information to an event type.

(ISC)² CPE Training Hours: 4.0
(ISC)² CPE Lab Hours: 4.75
(ISC)² CISSP Domains: Security Operations