In this course, you will learn how to form network baseline data, and how to recognize and mitigate individual and distributed denial of service attacks while preserving service and network performance.

(ISC)² CPE Training Hours: 6
(ISC)² CPE Lab Hours: 4
(ISC)² CISSP Domains: Communication and Network Security
In this course, you will learn how to create custom parsers to extend the integration capability of FortiSIEM to a wider range of devices and custom applications. You will learn how parsers recognize the type of device or application that sent the data extract and save key information from the log, and map the device type and log information to an event type.

(ISC)² CPE Training Hours: 4
(ISC)² CPE Lab Hours: 6
(ISC)² CISSP Domains: Security Operations
In this course, you will learn how to use FortiProxy features, including policy types, content analysis, and security profiles. You will also explore FortiProxy policies, deployment, user authentication, high availability, monitoring, and how to protect your web traffic using content inspection, such as IPS, antivirus, web filtering, application control, and logging.

(ISC)² CPE Training Hours: 8
(ISC)² CPE Lab Hours: 4
(ISC)² CISSP Domains: Security Operations
In this course, you will learn how to configure and administer the most commonly used features of FortiADC. You will explore Layer 4 and Layer 7 server load balancing, link load balancing, global load balancing, high availability (HA), firewall policies, advanced routing, and more.

(ISC)² CPE Training Hours: 6
(ISC)² CPE Lab Hours: 6
(ISC)² CISSP Domains: Communication and Network Security
This course offers a quiz to help test your knowledge of FortiADC 6.2. Questions are based off the FortiADC 6.2 training course.

Our custom training service allows customers to have training with condensed, customized agendas of training modules from the NSE curriculum plus, optionally, ad-hoc content for products or services not part of our certification training. 

Click for more information

In this interactive course, you will learn how to create custom parsers to extend FortiSIEM’s scope to as-yet-unknown devices and custom applications whose log formats would not otherwise be understood by FortiSIEM. You will learn how parsers recognize the type of device or application that sent the data, extract and save key information from the log, and map the device type and log information to an event type.

(ISC)² CPE Training Hours: 4.0
(ISC)² CPE Lab Hours: 4.75
(ISC)² CISSP Domains: Security Operations
In this interactive course, you will learn how to configure and administer the most commonly used features of FortiADC. In interactive labs, you will explore Layer 4 and Layer 7 server load balancing, link load balancing, global load balancing, high availability (HA), firewall policies, advanced routing, and more. These administrative fundamentals will provide you with a solid understanding of how to implement an advanced application delivery controller.

(ISC)² CPE Training Hours 4.25
(ISC)² CPE Lab Hours 2.9
(ISC)² CISSP Domains: Communication and Network Security
In this interactive course, you will learn how to use FortiSOAR to design simple to complex playbooks, examine the role of FortiSOAR in mitigating malicious indicators, and learn how to create interactive dashboards to display relevant information about alerts and incidents. You will also learn how to integrate FortiSOAR with FortiGate, FortiSIEM, and FortiMail.

(ISC)² CPE Training Hours: 11
(ISC)² CPE Lab Hours: 7
(ISC)² CISSP Domains: Security Operations
This quiz covers content from the FortiSOAR Design & Development 6.4 training course.
In this interactive course, you will learn about the key features of session-aware load balance cluster (SLBC) and the FortiGate 7000 chassis-based firewall series. Topics include product architecture, as well as system configuration, troubleshooting, and monitoring.

(ISC)² CPE Hours: 9.25
(ISC)² CISSP Domains: Security Operations
In this interactive course, you will learn how to configure FortiVoice systems, including using the phones. In the interactive labs, you will explore FortiVoice profiles, extension set ups, trunk configurations, and call features.

(ISC)² CPE Training Hours: 9
(ISC)² CPE Lab Hours: 5
(ISC)² CISSP Domains: Communication and Network Security
This course offers a quiz to help test your knowledge of FortiVoice 6.0. Questions are based off the FortiVoice 6.0 training course.
In this interactive course, you will learn how to deploy, configure, and troubleshoot FortiPortal. FortiPortal enables service providers to delegate the configuration and analytics to end customers, business units, and departments in a multi-tenant environment, allowing them to monitor client bandwidth usage, and monetize through automation.

(ISC)² CPE Hours: 10.1
(ISC)² CISSP Domains: Security Operations
This course offers a quiz to help test your knowledge of FortiPortal 5.3. Questions are based off the FortiPortal 5.3 training course.
In this course, you will learn about FortiMonitor architecture. The theory lessons and hands-on labs will take you through the process of configuring monitoring for local servers, network devices, and VMware infrastructure, as well as incident handling, alerts, maintenance schedules, countermeasures, and reports.

(ISC)² CPE Training Hours: 3
(ISC)² CPE Lab Hours: 5
(ISC)² CISSP Domains: Security Operations
In this course, you will explore practical use of 3rd party (open source) and Fortinet solutions for malware analysis. Comprised of theory lessons and hands-on labs, you will learn about the fundamental concepts of malware analysis, perform basic analysis using open-source tools, and leverage Fortinet solutions for advanced and automated malware analysis. Finally, you will work with live malware samples to analyze their characteristics and behavior using Fortinet solutions and 3rd party tools.

(ISC)² CPE Training Hours: 7
(ISC)² CPE Lab Hours: 7
(ISC)² CISSP Domains: Security Operations
In this course, you will explore web application threats and countermeasures focused on Fortinet solutions. Comprised of theory lessons and hands-on labs, this course will guide you from the very motivations of attacks on web applications through to understanding and executing attack techniques. You will gain insight into recognizing such attacks, and, finally, configure Fortinet solutions to mitigate them.

(ISC)² CPE Training Hours: 3
(ISC)² CPE Lab Hours: 4
(ISC)² CISSP Domains: Security Operations
In this course, you will explore the practical use of Fortinet solutions as threat intelligence and threat hunting platforms. You will explore fundamental concepts about cyber threat intelligence and how to leverage Fortinet solutions to perform threat intelligence management (collection, enrichment, and so on) and threat hunting.
In this two-day course, you will explore the practical use of Fortinet security operations solutions to detect, investigate, and respond to Advanced Persistent Threats (APTs). Comprised of theory lessons and hands-on labs, this course will guide you to understand how to execute advanced threats, how threat actors behave, and how security operations handle such threats. You will leverage widely adopted industry frameworks and models to comprehend advanced complex attacks (APTs) and adversary behavior. Then, you will use these foundations to build detection capabilities and emulate adversary activity. Finally, you will go through industry guidelines for incident handling and practical utilization of Fortinet solutions to detect, analyze, and respond to the previously emulated incident.
In this interactive course Powered by FortiGuard Labs, you will explore web application threats and countermeasures focused on Fortinet solutions. Comprised of theory lessons and hands-on labs, this course will guide you from the very motivations of attacks on web applications through to understanding and executing attack techniques. You will gain insight into recognizing such attacks, and, finally, configure Fortinet solutions to mitigate them.

(ISC)² CPE Training Hours: 3
(ISC)² CPE Lab Hours: 4
(ISC)² CISSP Domains: Security Operations
The Fast Track Program is a series of concise, technical hands-on workshops focusing on the most essential Fortinet solutions. Through the introduction of market drivers, detailed use-cases, and enabling technologies, participants not only understand how they can benefit from Fortinet’s broad, integrated, and high-performance approach to security, but also gain direct hands-on experience implementing each component of the comprehensive security fabric. In this course, you will learn how to deliver Fast Track training sessions.

Click here to see an overview of the Fast Track Workshop

The Attack and Defense Methodologies Fast Track is a unique Fast Track module that incorporates some additional components to make for an exciting student experience.

To ensure optimal delivery of this module we have created this supplemental train-the-trainer content. Reviewing this content and then attempting the hands-on lab is a requirement prior to delivering this module for the first time.