Modal title

Modal body text goes here.

The Fortinet Certified Trainer (FCT) assessment is a trainer evaluation process in which each candidate has to prove their training delivery skills. The FCT assessment is a two-day assessment that evaluates the FCT candidate’s ability to maintain Fortinet’s quality standards in technical knowledge, skills and instructional abilities.

Who can apply?

The FCT assessment candidate should be a Fortinet employee or a candidate sponsored by an ATC who has submitted proof of reference, along with an online application form. An FCT candidate who wants to apply for an FCT assessment must meet the following knowledge and experience eligibility requirements:

  • Extensive technical knowledge and skills in network security and cybersecurity
  • Five years of relevant experience in network security and cybersecurity
  • Certification in the required NSE training courses
  • Five years of experience in training delivery in IT security
  • Demonstrable training facilitation and delivery skills

If you meet all of these requirements you can apply for the FCT assessment!

Please contact fct@fortinet.com for queries and suggestions.

Skip to main content
Training Institute
  • Library
  • Schedule
  • Certifications
  • ATC
  • Academic Partner Program
  • Fast Track Workshops
  • Log in
  • Training
  • Library

FortiDeceptor Administrator

Download Course Description
Course Description

In this course, you will learn how to deceive, expose, and eliminate threats early in the attack kill chain using FortiDeceptor. FortiDeceptor lures attackers into revealing themselves by engaging with a range of deception assets distributed throughout the network environment.

Who Should Attend

Cybersecurity professionals responsible for the day-to-day administration, management, and troubleshooting of FortiDeceptor should attend this course.

Prerequisites

You should have an understanding of the topics covered in the FCP - FortiGate Administrator course, or have equivalent experience.

Agenda
  1. Introduction
  2. Deception and Incidents
  3. Deception Strategies
  4. FortiDeceptor Integration
Objectives

After completing this course, you will be able to:

  • Describe how FortiDeceptor integrates into Enterprise networks
  • Describe FortiDeceptor modules and key features
  • Access FortiDeceptor and view the dashboard
  • Configure network and system settings
  • Configure FortiDeceptor central management
  • Configure FortiDeceptor for air-gapped deployments
  • Configure deployment networks
  • Deploy decoy VMs and configure lure resources
  • Use the deployment wizard to create and deploy decoys
  • Select the appropriate decoys, services, and lures
  • Create and deploy FortiDeceptor token packages
  • Analyze the FortiDeceptor deployment map
  • Analyze incidents, attacks, and the attack map
  • Navigate the MITRE ICS matrix
  • Design deception strategies based on network requirements
  • Differentiate light-stack and full-stack deception
  • Detect and mitigate new outbreaks
  • Follow best practices for decoy and token deployment
  • Follow best practices for AD integration
  • Design deception based on network topology requirements
  • Formulate deception strategies against specific attack vectors
  • Integrate FortiDeceptor with the Fortinet Security Fabric and other Fortinet products
  • Integrate FortiDeceptor with third-party products
System Requirements

If you take the online format of this class, you must use a computer that has the following:

  • A high-speed internet connection
  • An up-to-date web browser
  • A PDF viewer
  • Speakers or headphones
  • One of the following:
    • HTML5 support
    • An up-to-date Java Runtime Environment (JRE) with Java Plugin enabled on your web browser

You should use a wired Ethernet connection, not a Wi-Fi connection. Firewalls, including Windows Firewall or FortiClient, must allow connection to the online labs.

Enroll Now

Access the latest self-paced training version

Purchasing Process

More information on how to purchase instructor-led courses, on-demand labs, exam vouchers, and study material.

Find an Instructor-Led Class

Browse our schedule for upcoming classes delivered by Fortinet.

Product Versions
  • FortDeceptor 5.3
Course Duration
  • Lecture time (estimated): 3 hours
  • Lab time (estimated): 3 hours
  • Total course duration (estimated): 6 hours
    • 1 full day or 2 half days
Formats
  • Instructor-led (classroom and online)
  • Self-paced online
ISC2
  • CPE training hours: 3
  • CPE lab hours: 3
  • CISSP domains: Security Operations
Part Number (SKU)

See Purchasing Process for more information

Certification

This course does not have a certification exam.

  • Dashboard
  • Library
  • Schedule
You are not logged in. (Log in)
Data retention summary