Modal title

Modal body text goes here.

The Fortinet Certified Trainer (FCT) assessment is a trainer evaluation process in which each candidate has to prove their training delivery skills. The FCT assessment is a two-day assessment that evaluates the FCT candidate’s ability to maintain Fortinet’s quality standards in technical knowledge, skills and instructional abilities.

Who can apply?

The FCT assessment candidate should be a Fortinet employee or a candidate sponsored by an ATC who has submitted proof of reference, along with an online application form. An FCT candidate who wants to apply for an FCT assessment must meet the following knowledge and experience eligibility requirements:

  • Extensive technical knowledge and skills in network security and cybersecurity
  • Five years of relevant experience in network security and cybersecurity
  • Certification in the required NSE training courses
  • Five years of experience in training delivery in IT security
  • Demonstrable training facilitation and delivery skills

If you meet all of these requirements you can apply for the FCT assessment!

Please contact fct@fortinet.com for queries and suggestions.

Skip to main content
Training Institute
  • Library
  • Schedule
  • Certifications
  • ATC
  • Academic Partner Program
  • Fast Track Workshops
  • Log in
  • Training
  • Library

FortiSOAR Administrator

Download Course Description

Blocks

Course Description

In this course, you will learn about FortiSOAR architecture, and how to deploy, configure, manage, operate, and monitor FortiSOAR in a multi-tenant SOC environment. You will learn about various system customization options, high-availability (HA) deployment, security management using role-based access control (RBAC), and various system monitoring tools.

Who Should Attend

Cybersecurity professionals responsible for planning, deploying, configuring, and managing FortiSOAR deployments in a SOC environment should attend this course.

Prerequisites

It is recommended that you be familiar with SOC technologies and processes.

Agenda
  1. Introduction to FortiSOAR
  2. System Configuration
  3. FortiSOAR Content Configuration
  4. User Administration
  5. Searching and Incident Response
  6. Multi-Tenancy
  7. High Availability
  8. System Monitoring and Troubleshooting
Objectives

After completing this course, you should be able to:

  • Plan a FortiSOAR deployment
  • Identify the role of SOAR in assisting security teams
  • Describe incidents and alerts in a SOC environment
  • Configure applications
  • Manage audit logs
  • Export and import a FortiSOAR modular configuration
  • Perform a full database backup and restore
  • Describe the different types of services in the FortiSOAR Content Hub
  • Configure connectors for devices
  • Configure connectors through agents
  • Configure data ingestion from cybersecurity devices
  • Configure data ingestion from external indicator of compromise (IOC) feeds
  • Configure role-based access control (RBAC)
  • Configure teams
  • Configure roles and users
  • Configure authentication
  • Configure SLA templates
  • Configure shift management queues
  • Review Elasticsearch basics
  • Review FortiSOAR recommendation engines
  • Configure Elasticsearch based record similarity
  • Configure machine learning (ML)
  • Describe how to delegate incidents across different teams
  • Configure war rooms
  • Describe the different ways to configure FortiSOAR for multiple tenants
  • Configure a multi-tenant architecture
  • Configure the secure message exchange (SME) server
  • Perform operations on a tenant FortiSOAR server
  • Identify different high availability (HA) implementation prerequisites and configuration options
  • Manage cluster licensing
  • Configure HA with an internal or external PostgreSQL database
  • Identify HA best practices
  • Configure system monitoring and notifications
  • Configure the system health check widget
  • Configure different levels of logging
  • Review FortiSOAR services and processes
System Requirements

If you take the online format of this class, you must use a computer that has the following:

  • A high-speed Internet connection
  • An up-to-date web browser
  • A PDF viewer
  • Speakers or headphones
  • One of the following:
    • HTML 5 support
    • An up-to-date Java Runtime Environment (JRE) with Java Plugin enabled on your web browser

You should use a wired Ethernet connection, not a WiFi connection. Firewalls, including Windows Firewall or FortiClient, must allow connections to the online labs.

Enroll Now

Access the latest self-paced training version

Purchasing Process

More information on how to purchase instructor-led courses, on-demand labs, exam vouchers, and study material.

Find an Instructor-Led Class

Browse our schedule for upcoming classes delivered by Fortinet.

Product Versions
  • FortiSOAR 7.6
Course Duration
  • Lecture time (estimated): 7 hours
  • Lab time (estimated): 7 hours
  • Total course duration (estimated): 14 hours
    • 2 full days or 4 half days
Formats
  • Instructor-led classroom
  • Instructor-led online
  • Self-paced online
ISC2
  • CPE training hours: 7
  • CPE lab hours: 7
  • CISSP domains: Security Operations
Part Number (SKU)

See Purchasing Process for more information

Certification

This course does not have a certification exam.

Blocks

  • Dashboard
  • Library
  • Schedule
You are not logged in. (Log in)
Data retention summary