Modal title

Modal body text goes here.

The Fortinet Certified Trainer (FCT) assessment is a trainer evaluation process in which each candidate has to prove their training delivery skills. The FCT assessment is a two-day assessment that evaluates the FCT candidate’s ability to maintain Fortinet’s quality standards in technical knowledge, skills and instructional abilities.

Who can apply?

The FCT assessment candidate should be a Fortinet employee or a candidate sponsored by an ATC who has submitted proof of reference, along with an online application form. An FCT candidate who wants to apply for an FCT assessment must meet the following knowledge and experience eligibility requirements:

  • Extensive technical knowledge and skills in network security and cybersecurity
  • Five years of relevant experience in network security and cybersecurity
  • Certification in the required NSE training courses
  • Five years of experience in training delivery in IT security
  • Demonstrable training facilitation and delivery skills

If you meet all of these requirements you can apply for the FCT assessment!

Please contact fct@fortinet.com for queries and suggestions.

Skip to main content
Training Institute
  • Library
  • Schedule
  • Certifications
  • ATC
  • Academic Partner Program
  • Fast Track Workshops
  • Log in
  • Training
  • Library

Introduction to the Threat Landscape

Download Course Description

Blocks

Course Description

In this course, you will learn about the cyberthreat landscape. This landscape includes the threats that endanger computer networks, the cast of bad actors who are behind these threats, and the cybersecurity first principles that, if followed, can keep you and your computer network safe. This course is designed as an entry point for individuals who are new to cybersecurity.

Who Should Attend

Anyone who wants to learn about the threat landscape should attend this course.

Prerequisites
  • There are no prerequisites for this course.
Agenda
  1. Introduction to Cybersecurity
  2. The Threat Landscape
  3. Social Engineering
  4. Malware
Objectives

After completing this course, you will be able to:

  • Describe cybersecurity and the principles of information security
  • Identify the types of bad actors, their methods, and countermeasures used against them
  • List different social engineering techniques
  • Describe malware types and their delivery methods
System Requirements

If you take the online format of this class, you must use a computer that has the following:

  • A high-speed Internet connection
  • An up-to-date web browser
  • A PDF viewer
  • Speakers or headphones
  • One of the following:
    • HTML 5 support
    • An up-to-date Java Runtime Environment (JRE) with Java plugin enabled in your web browser

You should use a wired Ethernet connection, not a WiFi connection. Firewalls, including Windows Firewall or FortiClient, must allow connections to the online labs.

Enroll Now

Access the latest self-paced training version

Course Duration
  • Total course duration (estimated): 3 hours
Formats
  • Self-paced online
Exam

By passing this course, you will be awarded the associated exam badge.

Certification

This course is part of the FCF Cybersecurity certification track.

Blocks

  • Dashboard
  • Library
  • Schedule
You are not logged in. (Log in)
Data retention summary