Modal title

Modal body text goes here.

The Fortinet Certified Trainer (FCT) assessment is a trainer evaluation process in which each candidate has to prove their training delivery skills. The FCT assessment is a two-day assessment that evaluates the FCT candidate’s ability to maintain Fortinet’s quality standards in technical knowledge, skills and instructional abilities.

Who can apply?

The FCT assessment candidate should be a Fortinet employee or a candidate sponsored by an ATC who has submitted proof of reference, along with an online application form. An FCT candidate who wants to apply for an FCT assessment must meet the following knowledge and experience eligibility requirements:

  • Extensive technical knowledge and skills in network security and cybersecurity
  • Five years of relevant experience in network security and cybersecurity
  • Certification in the required NSE training courses
  • Five years of experience in training delivery in IT security
  • Demonstrable training facilitation and delivery skills

If you meet all of these requirements you can apply for the FCT assessment!

Please contact fct@fortinet.com for queries and suggestions.

Skip to main content
Training Institute
  • Library
  • Schedule
  • Certifications
  • ATC
  • Academic Partner Program
  • Fast Track Workshops
  • Log in
  • Training
  • Library

Threat Hunting

Download Course Description
Course Description

In this course, you will explore the practical use of Fortinet solutions as threat intelligence and threat hunting platforms. You will explore fundamental concepts about cyber threat intelligence and how to leverage Fortinet solutions to perform threat intelligence management (collection, enrichment, and so on) and threat hunting.

Who Should Attend

Security professionals involved in the architectural design, implementation, and execution of threat hunting solutions and processes using FortiAnalyzer, FortiSIEM, and FortiSOAR should attend this course.

Prerequisites
  • Basic end-user experience with command line interfaces (Linux shell and Windows PowerShell)
  • Solid knowledge of network protocols (such as IP, TCP, UDP, HTTP, DNS, and so on)
  • Basic hands-on experience with Kali Linux
    • Metasploit
    • Burp Suite
  • Experience with Browser Exploitation Framework (BeEF)
Agenda
  1. Introduction
  2. Cyber Threat Intelligence
  3. Open-Source Intelligence
  4. Threat Intelligence Platforms
  5. Threat Hunting Models and Methodologies
  6. Basic Malware Analysis
Objectives

After completing this course, you should be able to:

  • Understand basic concepts of cyber threat intelligence and threat hunting 
  • Understand frameworks commonly used to describe, organize, and catalog observed threats and actor behavior (threat intelligence)
  • Understand proposed models and methodologies for conducting threat hunting as a process
  • Understanding basic concepts about malware analysis
  • Complete practical hands-on tasks to:
    • Conduct network and endpoint threat hunting using Fortinet solutions and other third-party tools
    • Conduct threat hunting based on TTPs and an established methodology
System Requirements

If you take the online format of this class, you must use a computer that has the following:

  • A high-speed Internet connection
  • An up-to-date web browser
  • A PDF viewer
  • Speakers or headphones
  • One of the following:
    • HTML 5 support or
    • An up-to-date Java Runtime Environment (JRE) with Java plugin enabled on your web browser

You should use a wired Ethernet connection, not a WiFi connection. Firewalls, including Windows Firewall or FortiClient, must allow connections to the online labs.

Find an Instructor-Led Class

Browse our schedule for upcoming classes delivered by Fortinet.

Purchasing Process

More information on how to purchase instructor-led courses, on-demand labs, exam vouchers, and study material.

Product Versions
  • FortiSIEM 6.2.0
  • FortiEDR 4.2.2.23
Formats
  • Instructor-led classroom
  • Instructor-led online
(ISC)2

  • CPE training hours: 6
  • CPE lab hours: 14
  • CISSP domains: Security Operations

Part Number (SKU)
See Purchasing Process for more information

Certification

This course does not have a certification exam.


  • Dashboard
  • Library
  • Schedule
You are not logged in. (Log in)
Data retention summary