Advanced Threat Protection (NSE 7)

Fortinet Training
  • Duration: 2 days

In this 2-day course, you will learn the following:

  • How to protect your organization and improve its security against advance threats that bypass traditional security controls
  • How FortiSandbox detects threats that traditional antivirus products miss
  • How FortiSandbox dynamically generates local threat intelligence, which can be shared throughout the network
  • How other advanced threat protection (ATP) components—FortiGate, FortiMail, FortiWeb, and FortiClient—leverage this threat intelligence information to protect organizations, from end-to-end, from advanced threats
  • Objectives 0/0

    After completing this course, candidates will be able to:
    • Identify different types of cyber attacks
    • Identify threat actors and their motivations
    • Understand the anatomy of an attack—the kill chain
    • Identify the potentially vulnerable entry points in an Enterprise network
    • Identify how the ATP framework works to break the kill chain
    • Identify the role of FortiSandbox in the ATP framework
    • Identify appropriate applications for sandboxing
    • Identify FortiSandbox architecture
    • Identify FortiSandbox key components
    • Identify the appropriate network topology requirements
    • Configure FortiSandbox
    • Monitor FortiSandbox operation
    • Configure FortiGate integration with FortiSandbox
    • Configure FortiMail integration with FortiSandbox
    • Configure FortiWeb integration with FortiSandbox
    • Identify the role of machine learning in preventing zero day attacks and advanced threats
    • Configure machine learning on FortiWeb
    • Analyze attack logs from machine learning system
    • Configure FortiClient integration with FortiSandbox
    • Troubleshoot FortiSandbox-related issues
    • Perform analysis of outbreak events
    • Remediate outbreak events based on log and report analysis

    No items in this section
  • Course Contents 0/0

    1. Attack Methodologies and the ATP Framework
    2. FortiSandbox Key Components
    3. High Availability, Maintenance and Troubleshooting
    4. Protecting the Edge
    5. Protecting Email Networks
    6. Protecting Web Applications
    7. Protecting End Users
    8. Protecting Third-Party Appliances
    9. Results Analysis

    No items in this section




Not enough ratings to display

Leave a Reply

Your email address will not be published. Required fields are marked *