NSE 7: Advanced Threat Protection
Schedule
Start | End | Duration | Location | Details |
---|
Course Details
NSE 7: Advanced Threat Protection
Duration: 2 Days
Course Code: FT-ATP
Prerequisites:
You must have an understanding of the topics covered in the following courses, or have equivalent experience:
• NSE 4 FortiGate Security
• NSE 4 FortiGate Infrastructure
It is also recommended that you have an understanding of the topics covered in the following courses, or have equivalent experience:
• NSE 6 FortiMail
• NSE 6 FortiWeb
• NSE 5 FortiClient
Intended Audience:
This course is intended for network security engineers responsible for designing, implementing, and maintaining an ATP solution with FortiSandbox, in an Enterprise network environment.
Course Objectives:
• Identify different types of cyber attacks
• Identify threat actors and their motivations
• Understand the anatomy of an attack—the kill chain
• Identify the potentially vulnerable entry points in an Enterprise network
• Identify how the ATP framework works to break the kill chain
• Identify the role of FortiSandbox in the ATP framework
• Identify appropriate applications for sandboxing
• Identify FortiSandbox architecture
• Identify FortiSandbox key components
• Identify the appropriate network topology requirements
• Configure FortiSandbox
• Monitor FortiSandbox operation
• Configure FortiGate integration with FortiSandbox
• Configure FortiMail integration with FortiSandbox
• Configure FortiWeb integration with FortiSandbox
• Identify the role of machine learning in preventing zero day attacks and advanced threats
• Configure machine learning on FortiWeb
• Analyze attack logs from machine learning system
• Configure FortiClient integration with FortiSandbox
• Troubleshoot FortiSandbox-related issues
• Perform analysis of outbreak events
• Remediate outbreak events based on log and report analysis
Course Outlines:
• Attack Methodologies and the ATP Framework
• FortiSandbox Key Components
• High Availability, Maintenance and Troubleshooting
• Protecting the Edge
• Protecting Email Networks
• Protecting Web Applications
• Protecting End Users
• Protecting Third-Party Appliances
• Results Analysis