Plan Szkolenia

Introduction

Evolution of Cybersecurity

  • The changing cyber threat landscape
  • Shifts in cybersecurity strategies and technologies
  • Introduction to Fortinet’s vision for integrated security

Fortinet Security Fabric Overview

  • Key principles and components of the Security Fabric
  • How the Security Fabric provides comprehensive security coverage

Core Solutions within the Security Fabric

  • FortiGate: Next-Generation Firewalls (NGFW)
  • FortiSandbox advanced threat protection
  • FortiMail secure email gateway
  • FortiWeb: Web Application Firewall (WAF)

Specialized Solutions and Advanced Technologies

  • FortiManager and FortiAnalyzer for centralized management and analytics
  • FortiClient for endpoint security
  • FortiSIEM: Security Information and Event Management
  • Introduction to Secure SD-WAN and Secure Access

Addressing Key Security Challenges

  • Solutions for preventing and mitigating ransomware
  • Strategies for combating advanced persistent threats (APTs)
  • Enhancing security in cloud environments

Integration and Automation

  • How Fortinet solutions integrate with third-party products
  • Automating threat response with the Security Fabric

Summary and Next Steps

Wymagania

  • Basic understanding of cybersecurity concepts and the threat landscape
  • Familiarity with network security fundamentals

Audience

  • Technical professionals
  • Sales and marketing support personnel
 14 godzin

Liczba uczestników



Cena za uczestnika

Opinie uczestników (4)

Szkolenia Powiązane

System and Network Security with FortiGate

21 godzin

Fortigate 600E Security Administration and Operations

14 godzin

FortiGate 7.4 Administration

21 godzin

Fortinet NSE1

7 godzin

Fortinet NSE3

14 godzin

Fortinet NSE4 - FortiOS

14 godzin

BeyondCorp: Implementing Zero Trust Security

14 godzin

Network Security

14 godzin

Cyberbezpieczeństwo w praktyce dla początkujących

7 godzin

Bezpieczeństwo sieci w systemie Linux

14 godzin

Network Security Administrator

35 godzin

Testy penetracyjne – wykrywanie i wykorzystywanie podatności

28 godzin

Software-Defined Wide Area Network (SD-WAN) and Security

7 godzin

Bezpieczeństwo IT dla praktyków

126 godzin

Bezpieczeństwo sieci komputerowych – jak zabezpieczyć swoje usługi

28 godzin

Powiązane Kategorie