Fortinet Trainings

FO-FDDoS

FortiDDoS

Price:
United Arab Emirates:
USD 900.00 excl. VAT

Duration: 1 Days

Who Should Attend

Anyone who is responsible for deployment and day-to-day management of a FortiDDoS appliance.

Dates
Date Country Location Language Register
17-10-2019 - 17-10-2019 AE Dubai English Register
17-10-2019 - 17-10-2019 SA Riyadh English Register
International dates
 

Certification

Network Security Expert 6 (NSE6)

Prerequisites
  • Knowledge of TCP, UDP, ICMP, and HTTP protocols
  • Knowledge of network security
Course Content

In this 1-day class, you will learn how to form network baseline data, and how to recognize and mitigate individual and distributed denial of service (DDoS) attacks while preserving service and network performance.

In interactive labs, you will deploy FortiDDoS to learn about normal network traffic patterns. Then you will simulate attacks, observe the defense, and adjust the automatically estimated behavior.

With a focus on core feature skills, topics also include network behavior analysis and ASIC chips.

Course Objectives

After completing this course, you will be able to:

  • Train your FortiDDoS to recognize your unique network patterns
  • Choose the right FortiDDoS model
  • Distinguish a DDoS from a rush of Reddit traffic on a successful Thursday marketing campaign
  • Defend against both volumetric and mechanistic DDoS attacks
  • Mitigate SYN floods
  • Handle attacks from dynamic or Tor-masked IPs by FortiGuard IP Reputation and aging data
  • Detect connections from proxies
  • Inspect HTTP traffic on non-standard ports
  • Deploy to protect both network appliances and servers
  • Describe how the blocking periods and penalty factors intelligently determine which packets will be dropped after an attack has been detected
  • Implement bypass or high availability FortiDDoS cluster for maximum service uptime
  • Understand when to use Detection vs. Prevention mode
  • Create “Do Not Track” policies
  • Whitelist “safe” clients and servers
  • Characterize different types of attacks by using logs and statistics graphs.
  • Troubleshoot incorrect thresholds
Course Outline
  • Introduction & Deployment
  • Initial Configuration
  • Monitoring & Reporting
  • Global Settings
  • Service Protection Profiles 
Further information

If you would like to know more about this course please contact us