top of page
top

FortiDeceptor Administrator

FT-FDC-ADM

FortiDeceptor Administrator

Fortinet logo-new.jpg

Price
Duration

USD 950 excl. VAT

1 Day

network-security-specialist.jpg
PDF.jpg
PDF Outline

Who Should Attend

Cybersecurity professionals responsible for the day-to-day administration, management,

and troubleshooting of FortiDeceptor should attend this course.

What you will learn

Course Content

In this course, you will learn how to deceive, expose, and eliminate threats early in the attack kill chain using FortiDeceptor. FortiDeceptor lures

attackers into revealing themselves by engaging with a range of deception assets distributed throughout the network environment.

Prerequisites

You should have an understanding of the topics covered in the

FCP - FortiGate Administrator course or have equivalent experience.

Prerequisits
Objectives

Course Objectives

After completing this course, you will be able to:
• Describe how FortiDeceptor integrates into Enterprise networks
• Describe FortiDeceptor modules and key features
• Access FortiDeceptor and view the dashboard
• Configure network and system settings
• Configure FortiDeceptor central management
• Configure FortiDeceptor for air-gapped deployments
• Configure deployment networks
• Deploy decoy VMs and configure lure resources
• Use the deployment wizard to create and deploy decoys
• Select the appropriate decoys, services, and lures
• Create and deploy FortiDeceptor token packages

• Analyze the FortiDeceptor deployment map
• Analyze incidents, attacks, and the attack map
• Navigate the MITRE ICS matrix
• Design deception strategies based on network requirements
• Differentiate light-stack and full-stack deception
• Detect and mitigate new outbreaks
• Follow best practices for decoy and token deployment
• Follow best practices for AD integration
• Design deception based on network topology requirements
• Formulate deception strategies against specific attack vectors
• Integrate FortiDeceptor with the Fortinet Security Fabric and other Fortinet products
• Integrate FortiDeceptor with third-party products

Outlines

Course Outline

1. Introduction
2. Deception and Incidents

PDF.jpg

3. Deception Strategies
4. FortiDeceptor Integration

reg1

Further information
If you would like to know more about this course please contact us

Schedule
Fortinet logo-new.jpg
Fortinet logo-new.jpg
Fortinet logo-new.jpg
For dates in South Africa and Africa region 
reg

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT
bottom of page