top of page
top

FO- ADA

FO- ADA

Advanced Analytics

Fortinet logo-new.jpg

Price
Duration

USD 2,900.00 excl. VAT

3 Days

network_security_architect.webp
PDF.jpg
PDF Outline

Who Should Attend

Security professionals involved in the management, configuration, administration, and monitoring of FortiSIEM and FortiSOAR devices

in an enterprise or service provider deployment used to monitor and secure the networks of customer organizations.

What you will learn

Course Content

In this course, you will learn how to use FortiSIEM in a multi-tenant environment. You will learn about rules and their architecture, how incidents are generated, how baseline calculations are performed,

the different methods of remediation available, and how the MITRE ATT&CK framework integrates with FortiSIEM. You will also learn how to integrate FortiSOAR with FortiSIEM.

Prerequisites

Prerequisits

You must have an understanding of the topics covered in the following courses, or have equivalent experience:
• NSE 4 FortiGate Security
• NSE 4 FortiGate Infrastructure
• NSE 5 FortiSIEM

It is also highly recommended that you have an understanding, or equivalent experience with, Python programming, Jinja2 template language for Python, Linux systems, and SOAR technologies.

Objectives

Course Objectives

After completing this course, you should be able to:
• Identify various implementation requirements for a multitenant FortiSIEM deployment
• Deploy FortiSIEM in a hybrid environment with and without collectors
• Design multi-tenant solutions with FortiSIEM
• Deploy collectors in a multi-tenant environment
• Manage EPS assignment and restrictions on FortiSIEM
• Manage resource utilization of a multi-tenant FortiSIEM cluster
• Maintain and troubleshoot a collector installation
• Deploy and manage Windows and Linux agents
• Create rules by evaluating security events
• Define actions for a single pattern security rule
• Identify the incident attributes that trigger an incident

• Identify multiple pattern security rules and define conditions and actions for them
• Differentiate between a standard and baseline report
• Create your own baseline profiles
• Examine the MITRE ATT&CK framework integration on FortiSIEM and FortiSOAR
• Deploy FortiSIEM UEBA agents
• Examine UEBA rules, reports, event types, and windows template
• Configure clear conditions on FortiSIEM
• Analyze some out-of-the-box remediation scripts
• Configure various remediation methods on FortiSIEM
• Integrate FortiSOAR with FortiSIEM
• Remediate incidents from FortiSOAR

Outlines

Course Outline

PDF.jpg

1. Introduction to Multi-Tenancy
2. Defining Collectors and Agents
3. Operating Collectors
4. Windows and Linux Agents
5. Rules
6. Single Subpattern Security Rule
7. Multiple Subpattern Rules

8. Introduction to Baseline
9. Baseline
10. UEBA
11. MITRE ATT&CK
12. Clear Conditions
13. Remediation

reg1

Further information
If you would like to know more about this course please contact us

Schedule
Fortinet logo-new.jpg
Fortinet logo-new.jpg
Fortinet logo-new.jpg
reg