FortiEDR

X

Ota yhteyttä

Voit olla meihin yhteydessä ja tiedustella koulutuksistamme täydentämällä yhteystietosi ja koulutuksen nimen oheen.

Tilaa uutiskirje

Haluan tarjouksia ja tietoa koulutuksista sähköpostiini.

Tietosuojalauseke ja yksityisyys

Annan Insoft Services Ltd:lle oikeuden olla minuun yhteydessä. Annan Insoft Servicelle oikeuden käsitellä, kerätä ja tallentaa tietojani. Kaikki annetut tiedot käsitellään tietoturvallisesti tietosuojalausekkeen mukaisesti.


Tulevat päivämäärät


Nov 9 - Nov 10, 2021
09:00 - 17:00 (EET)
Online

Dec 14 - Dec 15, 2021
09:00 - 17:00 (EET)
Online

Jan 10 - Jan 11, 2022
09:00 - 17:00 (EET)
Online

Feb 9 - Feb 10, 2022
09:00 - 17:00 (EET)
Online

Mar 16 - Mar 17, 2022
09:00 - 17:00 (EET)
Online

  • FortiEDR
    2 days  (Instructor Led Online)  |  Network Security

    Course Details

    Yleiskatsaus

    In this two days class, you will learn how to use FortiEDR to protect your endpoints against advanced attacks with real-time orchestrated incident response functionality.

    Product Versions:

    • FortiEDR 4.2

    Tavoitteet

    After completing this course, you should be able to:

    • Explain the FortiEDR approach and how it works
    • Identify the communicating components and how they are configured
    • Schedule, organize, and tune a new deployment
    • Carry out basic troubleshooting steps, including: verifying that FortiEDR is installed and actively blocking malware, identifying whether FortiEDR has blocked a process or connection, finding logs, and contacting FortiEDR Support
    • Perform important administrative tasks, including: managing console users, updating collectors, deleting personal data for GDPR compliance, and viewing system events
    • Complete basic tasks in of each area of the management console: the Dashboard, the Event Viewer, the Forensics tab, the Threat Hunting module, Communication Control, Security Policies, Playbooks, Inventory, and the Administration tab
    • Manage security events and their status
    • Block communication from applications that are risky or unwanted, but not inherently malicious
    • Define next-generation antivirus, its role in FortiEDR, and where it falls in the order of operations
    • Find and remove malicious executables from all the devices in your environment
    • Use RESTful API to manage your FortiEDR environment
    • Administer a multi-tenant environment
    • Recognize what Fortinet Cloud Service is and how it works
    • Troubleshoot collector upgrades and performance issues
    • Obtain collector logs and memory dumps
    • Have a basic understanding of the history of malware, how it exploits trust, and the persistence techniques used in malware today
    • Triage PowerShell and CScript events, verify their destinations, and retrieve memory
    • Prioritize, investigate, and analyze security events
    • Remediate malicious events and create exceptions to allow safe processes

    Sisältö

    1. Overview and Technical Positioning
    2. Installation and Architecture
    3. Administration
    4. Best Practices and Deployment
    5. The User Interface in Depth Part 1
    6. The User Interface in Depth Part 2
    7. Events and Alerting
    8. Help Desk Level 1 Triage
    9. Communication Control
    10. Next-Generation Antivirus
    11. Threat Hunting
    12. RESTful API
    13. Multi-Tenancy
    14. Fortinet Cloud Services
    15. Advanced Troubleshooting
    16. Endpoint Security 101
    17. PowerShell and CScript
    18. Alert Analysis 401

    Kohdeyleisö

    IT and security professionals involved in the administration and support of FortiEDR should attend this course.

    Esivaatimukset

    • Basic understanding of cybersecurity concepts