FortiEDR

X

Ota yhteyttä

Voit olla meihin yhteydessä ja tiedustella koulutuksistamme täydentämällä yhteystietosi ja koulutuksen nimen oheen.

Tilaa uutiskirje

Haluan tarjouksia ja tietoa koulutuksista sähköpostiini.

Tietosuojalauseke ja yksityisyys

Annan Insoft Services Ltd:lle oikeuden olla minuun yhteydessä. Annan Insoft Servicelle oikeuden käsitellä, kerätä ja tallentaa tietojani. Kaikki annetut tiedot käsitellään tietoturvallisesti tietosuojalausekkeen mukaisesti.


FortiEDR

VARAA NYT
Kesto
2 päivää
Toimitus
(Online ja paikan päällä)
Hinta
Hinta pyydettäessä

In this class, you will learn how to use FortiEDR to protect your endpoints against advanced attacks with real-time orchestrated incident response functionality. You will also explore FortiEDR features and how they protect your endpoints automatically in real time.

Product Versions:

  • FortiEDR 5.0

After completing this course, you should be able to:

  • Explain the FortiEDR approach and how it works
  • Identify the communicating components and how they are configured
  • Perform important administrative tasks, including: managing console users, updating collectors, deleting personal data for GDPR compliance, deploy multi-tenant environment and viewing system events
  • Carry out basic troubleshooting steps, including: verifying that FortiEDR is installed and actively blocking malware, identifying whether FortiEDR has blocked a process or connection, finding logs, and contacting FortiEDR Support
  • Perform important administrative tasks, including: managing console users, updating collectors, deleting personal data for GDPR compliance, and viewing system events
  • Recognize what Fortinet Cloud Service is and how it works
  • Complete basic tasks in of each area of the management console: the Dashboard, the Event Viewer, the Forensics tab, the Threat Hunting module, Communication Control, Security Policies, Playbooks, Inventory, and the Administration tab
  • Manage security events and their status
  • Block communication from applications that are risky or unwanted, but not inherently malicious
  • Find and remove malicious executables from all the devices in your environment
  • Understand how FortiEDR integrates with Fortinet Security Fabric, and how FortiXDR works
  • Use RESTful API to manage your FortiEDR environment
  • Prioritize, investigate, and analyze security events
  • Remediate malicious events and create exceptions to allow safe processes
  • Carry out basic troubleshooting tasks on all FortiEDR components
  • Obtain collector logs and memory dumps
  1. Product Overview and Installation
  2. Administration
  3. Security Policies
  4. Fortinet Cloud Security and Playbooks
  5. Communication Control
  6. Events and Alerting
  7. Threat Hunting and Forensics
  8. RESTful API
  9. Troubleshooting

IT and security professionals involved in the administration and support of FortiEDR should attend this course.

  • A basic understanding of cybersecurity concepts

In this class, you will learn how to use FortiEDR to protect your endpoints against advanced attacks with real-time orchestrated incident response functionality. You will also explore FortiEDR features and how they protect your endpoints automatically in real time.

Product Versions:

  • FortiEDR 5.0

After completing this course, you should be able to:

  • Explain the FortiEDR approach and how it works
  • Identify the communicating components and how they are configured
  • Perform important administrative tasks, including: managing console users, updating collectors, deleting personal data for GDPR compliance, deploy multi-tenant environment and viewing system events
  • Carry out basic troubleshooting steps, including: verifying that FortiEDR is installed and actively blocking malware, identifying whether FortiEDR has blocked a process or connection, finding logs, and contacting FortiEDR Support
  • Perform important administrative tasks, including: managing console users, updating collectors, deleting personal data for GDPR compliance, and viewing system events
  • Recognize what Fortinet Cloud Service is and how it works
  • Complete basic tasks in of each area of the management console: the Dashboard, the Event Viewer, the Forensics tab, the Threat Hunting module, Communication Control, Security Policies, Playbooks, Inventory, and the Administration tab
  • Manage security events and their status
  • Block communication from applications that are risky or unwanted, but not inherently malicious
  • Find and remove malicious executables from all the devices in your environment
  • Understand how FortiEDR integrates with Fortinet Security Fabric, and how FortiXDR works
  • Use RESTful API to manage your FortiEDR environment
  • Prioritize, investigate, and analyze security events
  • Remediate malicious events and create exceptions to allow safe processes
  • Carry out basic troubleshooting tasks on all FortiEDR components
  • Obtain collector logs and memory dumps
  1. Product Overview and Installation
  2. Administration
  3. Security Policies
  4. Fortinet Cloud Security and Playbooks
  5. Communication Control
  6. Events and Alerting
  7. Threat Hunting and Forensics
  8. RESTful API
  9. Troubleshooting

IT and security professionals involved in the administration and support of FortiEDR should attend this course.

  • A basic understanding of cybersecurity concepts
    Kurssiaikataulu
  • ` Feb 6 - Feb 7, 2023
  • ` Mar 6 - Mar 7, 2023
  • ` Apr 3 - Apr 4, 2023
  • ` May 1 - May 2, 2023
  • ` May 29 - May 30, 2023
  • ` Jun 26 - Jun 27, 2023