Professional Documents
Culture Documents
FA FTNT Fast Track Brochure 23
FA FTNT Fast Track Brochure 23
Cloud
Security
User and
Device
Security
FortiGuard
Threat
Intelligence
Open
Secure Ecosystem
Networking
the Fortinet
Get a head start and stay at the cutting edge of
network security by experiencing Fortinet Fast
2
Who Can Attend?
Any interested Fortinet user can attend a Fast Track Workshop: new or
proficient. Regardless of experience level, all attendees will walk away with a
better understanding of how Fortinet can benefit their organization.
For more information, or if you would like to register for an upcoming Fast Track
Workshop, contact your local Fortinet representative.
3
BROCHURE
Creating a Comprehensive
Fortinet Security Fabric
Networks today are expanding rapidly.
At the same time, the threat landscape
is growing faster than ever. Having
security that solves the challenges of
today’s highly adaptive threat landscape,
while protecting the entire dynamic
environment, is more critical than ever.
BROCHURE | Fast Track Workshops
WORKSHOP SUMMARY
FORMAT 4-hour technical workshop
PREREQUISITES None
5
BROCHURE
WORKSHOP SUMMARY
FORMAT 4-hour technical workshop
PREREQUISITES None
7
BROCHURE
WORKSHOP SUMMARY
FORMAT 4-hour technical workshop
PREREQUISITES None
9
BROCHURE
WORKSHOP SUMMARY
FORMAT 4-hour technical workshop
PREREQUISITES None
11
BROCHURE
Advanced Email
Security Solution
Email security remains a key productivity
tool for today’s organizations, as well
as a successful attack vector for cyber
criminals. According to the Verizon 2019
Data Breach Investigations Report, 94%
of malware was delivered via malicious
emails. Gartner asserts that “advanced
threats (such as ransomware and business
email compromise) are easily bypassing
the signature-based and reputation-based
prevention mechanisms that a secure email
gateway (SEG) has traditionally used.”
BROCHURE | Fast Track Workshops
WORKSHOP SUMMARY
FORMAT 4-hour technical workshop
PREREQUISITES None
13
BROCHURE
WORKSHOP SUMMARY
FORMAT (2) 4-hour technical workshops
PREREQUISITES None
15
BROCHURE
Constructing a Secure
SD-WAN Architecture
Corporate networks are stretched thin
by cloud services, SaaS applications, and
mobility. Plus, organizations require better
connections to branch offices to deliver
higher-quality network services.
BROCHURE | Fast Track Workshops
WORKSHOP SUMMARY
FORMAT 4-hour technical workshop
PREREQUISITES None
17
BROCHURE
WORKSHOP SUMMARY
FORMAT 4-hour technical workshop
PREREQUISITES None
19
BROCHURE
WORKSHOP SUMMARY
FORMAT 4-hour technical workshop
PREREQUISITES None
21
BROCHURE
Empowering
Security Operations
Leveraging SOAR
To address the constantly evolving threat
landscape, the complexity of security
products, and the scarcity of cybersecurity
skills/staff, organizations must be able to
aggregate and enrich alerts from a wide range
of security products. In addition, they need
to automate repetitive tasks and leverage
well-defined playbooks to guide fast incident
response to maximize the efficiency of their
security operations team.
BROCHURE | Fast Track Workshops
In this workshop, participants learn how FortiSOAR n Combat complexity with connectors that easily
takes your security operation team to the next level integrate with deployed security controls to ingest
by automating the incident response process and information and provide a single, centralized point
facilitating collaboration, all behind a single console. of visibility and control
WORKSHOP SUMMARY
FORMAT 4-hour technical workshop
PREREQUISITES None
23
BROCHURE
Fortinet Teleworker
Solution Engineered
for Remote and Secure
Productivity with ZTNA
Preparing for business continuity and disaster
recovery is vital for any organization. An important
component of this is the ability to support a mostly
or fully remote workforce with little or no notice.
WORKSHOP SUMMARY
FORMAT 4-hour technical workshop
PREREQUISITES None
25
BROCHURE
Powerful Security
Information and
Event Management
Cyberattacks are a 24/7 reality. The
complexity and growth of the enterprise
estate, including infrastructure,
applications, VMs, cloud, endpoints, and
IoT, means the attack surface grows
exponentially. Coupled with a skills
shortage and resource constraints,
security becomes everybody’s problem, but
visibility, event correlation, and remediation
are other people’s responsibility. Effective
security requires visibility—all the devices,
all the infrastructure in real time—but also
requires context: what devices represent
a threat and what are their capabilities.
All this is necessary to manage the threat
the business faces and the noise multiple
security tools create.
BROCHURE | Fast Track Workshops
WORKSHOP SUMMARY
FORMAT 4-hour technical workshop
PREREQUISITES None
27
BROCHURE
WORKSHOP SUMMARY
FORMAT 4-hour technical workshop
OBJECTIVE Provide a compelling, hands-on learning experience about how to use the
Fabric Management Center to centrally manage and protect networks.
PREREQUISITES None
29
BROCHURE
Proactive Advanced
Endpoint Protection,
Visibility, and Control for
Critical Assets
Fortinet strengthens endpoint security
through integrated visibility, control,
and proactive defense. With the ability
to discover, monitor, and assess
endpoint risks, organizations can
ensure endpoint compliance, mitigate
risks, and reduce exposure.
BROCHURE | Fast Track Workshops
FortiClient can discover, monitor, and assess endpoint n Configure FortiClient EMS to apply ZTNA tags to
risks, so you can ensure endpoint compliance, mitigate endpoints that FortiGate can use to dynamically
risks, and reduce exposure. Its tight integration with control access to subnets and corporate assets
the Fortinet Security Fabric enables policy-based
automation to contain threats and control outbreaks. n Deploy FortiEDR collector
FortiClient also provides secure remote access with n Apply FortiEDR virtual patching to workstation
ZTNA, built-in VPN, single sign-on, and two-factor
authentication for added security. n Configuring FortiEDR pre- and post-execution
FortiEDR delivers advanced, real-time threat protection scanning policies
for endpoints both pre- and post-infection. It proactively n Filter, sort, and view events in FortiEDR
reduces the attack surface, prevents malware infection,
detects and defuses potential threats in real time, and n Perform forensic analysis in FortiEDR
can automate response and remediation procedures with
customizable playbooks.
WORKSHOP SUMMARY
FORMAT 4-hour technical workshop
PREREQUISITES None
31
BROCHURE
WORKSHOP SUMMARY
FORMAT 4-hour technical workshop
PREREQUISITES None
33
BROCHURE
WORKSHOP SUMMARY
FORMAT 4-hour technical workshop
PREREQUISITES None
35
BROCHURE
Application Delivery
Without Limits
With bandwidth demand growing faster than
budgets, and with cyberattacks constantly
on the rise, it can be challenging to securely,
and efficiently, deliver applications at the
speed users expect. Using an application
delivery controller (ADC) optimizes the
availability, user experience, and application
security of enterprise applications. FortiADC
provides application availability using
Layer 4/Layer 7 load balancing, data center
resiliency, application optimization, and a
web application firewall (WAF) to protect
web applications from the OWASP top 10 and
many other threats.
BROCHURE | Fast Track Workshops
WORKSHOP SUMMARY
FORMAT 4-hour technical workshop
PREREQUISITES None
37
BROCHURE
Introduction to Fortinet
Network Security
Today’s networks are highly complex
environments with borders that are
constantly changing. In response to this
highly complex environment, firewalls have
become robust, multi-functional devices that
counter an array of threats to your network.
BROCHURE | Fast Track Workshops
WORKSHOP SUMMARY
FORMAT 4-hour technical workshop
PREREQUISITES None
39
BROCHURE
WORKSHOP SUMMARY
FORMAT 4-hour technical workshop
PREREQUISITES None
41
BROCHURE
Streamlining Automation
Using Web Services APIs
Automation is key to successfully
defending against today’s advanced
threats. In addition, cloud and hybrid-
based architectures require automation
to guarantee that management and
security are not an inhibitor to these
platforms benefits.
WORKSHOP SUMMARY
FORMAT 4-hour technical workshop
PREREQUISITES None
43
BROCHURE
Many of today’s most damaging security breaches Participants who attend this workshop will learn how to:
have been due to compromised user accounts
and passwords, exacerbated by groups of users n Configure FortiAuthenticator integration with an
being provided with inappropriate levels of access. existing LDAP
Securely, and effectively managing identity n Configure FortiAuthenticator Fortinet Single-Sign-On
authentication and authorization policies for all
using windows event polling and windows mobility
systems and applications, is crucial to protect
agent
against security breaches. FortiAuthenticator
provides services that are key in creating effective n Complete certificate management for an enterprise
security policies and strengthening security by including CA certificate creation
ensuring only the right person, at the right time, can
access your sensitive networks and data.
n Generate a FortiGate HTTPS certificate request and
signing it using FortiAuthenticator SCEP
WORKSHOP SUMMARY
FORMAT 4-hour technical workshop
PREREQUISITES None
45
BROCHURE
Performance and
Security Testing
Today’s cyberthreat landscape
is constantly evolving, requiring
organizations to continually assess
their cybersecurity posture to ensure
it remains effective. FortiTester runs
a robust set of security tests, such as
agent-based MITRE ATT&CK simulations,
DDoS and fuzzing attacks, CVE-based
intrusions including SCADA targets,
malware strike packs, and much more.
These are regularly refreshed to reflect
the latest cyber campaigns seen by
FortiGuard Labs. Being able to simulate
attacks is crucial to identify gaps in
security controls and to validate the
people and processes on which the
enterprise depends.
BROCHURE | Fast Track Workshops
In this workshop, participants will start by n Perform Web protection testing against FortiWeb
configuring the network template, the template
n Implement MITRE ATT&CK using FortiTester
settings are used to populate the network settings
for the test case configuration to use in your testing, n Perform credential dumping
you will also learn how to perform security testing
including Malware, IPS, DDoS and Web attacks
against your environment, deployed with FortiWeb,
FortiGate and FortiClient. Furthermore, you will learn
how to perform MITRE ATT&CK post exploitation,
against an endpoint.
WORKSHOP SUMMARY
FORMAT 4-hour technical workshop
PREREQUISITES None
47
BROCHURE
FortiProxy is a secure web proxy that protects Participants who attend this workshop will learn how to:
employees against internet-borne attacks by
incorporating multiple detection techniques such n Setup explicit web proxy on FortiProxy
as web filtering, DNS filtering, data loss prevention, n Setup network settings on browser to point
antivirus, intrusion prevention, and advanced threat
to FortiProxy
protection. It helps enterprises enforce internet
compliance using granular application control. n Go through the forward, HTTP logs and FortiView
Content analysis enforces acceptable usage by
detecting and preventing illicit images and videos
n Enforce web access authentication
with AI-driven content analysis. n Accelerate the web access
Our solutions have powerful hardware that can
n Protection against visual threats
perform SSL inspection to effectively remove blind
spots in encrypted traffic, without compromising on n YouTube channel filtering
performance. FortiProxy hardware uses specialized
ASICs to accelerate performance of the network and n Configure the FortiAnalyzer integration using
security modules. Fortinet Security Fabric
PREREQUISITES None
49
BROCHURE
WORKSHOP SUMMARY
FORMAT 2-hour technical workshop
PREREQUISITES None
51
BROCHURE
WORKSHOP SUMMARY
FORMAT 4-hour technical workshop
PREREQUISITES None
53
BROCHURE
WORKSHOP SUMMARY
FORMAT 4-hour technical workshop
www.fortinet.com
Copyright © 2021 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be
trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein
represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain
expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet
disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. Fortinet disclaims in full any covenants,
representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.
Macintosh HD:Users:kflores:Desktop:FTNT-Archive-Work:FA-ftnt-fast-track-brochure:FA-ftnt-fast-track-brochure-23
632182-B-0-EN