0% found this document useful (0 votes)
92 views

Fast Track Quick Reference

This document provides an agenda for a security driven networking workshop. It outlines several sessions that will cover topics like FortiProxy explicit proxy setup, content analysis and filtering, zero trust web access with FortiIsolator, SD-WAN orchestration, and securing industrial control systems. Additional sessions will focus on advanced email security, application delivery control, achieving PCI compliance for web applications, and defending against infrastructure disruptions with FortiDDoS. The workshop aims to help attendees strengthen their network security.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
92 views

Fast Track Quick Reference

This document provides an agenda for a security driven networking workshop. It outlines several sessions that will cover topics like FortiProxy explicit proxy setup, content analysis and filtering, zero trust web access with FortiIsolator, SD-WAN orchestration, and securing industrial control systems. Additional sessions will focus on advanced email security, application delivery control, achieving PCI compliance for web applications, and defending against infrastructure disruptions with FortiDDoS. The workshop aims to help attendees strengthen their network security.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Quick Reference Guide

Security Driven Networking

Workshop Product Agenda

 FortiProxy explicit proxy setup


 Web access authentication
FortiAnalyzer
 Content caching
Protecting & Accelerating User Web FortiGate
 Content analysis and video filtering
Access FortiIsolator
 FortiAnalyzer Integration and Report
FortiProxy
 Zero Trust Web Access with FortiIsolator
 FortiProxy Challenge (Optional)

 General GUI changes: packet capture


and debug flow, user interface themes,
dynamic routing
 Security-driven networking: SD-WAN
orchestration, API preview
FortiAnalyzer  Al-Driven security operations: improved
FortiGate automation workflow
What’s New in FortiOS?
FortiManager  Next generation firewall: workflow
FortiSwitch management, web filtering
 Secure access switching: FortiSwitch
management
 Security Fabric: Fabric management
page, FortiAnalyzer reports, Security
Fabric in multi-VDOM mode

 FortiGate installation
 Basic routing
 Basic firewall policies
Introduction to Fortinet Network FortiGate  Security profiles
Security FortiAnalyzer  Logging and reporting
 Basic CLI
 Setting up the Fortinet Security Fabric
 Local user authentication
 SSL VPN for secure external access

Fast Track Workshops v1.1 30 August 2022


SD-Branch: LAN Edge Wired and
 Create a FortiLink interface
Wireless
FortiGate  Authorize FortiSwitch and FortiAP
FortiSwitch  Create VLANs and policies
Max students: 16  Create SSIDs
FortiAP
Instructors: check calendar for  Configure radio frequency (RF)
availability  Assign firewall policies to FortiGate

 Configuring SD-WAN via FortiManager


 Setting up IPsec VPN
 Installing the managed gateway policies
 Configure VPN tunnel endpoints
 Creating an SD-WAN template
 Cloning a template
Constructing a Secure SD-WAN FortiGate  Assign and install the template
Architecture FortiManager  Edit the default route
 Examining the configurations
 Verify the failover to VPN
 Verify return to MPLS

 ADVPN (Automatic full-mesh VPN)


 Configure BGP
 Verify spoke-to-spoke ADVPN

 NGFW profile-based inspection


 Intrusion prevention system
FortiGate  Per policy inspection modes
Fortifying the Enterprise Network
FortiManager  Antivirus CDR and threat feeds
(NGFW)  Automation stitches
FortiAnalyzer
 ADVPN (Automatic full-mesh VPN)
 NFGW policy-based inspection
 Blocking specific applications

 OT business drivers and


security priorities
 Differences between IT and OT
 The importance of actively securing OT
Cybersecurity for Safe, Reliable, environments
Secure Industrial Control FortiGate  Leveraging the Purdue Model
Systems (ICS)
 Applying the Security Fabric to
secure OT
 Expanding the Security Fabric and
enhancing the value of Fabric-ready
partners

Fast Track Workshops v1.1 30 August 2022


Dynamic Cloud Security

Workshop Product Agenda

 Session profiles
 Antivirus/antimalware
Advanced Email Security
FortiMail  Impersonation analysis
Solution  Content disarm and reconstruction
 URL click protection
 Identity-based encryption

 Simplify scalability of web applications


within the data center
 Provide global redundancy for web
Application Delivery Control FortiADC
applications
Without Limits FortiGate  Improve performance of web
applications using SSL offloading
 Protect and secure web applications
with built-in firewall, WAF, and more

 Perform initial vulnerability testing


 Create a protection profile
 Configure and secure local logging
 Remote logging with FortiAnalyzer
FortiWeb  Secure resource access using
Achieve PCI DSS Compliance
FortiGate authentication and page enforcement
for Web Applications
FortiAnalyzer  Implement certificates and encryption
 Protect against zero-day attacks using
machine learning
 Perform an injection attack and use
FortiWeb to protect against it
 Secure your cookies with FortiWeb

 Setup and configure FortiDDoS from


scratch
Defend and Protect Against  Configure Service Protection Profiles
Disruptions to Your FortiDDoS and protection sub-nets

Infrastructure  Generate and characterize an attack


FortiGate
 Reduce false positive DDoS attacks
 Differentiate between FortiDDoS and
Statefull firewalls

Fast Track Workshops v1.1 30 August 2022


Fabric Management

Workshop Product Agenda

 Understand the benefits of using the Fabric


Management Center
 Reduce operational complexity and
security risk by simplifying and automating
deployment and network monitoring
Reduce the Complexity of  Centrally manage a device’s configuration,
Operations with the Fabric FortiManager FortiGate including policies, IPsec VPN, and SD-
WAN, using the GUI and scripts
Management Center
 Improve time to compliance readiness with
pre-built reports, as well as customize and
create new reports
 Reduce risk by automating response to
security events with network-aware
response actions

 Understand the benefits of various Web


Streamlining Automation Services APIs
FortiManager FortiGate
Using Web Services APIs  Construct methods to configure and deploy
 FortiManager and FortiGate policies

Configure a Security Fabric to integrate:

FortiGate FortiManager
Creating a Comprehensive  Multiple FortiGate devices
FortiAnalyzer  FortiManager/FortiAnalyzer
Fortinet Security Fabric
FortiSandbox FortiWeb  FortiSandbox
 FortiWeb

Fast Track Workshops v1.1 30 August 2022


AI Driven Security Operations

Workshop Product Agenda

FortiGate
FortiClient  Apply solutions in different stages of the kill
chain
FortiSandbox
Breaking the Kill Chain with Al-  How to detect advanced and zero-day threats
FortiMail  How to disrupt threat actors
Driven Breach Protection
FortiNDR  How to bolster security operations
FortiDeceptor  includes challenge to protect an organization
FortiManager from attack

 Understand CMDB and FortiSIEM architecture


 Use FortiSIEM features
Powerful Security Information
FortiSIEM  Run analytic searches
and Event Management with
FortiGate  Investigate UEBA events
SIEM
 Use rapid detection and remediation of
security events
 Use security and performance management

 Understand the benefits of using FortiAnalyzer


to simplify SOC operations
 Use playbooks to automate workflows and
Simplify SOC with Security FortiAnalyzer
reduce the workload on the security team
Fabric Analytics and Automation FortiGate  Use FortiGate event handlers to automate
actions via automation stitches
 Work with analytics logs and generate custom
reports

 Automating routine tasks to preserve scarce


expertise for critical incidents
 Use connectors that integrate with deployed
Empowering Security FortiSOAR security controls to ingest information and
provide a single, centralized point of visibility
Operations Leveraging SOAR FortiGate and control
 Aggregate security alerts in one place,
enriched with added context to speed
investigation, and including playbooks to guide
the triage process

Fast Track Workshops v1.1 30 August 2022


Zero Trust Network Access

Workshop Product Agenda

 Integrate FortiClient EMS into the


Security Fabric
 Configure the FortiClient custom installer
 Configure FortiClient EMS ZTNA tags and
Proactive Advanced Endpoint posture check to dynamically control access
FortiClient EMS to subnets
Protection, Visibility, and
FortiEDR  Introduction to FortiEDR architecture and
Control for Critical Assets Deployment
FortiGate
Including ZTNA  Configure EDR advanced protection,
including malware analysis, pre-execution,
and virtual patching
 Filter, sort, and view events in FortiEDR
 Perform forensic analysis in FortiEDR

 Configure two-factor authentication


 Create an inbound VPN policy on FortiGate
that allows teleworkers to tunnel back to
corporate headquarters
Fortinet Teleworker Solution  Configure EMS to protect remote users as
FortiGate
Engineered for Remote and effectively as if they were located at the
FortiClient EMS corporate office
Secure Productivity
 Configure ZTNA tags, rules, and servers to
provide role-based application access
 Deploy out-of-box FortiGate at home
 Demonstrate successful operation of these
critical functions

FortiNAC  Achieve network and endpoint enhanced


visibility
Securely Embrace the IoT FortiGate
 Configure dynamic control capabilities
Revolution with NAC FortiSwitch  Create automated responses for rapid threat
FortiAnalyzer mitigation
 FortiGate VPN device Integration

 Integrate FortiClient Endpoint Management


Server (EMS) into Security Fabric.
 Configure EMS Zero Trust policies and rules
Improving Application Access to protect corporate and remote users.

and Security with Fortinet FortiGate  Configure FortiClient Endpoint Management


Server (EMS) to protect remote users as
ZTNA FortiClient EMS effectively as if they were located at the
corporate office
 Configure ZTNA HTTPS Access Proxy for
secure remote access to applications.
 Configure ZTNA IP/MAC Based Access
Control for On-net dynamic access.

Fast Track Workshops v1.1 30 August 2022


Team Challenge

Workshop Product Agenda

Team Challenge where participants compete


against each other in teams for the best score.
Includes Leaderboard for real-time display of
FortiGate team scores.
FortiMail
FortiWeb Includes two independent challenges which can
Attack & Defend Challenge be delivered as a single event, or individually:
FortiClient
 Attack Challenge: Using threat actor's tools
Red Team & Blue Team FortiSandbox and techniques to breach an organization
FortiManager and retrieve sensitive information from a
fictitious organization
FortiAnalyzer
 Defend Challenge: Using FortiGate,
FortiMail, FortiWeb, FortiSandbox, and
FortiClient-EMS to break the kill chain

Fast Track Workshops v1.1 30 August 2022

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy