Course description
After completing this course, you will be able to:
- Identify threat actors and their motivations
- Identify different types of counterattacks
- Describe the Fortinet solutions for different stages of the Cyber Kill Chain
- Analyze the MITRE ATT&CK matrix
- Identify FortiSandbox architecture and key components
- Plan a FortiSandbox deployment
- Describe FortiSandbox input methods
- Select an appropriate deployment mode and configure initial settings
- Explain FortiSandbox interface requirements
- Configure alert emails, SNMP monitoring, and a remote backup
- Analyze dashboards, the operation center, and system events
- Monitor FortiSandbox operation and troubleshoot system issues
- Manage guest VMs
- Configure VM association settings and scan options
- Configure high availability cluster settings and health checks
- Monitor cluster health and individual nodes
- Configure FortiGate, FortiMail, FortiWeb, and FortiClient EMS integration with FortiSandbox
- Configure threat intelligence sharing
- Monitor submission logs from various Fortinet Security Fabric devices
- Troubleshoot integration issues
- Analyze scan job reports
