This instructor-led, live training in 横浜 (online or onsite) is aimed at intermediate-level network administrators who wish to gain the essential skills to manage, administer, monitor, and maintain Fortinet security systems.
By the end of this training, participants will be able to:
Configure and manage FortiGate firewalls.
Monitor network traffic and manage incidents with FortiAnalyzer.
Automate tasks and manage policies through FortiManager.
Apply preventive maintenance strategies and troubleshoot network issues.
This instructor-led, live training in 横浜 (online or onsite) is aimed at beginner-level network administrators who wish to use FortiGate 1100E to manage and secure their network environments effectively.
By the end of this training, participants will be able to:
Understand the basic architecture and features of FortiGate 1100E.
Learn how to deploy FortiGate 1100E in various network environments.
Gain hands-on experience with basic configuration and management tasks.
This instructor-led, live training in 横浜 (online or onsite) is aimed at intermediate-level network administrators who wish to manage and secure their networks using FortiGate firewalls.
By the end of this training, participants will be able to:
Understand Fortigate features and functionalities, particularly those introduced or enhanced in version 7.4.
Configure and manage FortiGate devices and implement advanced security features.
Deploy and manage advanced security measures like IPS, antivirus, web filtering, and threat management.
Monitor network activities, analyze logs, and generate reports for auditing and compliance.
This instructor-led, live training in 横浜 (online or onsite) is aimed at intermediate-level technical professionals who wish to delve deeper into the technical aspects and functionalities of Fortinet’s product line to effectively recommend, sell, and implement Fortinet security solutions.
By the end of this training, participants will be able to:
Gain in-depth knowledge of Fortinet’s advanced security solutions and products.
Understand the technical features, benefits, and deployment scenarios for each core Fortinet product.
Configure, manage, and troubleshoot Fortinet solutions in diverse environments.
Apply Fortinet products to address complex security challenges and requirements.
This instructor-led, live training in 横浜 (online or onsite) is aimed at security professionals who wish to learn how to use Cortex XDR in preventing and stopping the occurrence of sophisticated attacks and threats.
By the end of this training, participants will be able to:
Understand the architecture and components of Cortex XDR.
Create and manage profiles for exploit and malware prevention.
Analyze behavioral threats and monitor response actions.
This instructor-led, live training in 横浜 (online or onsite) is aimed at beginner-level technical professionals who wish to learn the concept of the Security Fabric and how it evolved to address the cybersecurity needs of organizations.
By the end of this training, participants will be able to:
Learn the evolution of cybersecurity and how it has shaped current security technologies.
Use Fortinet products to protect against specific types of cyber threats and attacks.
Understand the integration and automation capabilities of Fortinet solutions in providing a coordinated response to cyber incidents.
This instructor-led, live training in 横浜 (online or onsite) is aimed at security professionals who wish to learn how to troubleshoot Palo Alto Networks' next-generation firewalls.
By the end of this training, participants will be able to:
Understand the architecture of the next-generation firewall.
Investigate and troubleshoot networking issues using firewall tools.
Analyze advanced logs to resolve real-life scenarios.
This instructor-led, live training in 横浜 (online or onsite) is aimed at beginner-level network security professionals who wish to learn the concept of cybersecurity and the current global threat landscape.
By the end of this training, participants will be able to:
Understand the current global threat landscape and identify the main types of cyber adversaries.
Recognize the primary types of malware and the mechanics of cyber attacks.
Understand the basics of network security and the importance of a layered security approach.
Learn about Fortinet's Security Fabric and how it addresses modern cybersecurity challenges.
This instructor-led, live training in 横浜 (online or onsite) is aimed at intermediate-level network and security professionals who wish to effectively implement, manage, and secure SD-WAN solutions.
By the end of this training, participants will be able to:
Understand the fundamental concepts, benefits, and challenges associated with SD-WAN technologies.
Design an SD-WAN architecture tailored to organizational needs and deploy SD-WAN solutions effectively.
Implement and manage security features within an SD-WAN.
Monitor, manage, and troubleshoot SD-WAN environments.
This instructor-led, live training in 横浜 (online or onsite) is aimed at intermediate-level network and security professionals who wish to effectively manage and secure networks using Fortigate 600E equipment, with a specific focus on HA configurations for enhanced reliability and performance.
By the end of this training, participants will be able to:
Understand the features, specifications, and operating principles of the Fortigate 600E firewall.
Perform the initial setup of the Fortigate 600E, including basic configuration tasks like setting up interfaces, routing, and initial firewall policies.
Configure and manage advanced security features such as SSL VPN, user authentication, antivirus, IPS, web filtering, and anti-malware capabilities to protect against a variety of network threats.
Troubleshoot common issues in HA setups and effectively manage HA environments.
This instructor-led, live training in 横浜 (online or onsite) is aimed at security professionals who wish to learn how to manage firewalls at scale.
By the end of this training, participants will be able to:
Design, configure, and manage the Panorama FireWall management server.
Manage policies using device groups.
Roll out network configurations to different firewalls.
This instructor-led, live training in 横浜 (online or onsite) is aimed at intermediate-level IT professionals who wish to effectively use and manage Sophos XG Firewall to enhance the security posture of their organizations or clients.
By the end of this training, participants will be able to:
Understand the features and capabilities of Sophos XG Firewall.
Perform initial setup, configure network interfaces, and create and manage firewall policies and rules.
Understand how to integrate with various authentication services.
Utilize Sophos XG Firewall's monitoring and reporting tools to maintain oversight of network security.
This instructor-led, live training in 横浜 (online or onsite) is aimed at experienced network security managers who wish to gain the knowledge and skills needed to deploy, manage, and troubleshoot Fortinet's FortiGate security appliances running on FortiOS 7.2 as an NSE4 Network Security Professional.
By the end of this training, participants will be able to:
Understand Fortinet's product portfolio and the role of FortiOS in network security.
This instructor-led, live training in 横浜 (online or onsite) is aimed at security professionals who wish to learn the fundamentals of managing Palo Alto Networks' next-generation firewalls.
By the end of this training, participants will be able to:
Configure and manage Palo Alto Networks' firewall essential features.
This instructor-led, live training in 横浜 (online or onsite) is aimed at systems administrators who wish to learn how to use Zscaler to secure network connections for applications and cloud services.
By the end of this training, participants will be able to:
Learn and understand the architecture security on Zscaler.
Understand the value and baseline features of Zscaler advanced configurations.
Use Zscaler to secure network connections for applications and cloud services.
This instructor-led, live training in 横浜 (online or onsite) focuses on network security from a software security perspective. Participants will learn about common network attacks and defenses across OSI layers, with a strong emphasis on application-layer threats such as session hijacking and denial-of-service (DoS) attacks.By the end of this training, participants will be able to:
Understand key concepts in IT security and secure coding.
Identify and mitigate network threats at different OSI layers.
Apply cryptographic methods in real-world scenarios.
Implement and configure security protocols securely.
Recognize and address cryptographic vulnerabilities and exploits.
Access resources for ongoing secure coding practices.
This instructor-led, live training in 横浜 (online or onsite) is aimed at security engineers and system administrators who wish to use FortiGate NGFW's advanced security-driven network systems to protect their organization from internal and external threats.
By the end of this training, participants will be able to:
Install and configure the preferred FortiGate NGFW software and hardware model.
Operate and employ FortiGate NGFW to improve the efficiency of system administration tasks.
Manage various forms of external and internal threats using FortiGate features.
Integrate FortiGate security fabric with the entire IT infrastructure to provide quick automated protection.
Ensure long-term protection from attacks with independent and continuous FortiGate threat intelligence.
Troubleshoot the most common firewall system setup errors relevant to FortiGate NGFWs.
Implement Fortinet security solutions in other enterprise applications.
This instructor-led, live training in 横浜 (online or onsite) is aimed at software testers who wish to protect their organization's network with Nmap.
By the end of this training, participants will be able to:
Set up the necessary testing environment to start using Nmap.
Scan network systems for security vulnerabilities.
OpenVAS is an advanced open source framework which consists of several services and tools for network vulnerability scanning and management.
In this instructor-led, live training, participants will learn how to use OpenVAS for network vulnerability scanning.
By the end of this training, participants will be able to:
Install and configure OpenVAS
Learn the fundamental features and components of OpenVAS
Configure and implement network vulnerability scans with OpenVAS
Review and interpret OpenVAS scan results
Audience
Network engineers
Network administrators
Format of the course
Part lecture, part discussion, exercises and heavy hands-on practice
Note
To request a customized training for this course, please contact us to arrange.
This instructor-led, live training in 横浜 (online or onsite) is aimed at developers who wish to prevent malware intrusion with Palo Alto Networks.
By the end of this training, participants will be able to:
Set up the necessary development environment to start developing firewalls.
This instructor-led, live training in 横浜 (online or onsite) is aimed at technical persons who wish to apply the most suitable tools and techniques to secure both telecom as well as wireless networks.