JOIN OUR FAST TRACK INTERACTIVE TECHNICAL WORKSHOP ONLINE!

Over the coming months Fortinet will be hosting a number of interactive technical Fast Track workshops online with hands-on labs. The workshops on offer are explained in the section below the register button.
 
The following are sessions you can choose from (all times are AEDT - Sydney):

 

*For Sales enablement requests please email rkeast@fortinet.com*

 

 
N.B. Attendees must have their own laptops
 
The Fast Track Workshops on offer are explained below:

 

Achieve PCI DSS Compliance with FortiWEB

Today, more than ever, businesses are measured by the value of their data. This includes product designs, patents, and corporate financial records. The most critical, and most valuable data, is the confidential information of your customers, including credentials, and credit cards. Secure access, including, transmission, processing, and storage of all of this sensitive data is critical to the success of any business. Failing to protect this information will not only cost a business in direct, immediate losses, but also in fines, legal liabilities, and an erosion of customer loyalty.

To assist businesses with protecting this valuable information, the Payment Card Industry Data Security Standard (PCI DSS) was introduced. PCI DSS standards ensure that all businesses that accept payment card, or other e-commerce, transactions have the tools to securely accept, process, transmit, and store, this information in a secure environment.

FortiWeb provides the tools and resources to address many specific requirements of PCI DSS compliance. Not only does FortiWeb provide the basic HTTP/HTTPS firewall functions, but also allows you to address areas such as secure access, data encryption during transmission, sensitive data masking, and vulnerability scanning. Machine Learning helps to ensure your applications are protected from Zero Day threats.

 

Advanced Email Security Solution with FortiMail 

Email is a critical tool for businesses. But it’s also a preferred delivery method for ransomware, phishing, and compromise attacks. According to the 2018 Verizon report, 49% of (non-POS) malware was installed via malicious email. Gartner asserts that "Advanced threats (such as ransomware and business email compromise) are easily the signature-based and reputation-based prevention mechanisms that a secure email gateway (SEG) has traditionally used.

FortiMail replaces incumbent secure email gateways with a product tailored for advanced threat defense. FortiMail email security shields users, and ultimately data, from a wide range of cyber threats. These include: ever growing volumes of unwanted spam, socially-engineered phishing and business email compromise, accelerating variants of ransomware and other malware, increasingly targeted attacks from adversaries of all kinds, and more. At the same time, FortiMail can be used to protect sensitive data of all types, reducing the risk of inadvertent loss and/or non-compliance with regulations like HIPAA, PCI, GDPR, and more.

Attend this technical training workshop and gain hands-on experience protecting your organization against phishing, spam, malware and advanced targeted attacks via email. 

 

Constructing a Secure SD-WAN Architecture 

As organisations transition to a digital business model, their network topologies are significantly impacted. The adoption of cloud services, the virtualisation of the traditional network, and an increasingly mobile workforce accessing applications in the cloud are accelerating advancements in wide area networking technologies. The traditional wide area network (WAN) is struggling to keep up because it relies on a static infrastructure of devices that simply can't accommodate shifting, and often temporary resource allocation and workloads.

Attend this technical training workshop to learn how software-defined networking (SDN) applies to software control of wide area networks in an enterprise environment. Gain hands-on experience through actual configuration of virtualized products supporting WAN aggregation, both directly configuring the FortiGates, as well as doing the configurations remotely through FortiManager.

 

Creating a Comprehensive Security Fabric 

Today's new world of networking requires a new approach to security. One that simply yet intelligently secures the entire infrastructure. One that delivers full visibility into every viable network segment and the devices and endpoints behind them. One that can seamlessly integrate with third-party solutions, enabling users to ubiquitously collect, share and correlate threat intelligence. The Fortinet Security Fabric represents the first-ever architectural security approach designed to dynamically adapt to today's evolving IT infrastructure. This multi-layered approach provides broad, integrated, and automated protection against sophisticated threats. 

Attend this technical training workshop and gain hands-on experience configuring a comprehensive security fabric including Fortinet products and Fortinet-Ready Partner products. 

 

Cybersecurity for Safe, Reliable, Secure Industrial Control Systems (ICS)

Connections between IT and Operational Technology (OT) systems are no longer air gapped introducing the potential for hackers to penetrate industrial control systems risking the safety and availability of critical infrastructure.  Security for OT requires visibility, control, and analytics to meet safety and availability requirements.

Convergence is blurring the lines between IT and OT creating an opportunity to improve the visibility, control and situational awareness necessary for critical systems.  Failure to take the wide range of security issues into account when converging these two very different networks and networking philosophies can result in catastrophic network failures that risk critical systems and the life and well-being of workers and communities.  The Fortinet Security Fabric represents the first-ever architectural security approach designed to dynamically adapt to the unique needs of legacy OT environments while enabling the move toward modernizing these critical systems. Leveraging the Purdue Model for the security layers needed in OT, the multi-layered approach provided by the Fortinet Security Fabric provides broad, integrated, and automated protection against sophisticated threats.

Attend this technical training workshop to gain hands-on experience on IT and OT visibility, controlling with network segmentation, and protect high-value assets using actionable intelligence.

 

Detecting Zero-Day Threats with FortiSandbox

With a dynamic attack surface due to the rise of IoT and cloud services, it's clear that no single technology will be able to stop every threat. To protect your enterprise against sophisticated threats, it is important to establish a comprehensive and cohesive security infrastructure that is broad enough to cover all attack vectors, powerful enough to run the latest security technologies, and automated to keep pace with fast-moving attacks.

Attend this hands-on technical training workshop to learn how to detect and analyze advanced threats with FortiSandbox.

 

Empowering Security Operations Leveraging FortiSOAR

FortiSOAR™ is a holistic and enterprise-built security orchestration and security automation workbench that empowers security operation teams. FortiSOAR™ increases a team’s effectiveness by increasing efficiency, allowing for response in near real time.

Attend this training to learn how FortiSOAR™ takes your security operation team to the next level by automating the incident response process and facilitating collaboration, behind a single console to power it all.

 

Fortifying the Enterprise Network (NGFW)

As security architects consider how to provide comprehensive threat protection for their enterprises, including intrusion prevention, web filtering, anti-malware and application control, they face a major complexity hurdle managing these point products with no integration and lack of visibility. On top of that, Gartner estimates that by 2019, 80% of enterprise traffic will be encrypted and 50% of attacks targeting enterprise will be hidden in encrypted traffic. FortiGate reduces complexity by integrating various point products into NGFW features with automated action and enhanced visibility into applications, users and network. FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance including encrypted cloud access.

Attend this technical training workshop and gain hands-on experience fortifying the enterprise network with Fortinet NGFW solution.

 

FortiGate Deployments in Cloud Environments

Session A:  Public Cloud, Session B:  Private Cloud

Title: Security, Visibility and Control of Public Cloud Infrastructure and Workloads

Organizations are increasingly deploying a variety of workloads across multiple clouds. In turn, business-critical data and services are increasingly scattered across this distributed infrastructure. Using the shared responsibility model as a guiding principle, enterprises rely on cloud providers to protect the network, storage, and computing layers, while enterprises own the security.  This drives a need for solutions that complement traditional physical appliance form factors which provide visibility and maintain consistent security policy as workloads, users and data migrate to more agile, elastic, and virtualized infrastructure.

Join this technical workshop and gain knowledge of virtual NGFWs and Application Gateways using actual hands-on-configuration exercises.

 

FortiClient Integrated Endpoint Protection

Endpoints are frequently the target of initial compromise or attacks. One recent study found that 30% of breaches involved malware being installed on endpoints. FortiClient strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, you can ensure endpoint compliance, mitigate risks, and reduce exposure. FortiClient proactively defends against advanced attacks. Its tight integration with the Security Fabric enables policy-based automation to contain threats and control outbreaks.

FortiClient is more than advanced endpoint protection. As an integrated agent, FortiClient contains three key modules: Fabric Agent for security Fabric connectivity, the endpoint security modules, and the secure remote access modules. Fabric Agent shares endpoint telemetry with the Security Fabric and delivers broad endpoint visibility, compliance control, and vulnerability management. It provides advanced endpoint protection with pattern-based anti-malware, behavior-based exploit protection, web-filtering, and an application firewall. FortiClient natively integrates with FortiSandbox to detect zero-day threats and custom malware. FortiClient also provides secure remote access with built-in VPN, single-sign-on, and two-factor authentication for added security.

Attend this technical training workshop to gain hands-on experience controlling endpoints using FortiClient EMS in mixed Windows & Linux environments and see first-hand how FortiClient EMS integrates with the Fortinet Security Fabric to protect your company’s critical assets.

 

Fortinet's Management & Analytics Solution - A key component to the Fabric

Digital transformation is happening actively across Industries, as a result it also introduces advanced cybersecurity threats. Traditional security architectures are proving futile, and many organizations struggle to protect themselves because they lack the skills and resources to combat these threats.  Fortinet provides a superior protection against these advanced threats with a Broad, Integrated and Automated approach with its Security Fabric.

A key component of the Fabric is Management and Analytics, that’s used for effective security management. 
This Fast Track covers FortiManager and FortiAnalyzer, part of the Management and Analytics solution.  In this Fast Track attendees will gain hands-on experience and see how the solution provides powerful automation-ready single pane of glass management and visibility, advanced compliance reporting, and network-aware rapid response.

 

Fortinet Teleworker Solution: Engineered for Remote and Secure Productivity

Organizations face a number of different potential emergency situations, such as illness, flood, hurricanes, and power outages. Implementing a business continuity plan is essential to ensuring that the organization is capable of maintaining operations in the face of adversity and preparing for potential disasters.

An important consideration for organizations developing a business continuity plan is that the organization may not be capable of sustaining normal operations onsite. The ability to support employees working remotely is essential to ensuring both business continuity and security. Fortinet solutions offer an integrated solution to support telework. FortiGate next-generation firewalls (NGFWs) have built-in support for IPsec virtual private networks (VPNs), enabling remote workers to connect securely to the company network. With endpoint protection, provided by FortiClient, and multi-factor authentication (MFA) with FortiAuthenticator, organizations can securely support remote work and maintain business continuity.

Attend this technical training workshop to understand how to:

  • Configure two-factor authentication necessary for secure access
  • Create an inbound VPN policy on FortiGate that allows teleworkers to tunnel back to corporate headquarters
  • Configure Fortinet Endpoint Management Server (EMS) to protect remote users as effectively as if they were located at the corporate office
  • Demonstrate successful operation of these critical functions

 

Powerful Security Information and Event Management with FortiSIEM

Cyberattacks are a 24/7 reality. The complexity and growth of the enterprise estate – Infrastructure, Applications, VM’s, Cloud, Endpoints and IoT means the attack surface grows exponentially. Coupled with a skills shortage, and resource constraints, security becomes everybody’s problem but visibility, event correlation and remediation are other people’s responsibility.  Effective security requires visibility – all the devices, all the infrastructure in realtime – but also with context – what devices represent a threat, what is their capability so you manage the threat the business faces, not the noise multiple security tools create.

FortiSIEM - Fortinet’s Multivendor Security Incident and Events Management solution brings it all together by integrating NOC-SOC Solutions to Automate IT Processes and Security Responses. Visibility, Correlation, Automated Response and Remediation in a single, scalable solution. Using a FortiSIEM, the complexity of managing network and security operations is reduced, freeing resources, improving breach detection. Worldwide 80% of breaches go undetected because of skills shortage and event information ‘noise’. FortiSIEM provides the cross correlation, applies machine learning and UEBA to improve response, to stop breaches before they occur.

Use this Hands-on technical training to familiarize yourself with the Powerful Security Information and Event Management capabilities of a FortiSIEM.

 

Proactive Advanced Endpoint Protection, Visibility & Control for Critical Assets

Fortinet strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, organizations can ensure endpoint compliance, mitigate risks, and reduce exposure.

Endpoints are frequently the target of initial compromise or attacks. One recent study found that 30% of breaches involved malware being installed on endpoints.  Fortinet endpoint solutions strengthen endpoint security through integrated visibility, control, and proactive defense.

FortiClient can discover, monitor, and assess endpoint risks, so you can ensure endpoint compliance, mitigate risks, and reduce exposure. Its tight integration with the Fortinet Security Fabric enables policy-based automation to contain threats and control outbreaks.  FortiClient also provides secure remote access with built-in VPN, single-sign-on, and two-factor authentication for added security.

FortiEDR delivers advanced, real-time threat protection for endpoints both pre- and post-infection. It proactively reduces the attack surface, prevents malware infection, detects and defuses potential threats in real time, and can automate response and remediation procedures with customizable playbooks.

Participants who attend this workshop will learn how to:

  • Integrate FortiClient EMS into the Security Fabric
  • Use the FortiClient anti-exploit feature to prevent attacks proactively
  • Configure FortiClient EMS to apply tags to endpoints that FortiGate can use to dynamically control access to subnets
  • Filter, sort and, view events in FortiEDR
  • Perform forensic analysis in FortiEDR

 

SD-Branch Securing your Network Access Infrastructure with FortiSwitch, FortiAP & FortiLink

Enterprise networking and security teams are struggling with evolving their WAN and branch office IT architecture to support digital transformation. A typical branch office consists of multiple point products creating both security and complexity challenges. IT teams are looking to consolidate these point products to increase agility and save money, while improving the security and visibility of network access at the branch office. Fortinet’s secure access architecture powered by FortiLink is uniquely suited to SD-Branch deployments with ethernet switch and wireless access point management built into the same platform that drives our Secure SD-WAN solution, the FortiGate and FortiOS.

Come learn how this common platform enables you to have all of the compelling features of Fortinet’s SD-WAN extended directly to branch network access through FortiSwitch, FortiAP and FortiLink, including global security policies enforced by an industry leading security platform in FortiGate.

This is complementary to our SD-WAN Fast Track training and can be taken separately or as a companion track.

Videos:

https://fortinet.wistia.com/medias/8qgusrn43l

https://fortinet.wistia.com/medias/18clxqbon2

 

Securely Embrace the IoT Revolution with FortiNAC

The proliferation of Internet of Things (IoT) devices, has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently untrustworthy, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses. 

Attend this technical training workshop to gain hands-on experience configuring FortiNAC to secure IoT devices within the Fortinet Security Fabric.

 

Security Operations - Threat Prevention and Detection with FortiDeceptor

FortiDeceptor allows organizations to rapidly create a fabricated deception network through the automatic deployment of deception VMs and decoys that seamlessly integrate with an existing infrastructure to lure attackers into revealing themselves. FortiDeceptor helps serve as an early warning system by providing accurate detection that correlates an attacker’s activity details and lateral movement that feeds up to a broader threat campaign. Threat intelligence gathered from the attacker can be applied automatically to inline security controls to stop attacks before any real damage is done.

Attend this hands-on technical training workshop to learn how FortiDeceptor’s deception-based technology is designed to deceive, expose and eliminate attacks originating from either external or internal sources before any real damage occurs.

 

Streamlining Automation Using Web Services APIs (FNDN)

As organizations transition to a digital business model, virtualization and cloud technologies play an increasing role.   Speed, Flexibility, Elasticity and Integration are all critical features that cannot be inhibited when implementing an effective security strategy.  Ultimately it doesn’t matter how fast you can deploy an appliance or VM if configuration is a manual process which requires a heavy administrative touch. 

Web Services APIs enable organizations to fully leverage the benefits of these dynamic architectures while offering an efficient communications method that promotes a robust and automated Security Fabric.  Understanding the structure, function and communication mechanisms of these APIs is critical for developing any custom interfaces.

Attend this technical training workshop to gain hands-on experience using Fortinet's extensive API libraries to automate configuration and policy deployment on FortiManager 6.0 and FortiGate 6.0.

 

Whats New in FortiOS? (version 6.4 Coming Soon)

More than a firewall operating system, FortiOS enables broad connectivity and awareness among security components, both within the network and from other disciplines, such as endpoint, management, and analytics.  FortiOS has been the heart of FortiGate next-generation firewalls for years now, serving thousands of customers in every industry across the globe.  There are a few clear themes that organize most of the FortiOS development.  Beyond its mission of enabling the Fortinet Security Fabric, FortiOS 6.2 makes significant gains in these areas:  Expanding the Security Fabric, Cloud and SDN, Automation and DevOps, and SaaS and SD-WAN.

Attend this technical training workshop and hands-on workshop to learn more about the key new features the FortiOS 6.2 has to offer.