You are on page 1of 140

Fortinet (Network Security Expert

Professional) course Enrolment


Process
STEP - 1
1. Students need to visit https://training.fortinet.com/auth/saml2/selectidp.php
2. Now click on the Public option
STEP - 2
1. Now click on the Sign up button

Click Here
STEP - 3
Fill in the details requested like –
1. Email address
2. Password
3. First Name and Last Name
4. Company name – See that you enter your college
name in this field
5. Select Country as India
6. Solve the Captcha and click on the Submit button.

Click Here
STEP-4
1. Now click on “Continue”.

Click here
SSTEP-5

1.You will receive a mail to active your account.


2. Click on the link .

Click here
STEP-6

Now Click on “Courses”.

Click here
STEP – 7
Click on “Dashboard”.

Click Here
1. Click on “FCF”.
2. Click on Introduction to the Threat Landscape “6self-paced activities”.

Click Here

Click Here
1. Getting Started in Cybersecurity(17 self-paced activities) OR Technical Introduction Cybersecurity(9 self-paced activities)
2. Need to complete any one of the courses mentioned above.

Click Here

Click Here
Course Description
Introduction to the Threat Landscape – FCF
Introduction to the Threat Landscape
In this course, you will learn about the cyberthreat landscape. This landscape includes the threats that endanger
computer networks, the cast of bad actors who are behind these threats, and the cybersecurity first principles that, if
followed, can keep you and your computer network safe. This course is designed as an entry point for individuals who are
new to cybersecurity..
Course Objectives
After completing this course, you will be able to:
•Describe cybersecurity and the principles of information security
•Identify the types of bad actors, their methods, and countermeasures used against them
•List different social engineering techniques
•Describe malware types and their delivery methods

System Requirements
To take this course, you must use a computer that has the following:
•A high-speed Internet connection
•An up-to-date web browser
•A PDF viewer
•Speakers or headphones
•One of the following:
• HTML 5 support
• An up-to-date Java Runtime Environment (JRE) with Java plugin enabled in your web browser
You should use a wired Ethernet connection, not a WiFi connection. Firewalls, including Windows Firewall or FortiClient,
must allow connections to the online labs.
To start the FCF – Introduction to the Threat Landscape, Scroll Down.
Click on Lesson 01 Introduction to Cybersecurity Overview

Click Here
1.Need to complete the session.
2. Click on “next”.
Click on Lesson 02 What is Cybersecurity?

Click Here
1. Need to complete the session.
2. Click on “next”.
. Need to choose correct option and click on submit.
Click on Lesson 03 Principles of Information Security

Click Here
1. Need to complete the session.
2. Click on “next”.
. Need to choose the correct option and click on submit.
Click on Lesson 01 The Threat Landscape Overview

Click Here
1. Need to complete the session.
2. Click on “next”.
Click on Lesson 02 Threat Actors

Click Here
1. Need to complete the session.
2. Click on “next”.
Click on Lesson 03 Cybersecurity Threats

Click here
1. Need to complete the session.
2. Click on “next”.
Click on Lesson 04 Threat Intelligence
1. Need to complete the session.
2. Click on “next”.
Click on Lesson 05 Attack Frameworks

Click Here
1. Need to complete the session.
2. Click on “next”.
. Need to choose the correct option and click on submit.
Click on Lesson 01 Social Engineering Overview

Click Here
1. Need to complete the session.
2. Click on “next”.
Click on Lesson 02 Social Engineering Techniques, Part A

Click Here
1. Need to complete the session.
2. Click on “next”.
Click on Lesson 03 Social Engineering Techniques, Part B

Click Here
1. Need to complete the session.
2. Click on “next”.
Click on Lesson 4 Insider Threat

Click Here
1. Need to complete the session.
2. Click on “next”.
Click on Lesson 5 -Fraud, Scams and Influence Campaigns

Click Here
1. Need to complete the session.
2. Click on “next”.
Need to choose the correct option and click on submit.
Click on Lesson 1- Malaware Overview

Click Here
1. Need to complete the session.
2. Click on “next”.
Click on Lesson 2- Malaware Types

Click Here
1. Need to complete the session.
2. Click on “next”.
Click on Lesson 3- Malaware Attacks Vectors and Methods

Click Here
1. Need to complete the session.
2. Click on “next”.
1. Getting Started in Cybersecurity(17 self-paced activities) OR Technical Introduction Cybersecurity(9 self-paced activities)
2. Need to complete any one of the courses mentioned above.

Click Here

Click Here
To start the FCF –, Getting Started in Cybersecurity , Scroll Down
Click on Lesson 01- Firewalls

Click Here
1. Need to complete the session.
2. Click on “next”.
Need to choose the correct option and click on submit
Click On Lesson 2- Network Access Control

Click Here
1. Need to complete the session.
2. Click on “next”.
Need to choose the correct option and click on submit
Click On Lesson 3- Sandbox

Click Here
1. Need to complete the session.
2. Click on “next”.
Need to choose the correct option and click on submit
Click on Lesson 4- WAF
1. Need to complete the session.
2. Click on “next”.
Need to choose the correct option and click on submit
Click on Lesson 5- Security Email Gateway

Click Here
1. Need to complete the session.
2. Click on “next”.

Contd…
You Have to Complete all 16 modules , After completing all
modules you will get your Certificate
To start the FCF –, Technical Introduction to Cybersecurity, Scroll Down
Click On Lesson 1 – Cryptography and the Public Key Infrastructure
Overview
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 2 – Cliphers

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 3 – Keys and Cryptographic Algorithms

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 4– Hashing and Digital Signatures

Click here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 5– Public Key Infrastructure

Click here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 1- Secure Networks Overview

Click here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 2- Secure Perimeter

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 3- Zero Trust Principles

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 4- Centralized Security Network Management.

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 5- Secure SD-WAN

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 6- SASE

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 7- Network Segmentation

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 8- Firewalls

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 9- Secure Switching and Ports

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 10- Security Protocols

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 11- Sandbox

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 12- Common Networks Threats and Prevention.

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 1- Authentication and access Control

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 2- Authentication Methods

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 3- Single Sign-On

Click Here
1. Need to complete the session.
2. Click on “next”.
You Have to Complete all 7 modules , After completing all
modules you will get your Certificate
1. After Completing all Modules Go to the Achievements.
2. Then download your certificate.

Click Here

Click Here
2nd Certificate Course

FCA – FortiGate Operator


1. Click on “FCA”.
2. Click on FortiGate Operator “3 self-paced activities”.
To start the FCA –,FortiGate 7.4 Operator Self –Paced , Scroll Down
Click On Lesson 1- Overview

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 2- Configuring Interfaces and Routing

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 3- Firewall Policies

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 4- Authenticating Networks Users

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 5- Inspect SSL Traffic

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 6- Blocking Malaware

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 7- Control Web Access using Web Filtering

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 8- Configuring and FortiGate Intrusion Prevention System.

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 9- Controlling Applications Access

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 10- Creating IPsec Virtual Private Networks

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 11- Configuring FortiGates SSL VPN

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 12- FortiGate System Maintenance and Monitoring

Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 13- Configuring the Fortinet Security System

Click Here
1. Need to complete the session.
2. Click on “next”.
After Completing all Modules you will get your 2nd certificate…

You might also like