Professional Documents
Culture Documents
Click Here
STEP - 3
Fill in the details requested like –
1. Email address
2. Password
3. First Name and Last Name
4. Company name – See that you enter your college
name in this field
5. Select Country as India
6. Solve the Captcha and click on the Submit button.
Click Here
STEP-4
1. Now click on “Continue”.
Click here
SSTEP-5
Click here
STEP-6
Click here
STEP – 7
Click on “Dashboard”.
Click Here
1. Click on “FCF”.
2. Click on Introduction to the Threat Landscape “6self-paced activities”.
Click Here
Click Here
1. Getting Started in Cybersecurity(17 self-paced activities) OR Technical Introduction Cybersecurity(9 self-paced activities)
2. Need to complete any one of the courses mentioned above.
Click Here
Click Here
Course Description
Introduction to the Threat Landscape – FCF
Introduction to the Threat Landscape
In this course, you will learn about the cyberthreat landscape. This landscape includes the threats that endanger
computer networks, the cast of bad actors who are behind these threats, and the cybersecurity first principles that, if
followed, can keep you and your computer network safe. This course is designed as an entry point for individuals who are
new to cybersecurity..
Course Objectives
After completing this course, you will be able to:
•Describe cybersecurity and the principles of information security
•Identify the types of bad actors, their methods, and countermeasures used against them
•List different social engineering techniques
•Describe malware types and their delivery methods
System Requirements
To take this course, you must use a computer that has the following:
•A high-speed Internet connection
•An up-to-date web browser
•A PDF viewer
•Speakers or headphones
•One of the following:
• HTML 5 support
• An up-to-date Java Runtime Environment (JRE) with Java plugin enabled in your web browser
You should use a wired Ethernet connection, not a WiFi connection. Firewalls, including Windows Firewall or FortiClient,
must allow connections to the online labs.
To start the FCF – Introduction to the Threat Landscape, Scroll Down.
Click on Lesson 01 Introduction to Cybersecurity Overview
Click Here
1.Need to complete the session.
2. Click on “next”.
Click on Lesson 02 What is Cybersecurity?
Click Here
1. Need to complete the session.
2. Click on “next”.
. Need to choose correct option and click on submit.
Click on Lesson 03 Principles of Information Security
Click Here
1. Need to complete the session.
2. Click on “next”.
. Need to choose the correct option and click on submit.
Click on Lesson 01 The Threat Landscape Overview
Click Here
1. Need to complete the session.
2. Click on “next”.
Click on Lesson 02 Threat Actors
Click Here
1. Need to complete the session.
2. Click on “next”.
Click on Lesson 03 Cybersecurity Threats
Click here
1. Need to complete the session.
2. Click on “next”.
Click on Lesson 04 Threat Intelligence
1. Need to complete the session.
2. Click on “next”.
Click on Lesson 05 Attack Frameworks
Click Here
1. Need to complete the session.
2. Click on “next”.
. Need to choose the correct option and click on submit.
Click on Lesson 01 Social Engineering Overview
Click Here
1. Need to complete the session.
2. Click on “next”.
Click on Lesson 02 Social Engineering Techniques, Part A
Click Here
1. Need to complete the session.
2. Click on “next”.
Click on Lesson 03 Social Engineering Techniques, Part B
Click Here
1. Need to complete the session.
2. Click on “next”.
Click on Lesson 4 Insider Threat
Click Here
1. Need to complete the session.
2. Click on “next”.
Click on Lesson 5 -Fraud, Scams and Influence Campaigns
Click Here
1. Need to complete the session.
2. Click on “next”.
Need to choose the correct option and click on submit.
Click on Lesson 1- Malaware Overview
Click Here
1. Need to complete the session.
2. Click on “next”.
Click on Lesson 2- Malaware Types
Click Here
1. Need to complete the session.
2. Click on “next”.
Click on Lesson 3- Malaware Attacks Vectors and Methods
Click Here
1. Need to complete the session.
2. Click on “next”.
1. Getting Started in Cybersecurity(17 self-paced activities) OR Technical Introduction Cybersecurity(9 self-paced activities)
2. Need to complete any one of the courses mentioned above.
Click Here
Click Here
To start the FCF –, Getting Started in Cybersecurity , Scroll Down
Click on Lesson 01- Firewalls
Click Here
1. Need to complete the session.
2. Click on “next”.
Need to choose the correct option and click on submit
Click On Lesson 2- Network Access Control
Click Here
1. Need to complete the session.
2. Click on “next”.
Need to choose the correct option and click on submit
Click On Lesson 3- Sandbox
Click Here
1. Need to complete the session.
2. Click on “next”.
Need to choose the correct option and click on submit
Click on Lesson 4- WAF
1. Need to complete the session.
2. Click on “next”.
Need to choose the correct option and click on submit
Click on Lesson 5- Security Email Gateway
Click Here
1. Need to complete the session.
2. Click on “next”.
Contd…
You Have to Complete all 16 modules , After completing all
modules you will get your Certificate
To start the FCF –, Technical Introduction to Cybersecurity, Scroll Down
Click On Lesson 1 – Cryptography and the Public Key Infrastructure
Overview
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 2 – Cliphers
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 3 – Keys and Cryptographic Algorithms
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 4– Hashing and Digital Signatures
Click here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 5– Public Key Infrastructure
Click here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 1- Secure Networks Overview
Click here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 2- Secure Perimeter
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 3- Zero Trust Principles
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 4- Centralized Security Network Management.
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 5- Secure SD-WAN
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 6- SASE
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 7- Network Segmentation
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 8- Firewalls
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 9- Secure Switching and Ports
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 10- Security Protocols
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 11- Sandbox
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 12- Common Networks Threats and Prevention.
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 1- Authentication and access Control
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 2- Authentication Methods
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 3- Single Sign-On
Click Here
1. Need to complete the session.
2. Click on “next”.
You Have to Complete all 7 modules , After completing all
modules you will get your Certificate
1. After Completing all Modules Go to the Achievements.
2. Then download your certificate.
Click Here
Click Here
2nd Certificate Course
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 2- Configuring Interfaces and Routing
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 3- Firewall Policies
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 4- Authenticating Networks Users
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 5- Inspect SSL Traffic
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 6- Blocking Malaware
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 7- Control Web Access using Web Filtering
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 8- Configuring and FortiGate Intrusion Prevention System.
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 9- Controlling Applications Access
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 10- Creating IPsec Virtual Private Networks
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 11- Configuring FortiGates SSL VPN
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 12- FortiGate System Maintenance and Monitoring
Click Here
1. Need to complete the session.
2. Click on “next”.
Click On Lesson 13- Configuring the Fortinet Security System
Click Here
1. Need to complete the session.
2. Click on “next”.
After Completing all Modules you will get your 2nd certificate…