top of page
top

FortiSOAR

FT-FSR-ADM

FortiSOAR

Fortinet logo-new.jpg

Price
Duration

Please call

2 Days

network-security-specialist.jpg

PDF.jpg
PDF Outline

Who Should Attend

This course is intended for cybersecurity professionals responsible for planning, deploying, configuring,

and managing FortiSOAR deployments in a SOC environment.

What you will learn

Course Content

In this course, you will learn about FortiSOAR architecture, and how to deploy, configure, manage, operate, and monitor FortiSOAR in a SOC environment.

You will learn about various system customization options, HA deployment, security management using role-based access control (RBAC), and various system monitoring tools.

Prerequisites

You must understand the topics covered in the following course, or have equivalent experience:
• You must have an understanding of the topics covered in FCP - FortiGate Security or have equivalent experience.

• Familiarity with SOC technologies and processes is recommended.

Prerequisits

Course Objectives

Objectives

After completing this course, you should be able to:
• Identify challenges of security teams, and assist security teams with SOAR best practices
• Identify the role of SOAR in assisting security teams
• Describe the basics of SOAR technology
• Manage licenses
• Deploy and manage a FortiSOAR VM
• Configure teams, roles, and users
• Configure authentication
• Schedule the purging of audit logs and executed playbook logs
• Configure playbook recovery
• Configure environment variables
• Configure company branding

• Configure system fixtures
• Configure the recycle bin
• Monitor and manage audit logs
• Use the configuration manager
• Monitor system resources
• Deploy, configure, manage, and troubleshoot a FortiSOAR high availability cluster
• Identify the types of logs used for troubleshooting
• Collect log files used for troubleshooting
• Troubleshoot key services and processes on FortiSOAR

Outlines

Course Outline

PDF.jpg

• Introduction to FortiSOAR
• Device Management
• System Configuration

• High Availability
• Searching, War Rooms, and Upgrading
• System Monitoring and Troubleshooting

Further information
If you would like to know more about this course please contact us

Schedule
Fortinet logo-new.jpg
Fortinet logo-new.jpg
Fortinet logo-new.jpg
Fortinet logo-new.jpg
For dates in South Africa and Africa region 
reg1
reg

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT

Thanks for registering. our team will contact you soon !

Registration

ILT/VILT
bottom of page