Technology Manufacturers

Fortinet Certifications

Level / Link
Description
  • The FCF certification validates that you have mastered the technical knowledge and skills that are required for any entry-level job role in cybersecurity. This curriculum will offer courses that cover today’s threat landscape and the fundamentals of cybersecurity:

    • Introduction to cybersecurity overview

    • What is cybersecurity?

    • Principles of information security

    • The threat landscape overview

    • Threat actors

    • Threat intelligence

    • Attack frameworks

    • Social Engineering Overview

    • Social Engineering Techniques, Part A

    • Social Engineering Techniques, Part B

    • Insider threat

    • Fraud, scams and influence campaigns

    • Malware overview

    • Malware types

    • Malware attack vectors and methods

  • The FCA certification validates your ability to execute high-level operation of FortiGate devices. This curriculum will offer a course that covers the fundamental operating procedures for the most common FortiGate features.

    • Overview

    • Configuring interfaces and routing

    • Firewall policies

    • Authenticating network users

    • Inspect SSL traffic

    • Blocking malware

    • Control web access using web filtering

    • Configurin the FortiGate IPS

    • Controlling applications access

    • Creating IPsec VPNs

    • Configuring FortiGate SSL VPN

    • FortiGate system maintenance and monitoring

    • Configurint the Fortinet security fabric

Palo Alto Networks Certified Cybersecurity Entry-level Technician (PCCET)

The certification consists of 4 courses:

  1. Introduction to Cybersecurity (credential link):

    • Describe the current cybersecurity landscape.

    • Identify cybersecurity threats.

    • Evaluate different malware types and cyberattack techniques.

    • Describe the relationship between vulnerabilities and exploits.

    • Identify how spamming and phishing attacks are performed.

    • Describe Wi-Fi vulnerabilities, attacks, and advanced persistent threats.

    • Explain perimeter-based Zero Trust security models.

    • Identify capabilities of the Palo Alto Networks prevention-first architecture.

  2. Fundamentals of Network Security (credential link):

    • Describe basic operations of enterprise networks, common networking devices, routed and routing protocols, network types and topologies, and services such as DNS

    • Explain IP addressing, subnetting, and packet encapsulation based on the Open Systems Interconnection (OSI) model

    • Describe network security technologies such as packet filtering, stateful inspection, application firewalls, and IDS and IPS and web content filters

    • Explain how to explore endpoint and mobile device security using technology such as personal firewalls, host-based IPS, and management features

    • Describe how to properly secure enterprise networks through PAN-OS deployment templates and migration options and DNS, URL Filtering, Threat Prevention, and WildFire® subscription services

  3. Fundamentals of Cloud Security (credential link):

    • Describe cloud computing models, virtualization, hypervisors, public cloud service provider options, and private deployment options

    • Explain the development operations (DevOps) strategy that unites teams to discover and remediate issues, automate deployment, and reduce time to market

    • Describe the evolution of data centers through mixed traditional and cloud computing technologies

    • Detail how Secure Access Service Edge (SASE) solutions help organizations embrace the concepts of cloud and mobility

    • Describe how SaaS solutions provide data classification, sharing and permission visibility, and threat detection within the application

    • Describe how the Prisma Cloud security platform detects and prevents security risks

  4. Fundamentals of SOC (Security Operations Center) (credential link):

    • Coverage of the daily life of a SecOps analyst, the six elements of security operations, and how SOAR technology simplifies cybersecurity response and prevention.

    • Introducuction of endpoint protection with the Cortex XDR agent, which combines behavioral protection and AI-based analysis to stop advanced attacks.

    • Provides a high-level overview of Cortex XSOAR Threat Intelligence Management (TIM), a security solution for automating and streamlining threat intelligence processes, including native threat intelligence, data sources, incident enrichment, and threat intel reports.

    • Introduction of the products in the Palo Alto Networks Cortex platform: Cortex XSOAR, Cortex XDR, Cortex XSOAR TIM, and Cortex XSIAM.

Cisco Certified Support Technician (CCST) Cybersecurity

Last updated