Technology Manufacturers
Fortinet Certifications
The FCF certification validates that you have mastered the technical knowledge and skills that are required for any entry-level job role in cybersecurity. This curriculum will offer courses that cover today’s threat landscape and the fundamentals of cybersecurity:
Introduction to cybersecurity overview
What is cybersecurity?
Principles of information security
The threat landscape overview
Threat actors
Threat intelligence
Attack frameworks
Social Engineering Overview
Social Engineering Techniques, Part A
Social Engineering Techniques, Part B
Insider threat
Fraud, scams and influence campaigns
Malware overview
Malware types
Malware attack vectors and methods
The FCA certification validates your ability to execute high-level operation of FortiGate devices. This curriculum will offer a course that covers the fundamental operating procedures for the most common FortiGate features.
Overview
Configuring interfaces and routing
Firewall policies
Authenticating network users
Inspect SSL traffic
Blocking malware
Control web access using web filtering
Configurin the FortiGate IPS
Controlling applications access
Creating IPsec VPNs
Configuring FortiGate SSL VPN
FortiGate system maintenance and monitoring
Configurint the Fortinet security fabric
Palo Alto Networks Certified Cybersecurity Entry-level Technician (PCCET)
The certification consists of 4 courses:
Introduction to Cybersecurity (credential link):
Describe the current cybersecurity landscape.
Identify cybersecurity threats.
Evaluate different malware types and cyberattack techniques.
Describe the relationship between vulnerabilities and exploits.
Identify how spamming and phishing attacks are performed.
Describe Wi-Fi vulnerabilities, attacks, and advanced persistent threats.
Explain perimeter-based Zero Trust security models.
Identify capabilities of the Palo Alto Networks prevention-first architecture.
Fundamentals of Network Security (credential link):
Describe basic operations of enterprise networks, common networking devices, routed and routing protocols, network types and topologies, and services such as DNS
Explain IP addressing, subnetting, and packet encapsulation based on the Open Systems Interconnection (OSI) model
Describe network security technologies such as packet filtering, stateful inspection, application firewalls, and IDS and IPS and web content filters
Explain how to explore endpoint and mobile device security using technology such as personal firewalls, host-based IPS, and management features
Describe how to properly secure enterprise networks through PAN-OS deployment templates and migration options and DNS, URL Filtering, Threat Prevention, and WildFire® subscription services
Fundamentals of Cloud Security (credential link):
Describe cloud computing models, virtualization, hypervisors, public cloud service provider options, and private deployment options
Explain the development operations (DevOps) strategy that unites teams to discover and remediate issues, automate deployment, and reduce time to market
Describe the evolution of data centers through mixed traditional and cloud computing technologies
Detail how Secure Access Service Edge (SASE) solutions help organizations embrace the concepts of cloud and mobility
Describe how SaaS solutions provide data classification, sharing and permission visibility, and threat detection within the application
Describe how the Prisma Cloud security platform detects and prevents security risks
Fundamentals of SOC (Security Operations Center) (credential link):
Coverage of the daily life of a SecOps analyst, the six elements of security operations, and how SOAR technology simplifies cybersecurity response and prevention.
Introducuction of endpoint protection with the Cortex XDR agent, which combines behavioral protection and AI-based analysis to stop advanced attacks.
Provides a high-level overview of Cortex XSOAR Threat Intelligence Management (TIM), a security solution for automating and streamlining threat intelligence processes, including native threat intelligence, data sources, incident enrichment, and threat intel reports.
Introduction of the products in the Palo Alto Networks Cortex platform: Cortex XSOAR, Cortex XDR, Cortex XSOAR TIM, and Cortex XSIAM.
Cisco Certified Support Technician (CCST) Cybersecurity
Last updated