Fortinet Attack & Defense Methodologies Fast Track Workshop

Part 1: Attack Methodologies

Protecting an organization requires understanding how it can be breached. In this fast track, participants will learn who the threat actors are and what tools and methodologies they use to breach an organization. Participants will also play the role of the threat actor and go through the anatomy of an attack, in order to see how easy it is to penetrate an organization.

In Part 1 of this workshop, participants will learn how to:

  • Identify threat actors and what motivates them.
  • Understand the anatomy of an attack, also known as a kill chain.
  • Identify the tools and techniques threat actors use to breach an organization.
  • Breach a fictitious organization through a hands-on demonstration.

Part 2: Defense Methodologies

Today’s new world of networking requires a new approach to security: one that simply, yet intelligently, secures the entire infrastructure; one that delivers full visibility into every viable network segment and the devices and endpoints behind them; one that can seamlessly integrate with third-party solutions, enabling users to ubiquitously collect, share, and correlate threat intelligence.

The Fortinet Security Fabric represents the first-ever architectural security approach designed to dynamically adapt to today’s evolving IT infrastructure. This multi-layered approach provides broad, integrated, and automated protection against sophisticated threats.

In Part 2 of this workshop, participants will learn how to:

  • Introduce the Security Fabric and Cybersecurity Framework.
  • Identify the attack surface.
  • Protect against known threats.
  • Detect unknown risks.
  • Respond rapidly to new threats.
  • Adapt via automated trust assessment.

9:00AM - 12:00PM ~ Part 1
12:00PM - 12:30PM ~ Lunch
12:30PM - 3:30PM ~ Part 2

We look forward to having you join us!

***A laptop is required for this lab.***

Disclaimer: Each registrant will be reviewed by Vandis to ensure they meet Vandis’ requirements for attendance and, if qualified, will receive an approval email after registration. Attendees acknowledge that their organizations may have compliance policies relating to their employees’ ability to accept items of value that may be available at an event, and it is the attendee’s responsibility to manage compliance with those business policies.