undefined

Fortinet Certified Fundamentals in Cybersecurity (FCF in Cybersecurity)

This course is ideal for individuals in technical roles that require a more in-depth understanding of the fundamentals of cybersecurity.

Fortinet Certified Fundamentals in Cybersecurity (FCF in Cybersecurity)

Course Outline
Elective Courses:
Technical Introduction to Cybersecurity

This foundational course provides an introduction to the world of cybersecurity, designed for individuals new to the eld. Whether you're aiming for a career in IT, technolo gy management, or cybersecurity, this course serves as the ideal starting point. You will explore key cybersecurity concepts and technologies, building a solid foundation for further study in more advanced topics related to cybersecurity careers. By the end of this course, you'll be equipped with the basic knowledge to pursue professional certi cations and deeper learning in cybersecurity.

Syllabus Summary

Course Syllabus

1.Cryptography and PKI

2.Secure Network

3.Authentication and Access Control

4.Secure Remote Access

5.Endpoint Security

6.Secure Data and Applications

7.Cloud Security and Virtualization

Objectives

Cybersecurity Terminology and Concepts:

  • Understanding key terms like threats, vulnerabilities, risks, and exploits.
  • The role of rewalls, intrusion detection/prevention systems (IDS/IPS), and encryption.
  • Concepts such as authentication, authorization, and auditing (AAA), as well as access control models like DAC, MAC, and RBAC.

Securing a Network with Cryptography and Endpoint Security:

  • Use of encryption to protect data in transit and at rest.
  • Secure protocols like TLS/SSL, IPsec, and HTTPS for secure communication.
  • Endpoint security through antivirus software, rewalls, and intrusion detection tools.
  • Implementation of VPNs to secure remote access.

Ways to Secure Endpoints Using Authentication and Host Hardening:

  • Multi-factor authentication (MFA) for robust user veri cation.
  • Enforcing strong password policies.
  • Application of host-based rewalls and antivirus software.
  • Regular patch management and updates to protect against vulnerabilities.
  • Disabling unnecessary services and applications on endpoints to reduce attack surfaces.

Enhancing Cybersecurity with Secure Network Models and Technologies (SD-WAN and SASE):

  • SD-WAN (Software-De ned Wide Area Networking) for optimized, secure connectivity across distributed locations.
  • SASE (Secure Access Service Edge) to combine networking and security into a uni ed, cloud-delivered model for secure access.
  • Using SD-WAN and SASE to enhance visibility, improve performance, and simplify network management while securing tra c and user access.

Securing On-premises, Virtual, and Cloud Networks and Endpoints:

  • On-premises: Using physical rewalls, access control policies, and network egmentation to protect internal systems.
  • Virtual: Securing virtual networks with hypervisor security, segmentation, and virtual firewalls.
  • Cloud: Implementing cloud security best practices, such as identity and access management (IAM), encryption, and compliance controls to secure cloud-based infrastructure and endpoints.

Target Audience

  • Recommended for individuals interested in the technical aspects of cybersecurity.
  • Ideal for those pursuing a career in IT or network security.
  • Not suited for professionals in sales or other non-technical roles.

Prerequisites

  • Complete the FCF - Introduction to the Threat Landscape before starting this course.
  • If you are unfamiliar with basic computer networking, it is recommended to take the Networking Fundamentals course before starting this course.

Related Courses

experts-banner-background

EMIGO Expert Training Team

new-batch-mage

New Batches Commence On

Testimonials

enquiry-section1-bg
enquiry-form-model1

Learn like a Leader
Not a follower

Scan or Click on the QR Code to submit your enquiry

Enquiry
enquiry-section1-qrcode
footer-enquiry footer-enquiry