skip to Main Content

Advanced Analytics

In this course, you will learn how to use FortiSIEM in a multi-tenant environment. You will learn about rules and their architecture, how incidents are generated, how baseline calculations are performed, the different methods of remediation available, and how the nested queries and lookup tables work for advanced analytics using FortiSIEM. You will also learn how to integrate FortiSOAR with FortiSIEM.

1. Introduction to Multi-Tenancy
2. Defining FortiSIEM Collectors and FortiSOAR Connectors
3. Operating Collectors
4. Windows and Linux Agents
5. Rules
6. Single Subpattern Security Rules
7. Multiple Subpattern Rules
8. Baselines
9. Baseline Rules
10. FortiSIEM UEBA
11. Nested Queries and Lookup Tables
12. Clear Conditions
13. Remediation

After completing this course, you should be able to:

  • Identify various implementation requirements for a multi-tenant FortiSIEM deployment
  • Deploy FortiSIEM in a hybrid environment with and without collectors
  • Design multi-tenant solutions with FortiSIEM
  • Deploy collectors in a multi-tenant environment
  • Manage EPS assignment and restrictions on FortiSIEM
  • Manage resource utilization of a multi-tenant FortiSIEM cluster
  • Maintain and troubleshoot a collector installation
  • Deploy and manage Windows and Linux agents
  • Create rules by evaluating security events
  • Define actions for a single pattern security rule
  • Identify multiple pattern security rules and define conditions and actions for them Differentiatebetweenastandardandbaselinereport
  • Create your own baseline profiles
  • Deploy FortiSIEM UEBA agents
  • Examine log-based UEBA rules
  • Examine nested queries for advanced analytics
  • Configure lookup tables for advanced analytics
Security professionals involved in the management, configuration, administration, and monitoring of FortiSIEM and FortiSOAR devices in an enterprise or service provider deployment that are used to monitor and secure the networks of customer organizations should attend this course.

You must have an understanding of the topics covered in the following courses, or have equivalent experience:

  • FCP-FortiGate Security
  • FCP-FortiGate Infrastructure
  • FCP-FortiSIEM

It is also recommended that you have an understanding of the following topics, or have equivalent experience:

  • Python programming
  • Jinja2 templating language for Python
  • Linux systems
  • SOAR technologies
  • Analyze some out-of-the-box remediation scripts
  • Configure various remediation methods on FortiSIEM
  • Integrate FortiSOAR with FortiSIEM
  • Remediate incidents from FortiSOAR

    Contact us for more information!

    ARE YOU READY?

    If you need this course, you can fill out the form or contact us.

      Contact us for more information!

      Back To Top