Detailed Course Outline
- Attack Methodologies and the ATP Framework
- FortiSandbox Key Components
- High Availability, Maintenance and Troubleshooting
- Protecting the Edge
- Protecting Email Networks
- Protecting Web Applications
- Protecting End Users
- Protecting Third-Party Appliances
- Results Analysis