DDoS Protection – FortiDDoS

DDoS Protection - FortiDDoS :: Insoft Services
DDoS Protection – FortiDDoS
  • DDoS Protection – FortiDDoS

    1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
    Loading...

    1 dager

    Fortinet Technical Training

    Kursplan

     Aug 23, 2017
    Oslo

    Nov 17, 2017
    Oslo

    Course Details

    In this 1-day class, you will learn how to form network baseline data, and how to recognize and mitigate individual and distributed denial of service (DDoS) attacks while preserving service and network performance.

    In interactive labs, you will deploy FortiDDoS to learn about normal network traffic patterns. Then you will simulate attacks, observe the defense, and adjust the automatically estimated behavior.

    With a focus on core feature skills, topics also include network behavior analysis and ASIC chips.

    Associated Certification:

    This prepares you for the FortiDDoS Specialist Exam. This course qualifies as a specialist course for the NSE 6 designation.

    After completing these courses, you will be able to:

    • Train your FortiDDoS to recognize your unique network patterns.
    • Choose the right FortiDDoS model.
    • Distinguish a DDoS from a rush of Reddit traffic on a successful Thursday marketing campaign.
    • Defend against both volumetric and mechanistic DDoS attacks.
    • Mitigate SYN floods.
    • Handle attacks from dynamic or TOR-masked IPs by FortiGuard IP reputation and aging data.
    • Detect connections from proxies.
    • Inspect HTTP traffic on non-standard ports.
    • Deploy to protect both network appliances and servers.
    • Describe how the blocking periods and penalty factors intelligently determine which packets will be dropped after an attack has been detected.
    • Implement bypass or high availability FortiDDoS cluster for maximum service uptime.
    • Understand when to use Detection vs. Prevention mode.
    • Create “Do Not Track” policies.
    • Troubleshoot incorrect thresholds.
    • Whitelist “safe” clients and servers.
    • Characterize different types of attacks by using logs and statistics graphs.
    • Module 1 – Introduction and Deployment
    • Module 2 – Initial Configuration
    • Module 3 – Monitoring and Reporting
    • Module 4 – Global Settings
    • Module 5 – Service Protection Profiles
    • Anyone who is responsible for deployment and day-to-day management of a FortiDDoS appliance.
    • Knowledge of TCP, UDP, ICMP and HTTP protocols
    • Knowledge of network security