Companies Home Search Profile

Fortinet FortiSOAR From Zero To Hero

Focused View

Hatem Metwally

12:50:12

16 View
  • 001 Articles-mentioned-in-Introduction-Video.txt
  • 001 Introduction.mp4
    17:53
  • 002 Installation.mp4
    23:43
  • 003 GUI Demystified - part1.mp4
    51:22
  • 004 GUI Demystified - part2.mp4
    58:13
  • 005 Foundations and Architecture.mp4
    30:02
  • 005 Foundation-Architecture.pptx
  • 006 Ingesting FortiSIEM Incidents into FortiSOAR.mp4
    18:46
  • 007 Ingesting Microsoft Exchange Office365 messages into FortiSOAR.mp4
    15:06
  • 008 Installing and Configuring VirusTotal Connector.mp4
    03:08
  • 009 Dashboards, Templates and Widgets.mp4
    49:58
  • 010 Module Templates.mp4
    36:43
  • 011 Searches and Filters.mp4
    11:12
  • 012 Application Editor.mp4
    29:55
  • 001 Playbooks introduction & Trigger Steps.mp4
    34:11
  • 002 Playbooks Core steps.mp4
    18:07
  • 003 Playbooks Evaluate steps.mp4
    35:11
  • 004 Playbooks Execute steps and others.mp4
    14:43
  • 005 Designing Our First playbook - Reassign Analyst.mp4
    25:00
  • 006 Perform IP Enrichment for Newly Added IOC.mp4
    23:55
  • 007 Create Critical Alert for Bad IOC, Approve, and [Manually] Block on Firewall.mp4
    20:27
  • 008 Create Critical Alert for Bad IOC, Approve, and [Auto] Blocking on Firewall.mp4
    27:35
  • 009 Generalize IOC LookupAuto-Block Playbook for Bad IP and URL.mp4
    24:40
  • 010 Lookup 2xCTIs & Manipulate IBM XForce Results using Code Snippet Step.mp4
    48:00
  • 011 Increasing the Resiliency of IP Enrichment.mp4
    42:10
  • 012 Automate IOC Extraction From CTI Advisories.mp4
    28:44
  • 012 File-Content-Extractor-connector-requirements.txt
  • 012 fce-1.zip
  • 012 fce-2.zip
  • 013 Playbooks Nesting and Parameters Passing.mp4
    20:30
  • 014 Passing-parameters-results-between-PBs.txt
  • 014 Playbooks Nesting and Parameters Passing - Part2 (Hands-On).mp4
    46:29
  • external-links.txt
  • 001 CLI and Troubleshooting.mp4
    09:25
  • 002 Avoid Playbooks Running Forever Condition.mp4
    05:04
  • Description


    Learn state-of-the-art Security Product that must have in any SOC arsenal

    What You'll Learn?


    • Security Orchestration, Automation and Response (SOAR)
    • FortiSOAR
    • Use Cases
    • Hands-ON
    • SOAR
    • Playbooks
    • Incident Response
    • Cyber Threat Intelligence

    Who is this for?


  • Network Security Specialists & Administrators
  • SOC Operators & Analysts
  • Information Security Sepcialists
  • What You Need to Know?


  • Intermediate Unix/Linux Skills
  • Intermediate Network Security Concepts
  • More details


    Description

    FortiSOAR is a holistic Security Orchestration, Automation and Response (SOAR) workbench, designed for SOC teams to efficiently respond to the ever-increasing influx of alerts, repetitive manual processes, and shortage of resources. It pulls together all of organization's tools, helps unify operations and reduces alert fatigue, context switching, and the mean time to respond to incidents.


    FortiSOAR is extremely a flexible product with many important and usefull features, which along with outstanding customer support brings SOC environment to next level.


    FortiSOAR provides the ability to customize GUI and affect SOC working environment effectively. "Less clicks is better!" Robastic Integration with 3rd party tools - many API based connectors with example playbooks which can be easily adopted for company needs. Customer Support - great attitude, professionality, very customer oriented.


    Through baby steps you will learn Fortinet FortiSOAR important topics that include but not limited to the following:


    Part I - FortiSOAR Basics

    ==================

    Lecture 1: Introduction

    Lecture 2: Installation

    Lecture 3: GUI Demystified - part1

    Lecture 4: GUI Demystified - part2

    Lecture 5: Foundations and Architecture

    Lecture 6: Ingesting FortiSIEM Incidents into FortiSOAR

    Lecture 7: Ingesting Microsoft Exchange Office365 messages into FortiSOAR

    Lecture 8: Installing and Configuring VirusTotal Connector

    Lecture 9: Dashboards, Templates and Widgets

    Lecture 10: Module Templates

    Lecture 11: Searches and Filters

    Lecture 12: Application Editor


    Part II - Playbooks

    =============

    Lecture 13: Playbooks introduction & Trigger Steps

    Lecture 14: Playbooks Core steps

    Lecture 15: Playbooks Evaluate steps

    Lecture 16: Playbooks Execute steps and others

    Lecture 17: Designing Our First playbook - Reassign Analyst

    Lecture 18: Perform IP Enrichment for Newly Added IOC

    Lecture 19: Create Critical Alert for Bad IOC, Approve, and [Manually] Block on Firewall

    Lecture 20: Create Critical Alert for Bad IOC, Approve, and [Auto] Blocking on Firewall

    Lecture 21: Generalize IOC Lookup/Auto-Block Playbook for Bad IP and URL

    Lecture 22: Perform IP Enrichment from 2 CTIs & Manipulate IBM XForce Results using Code Snippet Step

    Lecture 23: Increasing the Resiliency of IP Enrichment

    Lecture 24: Automate IOC Extraction From CTI Advisories

    Lecture 25: Playbooks Nesting and Parameters Passing

    Lecture 26: Playbooks Nesting and Parameters Passing - Part2 (Hands-On)


    Appendix

    =======

    Lecture 27: CLI and Troubleshooting

    Lecture 28: Avoid Playbooks Running Forever Condition



    Enroll and gain a new competitive skill that is booming and highly demaded nowadays in the Information Security domain.


    Who this course is for:

    • Network Security Specialists & Administrators
    • SOC Operators & Analysts
    • Information Security Sepcialists

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Hatem Metwally
    Hatem Metwally
    Instructor's Courses
    MBA - Business Analytics, CISSP, CISM, SIEM Specialist, and 13+ years of experience into Network and Information Security.+++++++ +++++++ +++++++ EDUCATION +++++++ +++++++ +++++++ QATAR UNIVERSITY, MBA - BUSINESS ANALYTICSThe MBA program in Qatar University is AACSB accredited which ensures that business schools meet the highest standards of excellence in teaching, research, curriculum, and learner success. Started the program in Fall 2019 and graduated in Spring 2022 with GPA of 3.95 and concentrated in Business Analytics by electing courses in Business Analytics and Data Mining beside core courses in Corporate Finance, Operations Management, Managerial Accounting and Managerial Economics.AIN SHAMS UNIVERSITY, BSC. IN COMPUTRS AND SYSTEMS ENGINEERINGFrom 1998 ~ 2003 – Grade: Distinguished with Honor
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 28
    • duration 12:50:12
    • English subtitles has
    • Release Date 2024/01/04