Pre-Conference Workshops (NSE 4 to 7)

Extend your stay in Orlando and attend one of 12 Pre-Conference Workshops being offered this year at Accelerate. The on-site NSE Institute will offer Pre-Conference Workshops from the extensive catalogue of the official NSE training program. If you have been thinking about pursuing NSE certification or taking your certification to the next level, this is a great opportunity to do it at a great price. The most popular courses will be offered, ranging from NSE 4 to NSE 7 training. And as an Accelerate 2019 attendee, you will receive a free exam voucher to be used at the on-site testing center.

Whether you attend a Pre-Conference Workshop or not, be sure to visit the NSE Institute in the Swan Resort during Accelerate 2019.

Workshops will begin on the morning of April 7th. You should plan to arrive in Orlando on Saturday, April 6.

You will have the option to attend any of the following two-day workshops:

NSE 4 Level Courses

Choose between 1 of 2 NSE 4 Level courses to attend. Each individaul course below is a two-day workshop:
FortiGate Security
In this hands-on course, you will learn how to use basic FortiGate features, including security profiles. In the interactive facilitated labs, you will explore firewall policies, user authentication, and how to protect your network using security profiles such as IPS, antivirus, and web filtering. These administration fundamentals will provide you with a solid understanding of how to implement basic network security.

FortiGate Infrastructure
In this interactive course, you will learn how to use advanced FortiGate networking and security. In interactive labs, you will explore features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, site-to-site IPsec VPN, SSO, web proxy, and diagnostics.

NSE 5 Level Courses

Choose between 1 of 3 NSE 5 Level courses to attend. Each individaul course below is a two-day workshop:
FortiManager
In this hands-on class, you will learn the fundamentals of using FortiManager for centralized network administration of many FortiGate devices. In interactive labs, you will explore deployment strategies which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard Distribution Server, and troubleshoot the features that are critical to day-to-day use once it’s deployed.

FortiNAC
In this hands-on course, you will learn how to leverage the powerful and diverse capabilities of the FortiNAC system, using best practices for achieving visibility, control, and response. In interactive labs, you will explore the administrative tasks necessary to achieve network visibility, control, and automated threat response. These fundamentals will provide you with a solid understanding of how to implement network visibility and security automation.

FortiSIEM
In this hands-on course, you will learn how to use FortiSIEM, and how to integrate FortiSIEM into your network infrastructure.You will learn about initial configurations, architecture, and the discovery of devices on the network. You will also learn how to collect performance information and aggregate it with syslog data to enrich the overall view of the health of the environment. Additionally, you will learn how you can use the configuration database to greatly facilitate compliance audits.

NSE 6 Level Courses

Choose between 1 of 2 NSE 6 Level courses to attend. Each individaul course below is a two-day workshop:

FortiWeb
In this hands-on course, you will learn how to deploy, configure, and troubleshoot Fortinet's web application firewall: FortiWeb. Instructors will explain key concepts of web application security, and lead lab exercises in which you will explore protection and performance features. In the lab, you will experience traffic and attack simulations that use real web applications. You will work with simulations to learn how to distribute load from virtual servers to real servers, while enforcing logical parameters, inspecting flow, and securing HTTP session cookies.

FortiMail
In this hands-on course, you will learn how to use FortiMail to protect your network from existing email-borne threats, as well as use FortiSandbox to detect and block emerging threats. In interactive labs, you will explore FortiMail's role as a specialized device, and how its features extend beyond FortiGate email filtering to provide both high-performance and in-depth security for business-critical communications. You will analyze email security challenges that administrators of small businesses and carriers face, and learn where and how to deploy, manage, and troubleshoot FortiMail.

NSE 7 Level Courses

Choose between 1 of 5 NSE 7 Level courses to attend. Each individaul course below is a two-day workshop:

Enterprise Firewall Architecture
In this advanced hands-on class, you will learn how to implement, troubleshoot, and centrally manage an enterprise security infrastructure composed of multiple FortiGate, FortiManager and FortiAnalyzer devices.

After completing this course, you will be able to:

  • Integrate FortiManager, FortiAnalyzer, and multiple FortiGate devices using Fortinet's security fabric
  • Centralize the management and monitoring of network security events
  • Optimize FortiGate resources
  • Diagnose and monitor user traffic using FortiGate debug tools
  • Troubleshoot issues with conserve mode, high CPU, firewall policies, session helpers, IPsec, FortiGuard, content inspection, routing, and HA
  • Harden the enterprise services
  • Simultaneously deploy IPsec tunnels to multiple sites using the FortiManager VPN console
  • Configure ADVPN to enable on-demand VPN tunnels between sites
  • Combine OSPF and BGP to route the enterprise traffic
Secure Access

In this advanced hands-on course, you will learn how FortiOS, FortiAP, FortiSwitch, and FortiAuthenticator enable secure connectivity, no matter where users are located and how they are connecting. The course covers the deployment and troubleshooting of advanced authentication scenarios, together with best practices for securely connecting wireless and wired users.


After completing this course, you will be able to:

  • Configure advanced user authentication and authorization scenarios using RADIUS and LDAP
  • Troubleshoot user authentication and authorization problems
  • Implement two-factor authentication using digital certificates
  • Implement and troubleshoot single sign-on solutions integrating multiple single sign-on methods
  • Configure and troubleshoot IPsec dial-up and SSL VPN access
  • Manage FortiSwitch devices using FortiLink
  • Configure layer 2 authentication for wired and wireless users using 802.1.x
  • Secure the layer 2 network
  • Secure the wireless network
  • Provide secure access to guest users
  • Implement single sign-on among multiple providers using FortiAuthenticator and SAML
Advance Threat Protection

In this advanced hands-on course, you will learn How to protect an organization and improve its security against advance threats that bypass traditional security controls. You will use FortiSandbox to detect threats that traditional antivirus product miss and see how FortiSandbox dynamically generates local threat intelligence, which can be shared throughout the network. You will combine multiple advanced threat protection (ATP) components—FortiGate, FortiMail, FortiWeb, and FortiClient—to leverage this threat intelligence information to protect an organization end-to-end, from advanced threats.

After completing this course, you will be able to:

  • Identify different types of cyber attacks
  • Identify threat actors and their motivations
  • Understand the anatomy of an attack—the kill chain
  • Identify the potentially vulnerable entry points in an Enterprise network
  • Identify how the ATP framework works to break the kill chain
  • Identify the role of FortiSandbox in the ATP framework
  • Identify appropriate applications for sandboxing
  • Identify FortiSandbox architecture
  • Identify FortiSandbox key components
  • Identify the appropriate network topology requirements
  • Configure FortiSandbox
  • Monitor FortiSandbox operation
  • Configure FortiGate integration with FortiSandbox
  • Configure FortiMail integration with FortiSandbox
  • Configure FortiWeb integration with FortiSandbox
  • Configure FortiClient integration with FortiSandbox
  • Troubleshoot FortiSandbox-related issues
  • Perform analysis of outbreak events
  • Remediate outbreak events based on log and report analysis

Public Cloud Security
In this advanced hands-on course, you will learn about the different components of the top public cloud providers’ infrastructures and the security challenges these environments present, including high availability, auto-scaling, SDN connectors and how to manage traffic in the cloud with Fortinet products. After completing this course, you will be able to:

  • Deploy FortiGate VM on AWS and Azure in single, high availability and auto-scaling modes
  • Use security transit VPC and Vnet
  • Use Fortinet templates to easily deploy complex environments
  • Deploy a FortiWeb in AWS
  • Use SDN connectors with cloud vendors
  • Integrate other Fortinet services and products with cloud vendors
For this advanced course, it is recommended that you have previous knowledge of cloud platforms and VM Fortinet products.


Private Cloud Security
This advanced hands-on course will provide an overview of the most common private cloud architectures, the security challenges these environments present and learn how to protect them with Fortinet solutions. After completing this course, you will be able to:

  • VMWare NSX
    • Deploy FortiGate-VMX
    • Work with SDN connectors
    • Integrate FortiManager and FortiAnalyzer
    • Implement micro-segmentation
  • OpenStack
    • Deploy regular FortiGate-VM
    • Integrate FortiGate-VM using ML2 Plugin
    • Use FortiOS-VM with Fortinet Metering Services

Fast Track Workshops

Attend one of our Fast Track workshops for an impactful hands-on experience on a particular Fortinet technology. Each workshop is based on a specific business or technology use case and provides you with an immediate understanding of the Fortinet solution.

Have you been considering Fortinet NSE Certification? Attend a Fast Track workshop to gain a better understanding of the type of training you can expect as you progress through the 8 levels of the Network Security Expert (NSE) program. Although the Fast Track workshops are designed for a technical audience, no previous Fortinet training is required before attending.

The following Fast Track Workshops will be offered to all Accelerate attendees:

Creating a Comprehensive Security Fabric

Today's new world of networking requires a new approach to security. One that simply yet intelligently secures the entire infrastructure. One that delivers full visibility into every viable network segment and the devices and endpoints behind them. One that can seamlessly integrate with third-party solutions, enabling users to ubiquitously collect, share and correlate threat intelligence. The Fortinet Security Fabric represents the first-ever architectural security approach designed to dynamically adapt to today's evolving IT infrastructure. This multi-layered approach provides broad, integrated, and automated protection against sophisticated threats. Attend this technical training session and gain hands-on experience configuring a comprehensive security fabric including Fortinet products and Fortinet Fabric-Ready Partner products.

What’s New in FortiOS

More than a firewall operating system, FortiOS enables broad connectivity and awareness among security components, both within the network and from other disciplines, such as endpoint, management, and analytics.  The FortiOS has been the heart of FortiGate next-generation firewalls for years now, serving thousands of customers in every industry across the globe. The needs of this diverse customer base are widespread, and the more than 200 new features and capabilities are in response to our customers’ needs. Beyond its mission of enabling the Fortinet Security Fabric, FortiOS makes significant gains in three areas: third-generation network security, SD-WAN, and Fabric integration that unlocks automation. Attend this technical training session and hands-on workshop to learn more about the key new features the FortiOS has to offer.

Fortifying the Enterprise Network (NGFW)

As security architects consider how to provide comprehensive threat protection for their enterprises, including intrusion prevention, web filtering, anti-malware and application control, they face a major complexity hurdle managing these point products with no integration and lack of visibility. Gartner estimates that by 2019, 80% of enterprise traffic will be encrypted and 50% of attacks targeting enterprise will be hidden in encrypted traffic.

FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance including encrypted traffic. FortiGate reduces complexity by integrating various point products into NGFW features with automated action and enhanced visibility into applications, users and network. Attend this technical training session and gain hands-on experience fortifying the enterprise network with Fortinet NGFW solution.

Constructing a Secure SD-WAN Architecture

As organizations transition to a digital business model, their network topologies are significantly impacted. The adoption of cloud services, the virtualization of the traditional network, and an increasingly mobile workforce accessing applications in the cloud are accelerating advancements in wide area networking technologies. The traditional wide area network (WAN) is struggling to keep up because it relies on a static infrastructure of devices that simply can't accommodate shifting, and often temporary resource allocation and workloads. Learn how software-defined networking (SDN) applies to software control of wide area networks in an enterprise environment. Attend this technical training session and gain experience through actual configuration of virtualized products supporting WAN aggregation.

Detecting Zero-Day Threats with FortiSandbox

With a dynamic attack surface due to the rise of IoT and cloud services, it's clear that no single technology will be able to stop every threat. To protect your enterprise against sophisticated threats, it is important to establish a comprehensive and cohesive security infrastructure that is broad enough to cover all attack vectors, powerful enough to run the latest security technologies, and automated to keep pace with fast-moving attacks. Attend this hands-on technical training workshop to learn how to detect and analyze advanced threats with FortiSandbox.

Centralized Management with FortiManager

As networks continue to evolve, organizations struggle to keep ahead. Too many solutions with varying management tools strain already overworked security teams. FortiManager provides a single-pane-of-glass for visibility across the entire Fortinet Security Fabric. FortiManager also lets you maintain control over your FortiGate, FortiSwitch, and FortiAP topologies through an easy-to-use and centralized management console. Learn how to easily control the deployment of security policies, FortiGuard content security updates, firmware revisions, and individual configurations for thousands of FortiOS-enabled devices.

Streamlining Automation Using Web Services APIs (FNDN)

As organizations transition to a digital business model, virtualization and cloud technologies play an increasing role. Speed, Flexibility, Elasticity and Integration are all critical features that cannot be inhibited when implementing an effective security strategy. Ultimately it doesn’t matter how fast you can deploy an appliance or VM if configuration is a manual process which requires a heavy administrative touch. Web Services APIs enable organizations to fully leverage the benefits of these dynamic architectures while offering an efficient communications method that promotes a robust and automated Security Fabric. Understanding the structure, function and communication mechanisms of these APIs is critical for developing any custom interfaces. Attend this hands-on technical training workshop and gain hands-on experience automating configuration and policy deployment on FortiManager and FortiGate.

Attack Methodologies

In this hands-on workshop you will take on the role of a threat actor and will try to breach a fictitious organization to search for and steal information. The idea behind the workshop is that in order to understand how to protect an organization from a breach you must first understand your enemy and the tools and methodologies they use.

Defense Methodologies

Just as cybercriminals follow a well-defined attack methodology to gain access to critical assets within an organization, these organizations must develop and follow a defense methodology to effectively counter those efforts. One popular defense methodology is the NIST Cybersecurity Framework which provides guidelines towards best practices and standards to promote the protection of critical infrastructure. Additionally, it provides a perfect context to define and display the distinct advantages of the Fortinet Security Fabric.

Attend this technical training workshop and gain hands-on experience configuring a comprehensive Security Fabric including Fortinet products and Fortinet Fabric-Ready Partner products and learn how to customize the Security Fabric to develop a Defense Methodology that is optimal for your individual requirements.

Securing your Network Access Infrastructure with FortiSwitch, FortiAP & FortiLink

The number and types of network-connected devices continue to grow exponentially, presenting new vulnerabilities and increasing the attack surface. Addressing this trend requires much more than just network access control. It requires scanning for malware, preventing access to malicious websites, checking endpoint integrity, and controlling application usage while reducing complexity of network, application, and device management.

Fortinet's Secure Unified Access solution provides comprehensive security on the network infrastructure. The tight integration between the FortiGate appliances, FortiSwitch devices, and FortiAP Wireless Access Points enables a common security policy across the network, extending the protection of the firewall out to the edge.

FortiClient Integrated Endpoint Protection

Endpoints are frequently the target of initial compromise or attacks. One recent study found that 30% of breaches involved malware being installed on endpoints. FortiClient strengthens endpoint security through integrated visibility, control, and proactive defense. With the ability to discover, monitor, and assess endpoint risks, you can ensure endpoint compliance, mitigate risks, and reduce exposure. FortiClient proactively defends against advanced attacks. Its tight integration with the Security Fabric enables policy-based automation to contain threats and control outbreaks.

FortiClient is more than advanced endpoint protection. As an integrated agent, FortiClient contains three key modules: Fabric Agent for security Fabric connectivity, the endpoint security modules, and the secure remote access modules. Fabric Agent shares endpoint telemetry with the Security Fabric and delivers broad endpoint visibility, compliance control, and vulnerability management. It provides advanced endpoint protection with pattern-based anti-malware, behavior-based exploit protection, web-filtering, and an application firewall. FortiClient natively integrates with FortiSandbox to detect zero-day threats and custom malware. FortiClient also provides secure remote access with built-in VPN, single-sign-on, and two-factor authentication for added security.

Attend this technical training workshop to gain hands-on experience controlling endpoints using FortiClient EMS in mixed Windows & Linux environments and see first-hand how FortiClient integrates with the Fortinet Security Fabric to protect your companies’ critical assets.

Securely Embrace the IoT Revolution with FortiNAC

The proliferation of Internet of Things (IoT), has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently untrustworthy, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses.

Using AI to Detect Web Application Threats

Cybercriminals are increasingly targeting public and internal web applications. Today, nearly half of all data breaches are caused by attacks targeting web application vulnerabilities. To protect organizations from such attacks, Web Application Firewalls (WAFs) are the gold standard. However, some organizations may be reluctant to use these devices as they have a reputation for being very resource-intensive, especially when it comes to quickly addressing false positive detections in order to ensure that legitimate users and applications don’t get blocked.

In this workshop we will see how FortiWeb’s new AI-based Machine Learning addresses these shortcomings, why it is better than Application Learning and why signature-based protection alone is not enough.

Advanced Email Security Solution with FortiMail

Email is a critical tool for businesses, but it’s also a preferred delivery method for ransomware, phishing, and compromise attacks. According to the 2018 Verizon report, 49% of (non-POS) malware was installed via malicious email. FortiMail is tailored for advanced threat defense and shields users and data, from a wide range of cyber threats. These include the ever-growing volumes of unwanted spam, socially-engineered phishing and business email compromise, accelerating variants of ransomware and other malware. FortiMail can also be used to protect sensitive data of all types, reducing the risk of inadvertent loss and/or non-compliance with regulations like HIPAA, PCI, GDPR, and more.

Attend this technical training session and gain hands-on experience protecting your organization against phishing, spam, malware and advanced targeted attacks via email.

Retail

Fortinet—Leading a Retail Revolution

Session Speaker(s): Jim Overbeck, VP of Central US and Retail Sales, Fortinet, Joe Felz, Sr. Director of Field Marketing, Fortinet, TBD, Fortinet Retail Customer

Consumer interests, purchase patterns, and desire for flexibility is driving a Retail industry evolution, and their preferences change on a dime.  Retailers are looking to new technologies to stay connected, meet their customers’ needs in any channel, develop a dialogue with, and listen to their customers.  Retailers are trying to evolve their security by buying point solutions to secure the new connections, network traffic, and data that comes with those new technologies…but it’s hard for them to keep up and to stitch it all together.  Evolution is slow…so, Fortinet is leading a retail revolution.  

Fortinet’s Security Fabric for Retail is a revolutionary solution with broad, integrated, and automated protection for wired and wireless connections, POS terminals, customer devices on the network, IoT devices, kiosks, big data, and more.  Fortinet has unique abilities to provide visibility into those connections, that traffic, the data at rest and in motion, and the customer analytics and insights that go with it.  In the cloud, in the store, or anywhere in between.  With zero-touch deployment and single pane of glass management on premise or in the cloud, Fortinet’s retail solutions can simplify deployments and provide the improved security coverage retailers need quickly, and with a lower TCO than point solutions.  

In this session, retail industry experts will demonstrate how solutions such as Secure SD-WAN, FortiExtender, FortiDeploy, FortiProvision, and FortiManager are weaved into the Fortinet Retail Security Fabric to protect and defend the evolving retail store, network, and data.  The session will include a leading retailer that will discuss how Fortinet has enabled them to make security a strategic enabler of its digital revolution, improving operational efficiencies and helping them to stay ahead of competitors.

Healthcare

Meeting the Challenges of Healthcare Digitization

Increased digital transformation in healthcare is challenging organizations with inconsistent and distributed security postures and controls. The adoption of next-generation technologies—mobile devices, cloud capabilities, and the Internet of Medical Things (IoMT) means that this new digital enablement requires nurses, doctors, clinicians, and caregivers to access secure patient data—no matter where they are or what device they’re using. At the same time, the risk to personally identifiable information (PII) and electronic protected health information (ePHI) has never been greater, as black-market value of patient data stays at an all-time high.

As recent headlines about large-scale data breaches show, healthcare remains a top target for cyber criminals. In their 2018 Cost of a Data Breach Report, IBM and the Ponemon Institute found that data breach costs for healthcare organizations average $408 per record—the highest of any industry for the eighth straight year and nearly three times higher than the cross-industry average of $148 per record.

In this interactive session, some topics the speakers will address are:

  • Struggles for Visibility
  • Convergence of Physical and Digital Security
  • Managing the Growth and Complexity of Mergers and Acquisitions
  • Automation to reduce resource constraints, drive consistent controls, and shorten time to remediate

SLED

Managing Digital Transformation Within State and Local Governments and Education

Speaker: Jeff Jennings, National SLED Practice Director, Fortinet, Inc.

Emerging cyber threats, the proliferation of IoT devices, smart building projects and other challenges can overwhelm resource constrained IT staff. This panel discussion will explore the unique challenges that digital transformation presents for governments and educational institutions. We’ll talk with practitioners who are managing the digital transformation with network security strategies such as segmentation and solutions that can see and classify everything on their networks, including headless devices, and control those devices and users, all while providing dynamic, automated responses to threats.

In this interactive session, speakers will discuss different aspects of the digital transformation such as:

  • Managing the influx of IoT devices and other smart building initiatives and technologies
  • The convergence of physical and cyber security on campuses and in cities
  • Compliance concerns in a digital era, including NIST, CIPA and FERPA
  • Operational planning from resource constraints to funding projects

Federal

Mitigating Risk and Fortifying Agency Security with Fortinet Federal

Speaker: Bob Fortna, President, Fortinet Federal, Marty Griffith, Sr. Director, Channel, Fortinet Federal

With the introduction of cloud computing, Internet of Things (IOT), and other emerging technologies, the federal government’s digital footprint is growing at an exponential rate.  But as the amount of data continues to increase, so do the number of adversaries and vulnerabilities in the government’s networks.

As prime targets for the most sophisticated adversaries seeking to impact national security, public safety and civilian services, federal governments require the most effective and comprehensive cybersecurity solutions available — while maintaining high performance.  At the same time, they must work within mandated budget constraints, incorporate advancing technology, and remain open to the citizens they serve.

In this interactive session, the speakers will address such topics as:

  • Detailed overview of U.S. Federal Government cyber priorities and programs 
  • Fortinet Federal’s approach to advancing federal agencies’ missions and cyber objectives
  • Fortinet Federal Partner Program: How Fortinet is creating a successful federal partner ecosystem to secure government networks

OT

The Journey to Digital Transformation:  Securing Industrial Control Systems and Operational Technology (OT)

Speaker: Rick Peters, Director, Operational Technology Global Enablement

A system crash on a manufacturing floor can stall production for hours and potentially cost a company millions in ruined product. Even worse, having to reset an open furnace or a 10,000-gallon boiler processing caustic chemicals can have far more devastating consequences than temporarily losing access to an online printer. Because the primary goals of an OT environment are ensuring the safety of employees and local communities and ensuring the constant availability and uptime of the network, connected devices, applications, and industrial control systems are often not consistently updated.

In this interactive session, experts will discuss security without compromising availability or safety so important to operational technology and critical infrastructure security.  Hear from a panel of industry experts discussing lessons learned and how their experience can be leveraged to successfully secure OT environments.    The session will also cover how the Fortinet Fabric solution will protect and defend the control system vulnerabilities in industries such as manufacturing, energy, utilities and transportation.

SP

SD-WAN - Coming to a Service Provider Near You.
 
SD-WAN has moved from cool idea to the next must have capability in a very short span of time. With its ability to deliver an optimized networking experience to a broad set of customers at a reasonable cost, it’s growth prospects are dazzling. However, building a service-provider optimized SD-WAN business requires the right set of capabilities and positioning. This session will explore the technology, operational needs, market conditions and differentiation required to launch a competitive SP delivered SD-WAN service.