<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.de/css/xml-course.xsl"?><course productid="24785" language="de" source="https://portal.flane.de/ibb/xml-course/fortinet-fort-advthreatprot" lastchanged="2026-04-08T01:02:30+02:00" parent="https://portal.flane.de/ibb/xml-courses"><title>FortiSandbox Administrator</title><productcode>FORT-ADVTHREATPROT</productcode><vendorcode>FO</vendorcode><vendorname>Fortinet</vendorname><fullproductcode>FO-FORT-ADVTHREATPROT</fullproductcode><version>5.0</version><objective>&lt;p&gt;After completing this course, you will be able to: &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Identify different types of cyber attacks&lt;/li&gt;&lt;li&gt;Identify threat actors and their motivations&lt;/li&gt;&lt;li&gt;Understand the anatomy of an attack&amp;mdash;the kill chain&lt;/li&gt;&lt;li&gt;Identify the potentially vulnerable entry points in an Enterprise network&lt;/li&gt;&lt;li&gt;Identify how the ATP works to break the kill chain&lt;/li&gt;&lt;li&gt;Identify the role of FortiSandbox in the ATP framework&lt;/li&gt;&lt;li&gt;Identify appropriate applications for sandboxing&lt;/li&gt;&lt;li&gt;Identify FortiSandbox architecture and key components&lt;/li&gt;&lt;li&gt;Identify the appropriate network topology requirements&lt;/li&gt;&lt;li&gt;Configure FortiSandbox&lt;/li&gt;&lt;li&gt;Monitor FortiSandbox operation&lt;/li&gt;&lt;li&gt;Configure FortiGate, FortiMail, FortiWeb, and FortiClient integration with FortiSandbox&lt;/li&gt;&lt;li&gt;Identify the role of machine learning in preventing zero day attacks and advanced threats&lt;/li&gt;&lt;li&gt;Configure machine learning on FortiWeb&lt;/li&gt;&lt;li&gt;Analyze attack logs from machine learning system&lt;/li&gt;&lt;li&gt;Troubleshoot FortiSandbox&lt;/li&gt;&lt;li&gt;Perform analysis of outbreak events&lt;/li&gt;&lt;li&gt;Remediate outbreak events based on log and report analysis&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;You must have an understanding of the topics covered in &lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/ibb/course/fortinet-fort-seci&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;FortiGate Security &lt;span class=&quot;fl-prod-pcode&quot;&gt;(FORT-SECI)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt; or &lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/ibb/course/fortinet-fort-secii&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;FortiGate Infrastructure &lt;span class=&quot;fl-prod-pcode&quot;&gt;(FORT-SECII)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;, or have equivalent experience.&lt;/p&gt;
&lt;p&gt;It is also recommended that you have an understanding of the topics covered in  &lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/ibb/course/fortinet-fortimail&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;FortiMail Administrator &lt;span class=&quot;fl-prod-pcode&quot;&gt;(FORTIMAIL)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;, &lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/ibb/course/fortinet-fort-web&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;FortiWeb Administrator &lt;span class=&quot;fl-prod-pcode&quot;&gt;(FORT-WEB)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;, and &lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/ibb/course/fortinet-fort-clientems&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;FortiClient EMS Administrator &lt;span class=&quot;fl-prod-pcode&quot;&gt;(FORT-CLIENTEMS)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;, or have equivalent experience.&lt;/p&gt;</essentials><audience>&lt;p&gt;This course is intended for network security engineers responsible for designing, implementing, and maintaining an advanced threat protection solution with FortiSandbox, in an Enterprise network environment.&lt;/p&gt;</audience><outline>&lt;ul&gt;
&lt;li&gt;1. Attack Methodologies and the ATP Framework&lt;/li&gt;&lt;li&gt;2. Key Components&lt;/li&gt;&lt;li&gt;3. High Availability, Maintenance and Troubleshooting&lt;/li&gt;&lt;li&gt;4. Protecting the Edge&lt;/li&gt;&lt;li&gt;5. Protecting Email Networks&lt;/li&gt;&lt;li&gt;6. Protecting Web Applications&lt;/li&gt;&lt;li&gt;7. Protecting End Users&lt;/li&gt;&lt;li&gt;8. Protecting Third-Party Appliances&lt;/li&gt;&lt;li&gt;9. Results Analysis&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>After completing this course, you will be able to: 


- Identify different types of cyber attacks
- Identify threat actors and their motivations
- Understand the anatomy of an attack—the kill chain
- Identify the potentially vulnerable entry points in an Enterprise network
- Identify how the ATP works to break the kill chain
- Identify the role of FortiSandbox in the ATP framework
- Identify appropriate applications for sandboxing
- Identify FortiSandbox architecture and key components
- Identify the appropriate network topology requirements
- Configure FortiSandbox
- Monitor FortiSandbox operation
- Configure FortiGate, FortiMail, FortiWeb, and FortiClient integration with FortiSandbox
- Identify the role of machine learning in preventing zero day attacks and advanced threats
- Configure machine learning on FortiWeb
- Analyze attack logs from machine learning system
- Troubleshoot FortiSandbox
- Perform analysis of outbreak events
- Remediate outbreak events based on log and report analysis</objective_plain><essentials_plain>You must have an understanding of the topics covered in FortiGate Security (FORT-SECI) or FortiGate Infrastructure (FORT-SECII), or have equivalent experience.

It is also recommended that you have an understanding of the topics covered in  FortiMail Administrator (FORTIMAIL), FortiWeb Administrator (FORT-WEB), and FortiClient EMS Administrator (FORT-CLIENTEMS), or have equivalent experience.</essentials_plain><audience_plain>This course is intended for network security engineers responsible for designing, implementing, and maintaining an advanced threat protection solution with FortiSandbox, in an Enterprise network environment.</audience_plain><outline_plain>- 1. Attack Methodologies and the ATP Framework
- 2. Key Components
- 3. High Availability, Maintenance and Troubleshooting
- 4. Protecting the Edge
- 5. Protecting Email Networks
- 6. Protecting Web Applications
- 7. Protecting End Users
- 8. Protecting Third-Party Appliances
- 9. Results Analysis</outline_plain><duration unit="d" days="2">2 Tage</duration><pricelist><price country="US" currency="USD">1900.00</price><price country="CA" currency="CAD">2620.00</price><price country="GB" currency="GBP">1520.00</price><price country="IL" currency="USD">1900.00</price><price country="AT" currency="USD">1900.00</price><price country="EG" currency="USD">1900.00</price><price country="SE" currency="USD">1900.00</price><price country="DE" currency="USD">1900.00</price><price country="AE" currency="USD">1900.00</price><price country="SI" currency="USD">1900.00</price><price country="CH" currency="USD">1900.00</price></pricelist><miles/></course>