0% found this document useful (0 votes)
21 views2 pages

NSE2 Course Description

Uploaded by

hendy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views2 pages

NSE2 Course Description

Uploaded by

hendy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Course Description

The Evolution of
Cybersecurity
In this course, you will learn about products that security vendors have created to
address cyberthreats. This course traces the evolution of network security
products from simple to sophisticated, as organizations encountered increasingly
complex cyberattacks.

Course Duration
l Self-paced course time (estimated): 2 hours

Who Should Attend


Anyone who wants to learn about cybersecurity and security products should attend this course.

Certification
To obtain the NSE 2 Network Security Associate certification, you must complete all of the lessons and quizzes in
this course.

After you complete this course, it may take up to an hour for your certificate to be available.

To download your certificate, do the following:

1. Log in to the Fortinet Training Institute website.


2. In the upper-right corner, click the down arrow of the user menu, and then click Profile.
3. On the profile page, in the Certifications section, in the NSE 2 Network Security Associate row, click Download
Certificate.
The NSE 2 certification is valid for two years from the date of completion.

5/27/2022

https://training.fortinet.com
NSE 2 The Evolution of Cybersecurity Course Description

Prerequisites Training Delivery Options


Fortinet recommends that you complete NSE 1 The Self-Paced Training
Threat Landscape before starting this course.
Online training videos and resources are available
through the Fortinet Training Institute library, free of
Agenda charge.

1. Cloud Security
2. Endpoint Security
Program Policies and FAQs
3. Firewall For questions about courses, certification, or training
4. Network Access Control products, refer to Program Policy Guidelines or
5. Sandbox Frequently Asked Questions.
6. SASE
7. SD-WAN
8. Secure Email Gateway
9. Security Information & Event Management
10. SOAR
11. Threat Intelligence Services
12. Web Application Firewall
13. Web Filter
14. Wi-Fi
15. ZTNA

Objectives
After completing this course, you will be able to:
l Identify network security products and explain how they
protect networks
l Describe how network security technology has developed
to counter evolving cyberthreats

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy