Download Our Latest Course Catalog | Download Now

[woo_multi_currency_layout10]

FortiDeceptor Administrator

This course teaches you how to deceive, expose, and eliminate threats early in the attack kill chain using FortiDeceptor. You will learn to deploy decoy VMs, configure lures, and integrate FortiDeceptor with the Fortinet Security Fabric and third-party products.

FortiDeceptor Administrator

Overview

Overview

This course teaches you how to deceive, expose, and eliminate threats early in the attack kill chain using FortiDeceptor.

You will learn to deploy decoy VMs, configure lures, and integrate FortiDeceptor with the Fortinet Security Fabric and third-party products.

Prerequisites

Understanding of topics covered in the FCP – FortiGate Administrator course, or equivalent experience.

Scope

This course covers:

  • The fundamentals of deception-based security

  • FortiDeceptor architecture, dashboard, and modules

  • Deployment of decoys, tokens, and lures

  • Incident analysis and attack visualization

  • Integration with Fortinet Security Fabric and third-party platforms

  • MITRE ATT&CK and ICS matrix mapping

  • Best practices for deployment, air-gapped configurations, and AD integration

Target Audience

Cybersecurity professionals responsible for the day-to-day administration, management, and troubleshooting of FortiDeceptor.

Best Practices
  • Deploy a mix of full-stack and light-stack decoys across critical segments

  • Use token packages to broaden deception coverage on endpoints

  • Regularly review the MITRE attack map and correlate incidents

  • Integrate with FortiSIEM, FortiAnalyzer, and third-party SOC tools

  • Deploy in air-gapped environments with proper central configuration

  • Simulate real services using believable lure content and bait

  • Tailor deception strategies based on network topology and attacker behavior

Certification

Completing this course supports:

  • Fortinet Certified Professional (FCP) in Deception Technologies

  • Prepares you for FortiDeceptor-related advanced roles within security teams
    You’ll receive:

  • Certificate of Completion

  • Credit toward Fortinet product-specific certifications

FAQs

Can the FortiDeceptor Administrator course be taken online?

Yes, this course is available online, complete with live demonstrations and personal lab access, all under the guidance of expert instructors.

Is in-person classroom training available?

Yes, we offer in-person training at our facilities or customized sessions at your location. Check our “Price and Dates” section or contact us directly for scheduling details.

Will I receive official course materials?

Participants will receive course materials in both electronic and printed forms. Please confirm your booking at least ten days in advance to ensure the availability of printed materials.

Can the electronic coursebook be printed?

Yes, the electronic coursebook is printable, offering flexibility in how you choose to study.

Do participants receive a certificate of completion?

Upon successfully completing the course, participants will be awarded an official certificate, acknowledging their proficiency in the content covered.

Course Outline

The FortiDeceptor course provides hands-on training to deploy, configure, and manage deception-based threat detection and response within enterprise environments. FortiDeceptor simulates vulnerable assets and systems to detect malicious activity in real time and integrate with your security fabric for fast response and intelligence sharing.

You’ll learn how to:

  • Deploy decoys and token packages

  • Analyze incidents using MITRE matrices

  • Integrate FortiDeceptor with Fortinet and third-party tools

  • Design deception strategies based on network topology and threat vectors

Note : A representative from Datacipher will contact you with further details
Payment Methods

At DataCipher, we offer a variety of payment options for our Fortinet courses. Here are the methods available:

Purchase Order (PO) – If your organization prefers using a purchase order, begin the registration process by clicking the Register button. At the conclusion of the registration form, choose the option “My company will pay for it, please send an invoice with the payment details.” Our training team will then provide an official quote and any necessary additional information that your accounts department might need to issue the PO.

Bank Transfer – DataCipher maintains bank accounts in both the US and Europe, accommodating all standard bank transfer methods such as IBAN/BIC, Swift, ACH, or wire transfer. To make a payment via bank transfer, simply use the Register button to sign up for your selected course.

Credit Card Payments – We accept payments from all major credit cards, including Mastercard, VISA, American Express, Discover & Diners, and Cartes Bancaires. Payments can be made directly through the registration link or by requesting an invoice that includes a web link for online payment. All transactions are secure, and DataCipher does not store any credit card information.

These options are designed to make the registration process as smooth and flexible as possible for all participants.

Status

Guaranteed to Run – DataCipher is committed to running this class unless unforeseen events such as an instructor’s accident or illness occur.

Guaranteed on Next Booking – The course will proceed once an additional student registers.

Scheduled Class – We have scheduled this course and rarely cancel due to low enrollment. We offer a “Cancel No More Than Once” guarantee, ensuring that if a class is canceled due to insufficient enrollment, the next session will run regardless of the number of attendees.

Sold Out – If the class is fully booked, please use our contact form to join the waiting list or to inquire about additional sessions. We’re here to accommodate your training needs and keep you informed of new opportunities.

Half and Full-Day Training

At DataCipher, we offer our training courses in both traditional full-day and convenient half-day formats. Our half-day classes are specifically designed for IT professionals who cannot be away from their workplaces for consecutive full days. This flexible schedule allows participants to dedicate a few hours to learning and then return to their regular work responsibilities.

The curriculum for both the full-day and half-day formats is identical. The primary difference is that the half-day classes spread the coursework over a more extended period, providing a balanced approach to professional education. DataCipher has been successfully running these half-day training sessions for several years, receiving consistently positive feedback from our customers. They appreciate the flexibility and report that the extended timeframe facilitates a deeper understanding of the material, as it gives them more time to absorb and reflect on the information learned.

Click below to download the course materials and any additional resources.

REQUEST CUSTOM DELIVERY

REQUEST a Quote

Become An Expert By Practice – Get Your Hands On Labs

Don’t let your tech outpace the skills of your people

TRUSTED BY TOP COMPANIES LIKE IBM, DELOITTE, ERICSSON, AND MORE.
DISCOVER OUR CUSTOMER PORTFOLIO.

Dedicated to excellence, we cultivate strong partnerships with worldwide technology innovators.

Testimonials

What Our Clients Say

You’re all set!

Thanks for registering. Our training team will be in touch soon to confirm your class schedule and help you get started.