...

Download Our Latest Course Catalog | Download Now

[woo_multi_currency_layout10]

FortiSIEM Analyst

In this hands-on course, you will learn to search, enrich, and analyze security events using FortiSIEM in an MSSP or enterprise SOC environment. 

You will perform real-time and historical analysis, incident investigation, and threat hunting using both traditional and machine-learning–assisted methods.

Overview

Overview

In this FortiSIEM Analyst course, you will gain practical experience analyzing security events and incidents using FortiSIEM. 

Through guided exercises, you will build advanced queries, analyze incidents, apply remediation workflows, and use analytics, baselines, and machine learning to detect anomalies. 

The course focuses on operational security monitoring, threat hunting, and incident response using FortiSIEM dashboards, reports, and UEBA capabilities.

Prerequisites

To get the most out of this course, you should have an understanding of the topics covered in:

  • FortiGate Operator
  • FortiSIEM Administrator

or equivalent hands-on experience.

Scope

The course topics include:

  • FortiSIEM architecture and analytics
  • Real-time and historical searches
  • Nested queries and lookup tables
  • Rules, subpatterns, and incident handling
  • Clear conditions and remediation workflows
  • Threat hunting techniques and dashboards
  • Performance metrics and baselines
  • Machine learning analytics
  • User and Entity Behavior Analytics (UEBA)
  • FortiSIEM ZTNA integration
  • Reports and custom dashboards
Target Audience

Ideal for:

  • Security analysts responsible for monitoring and investigating security events
  • SOC professionals performing incident analysis and remediation using FortiSIEM
  • MSSP teams managing customer security operations
Best Practices

You will learn these skills as part of this course:

  • Building efficient and structured search queries
  • Tuning incidents to reduce false positives
  • Using baselines and ML to detect anomalies
  • Applying threat hunting workflows effectively
  • Leveraging UEBA and ZTNA context during incident response
Certification

After completing this course, You will be able to prepare for the NSE 6 – FortiSIEM Analyst exam, which is part of the FCSS Security Operations certification track

FAQs

Q: Does this course include machine learning concepts?
A: Yes. You will work with FortiSIEM ML analytics and UEBA features.

Q: Is this suitable for MSSP environments?
A: Yes. The course is designed with MSSP-style multi-customer analysis use cases in mind.

Exam Resources

Datasheet

Credits Guide

Credits Datasheet

Credits FAQ

Objectives

After completing this course, you should be able to:

  • Describe how FortiSIEM solves common cybersecurity challenges
  • Describe the main components and the unique database architecture on FortiSIEM
  • Perform real-time and historical searches
  • Define structured search operators and search conditions
  • Reference the CMDB data in structured searches
  • Configure display fields and columns
  • Build queries from search results and events
  • Build nested queries and lookup tables
  • Build rule subpatterns and conditions
  • Manage and tune incidents
  • Resolve an incident
  • Create time-based and pattern-based clear conditions
  • Configure automation policies
  • Create rules using baselines
  • Analyze anomalies against baselines
  • Describe the threat hunting workflow
  • Analyze threat hunting dashboards
  • Describe FortiSIEM ML modes and algorithms
  • Describe how to train an ML model perform an analysis using a ML model
  • Describe the benefits of deploying FortiSIEM UEBA
  • Configure tags, rules, and incidents using UEBA data
  • Describe how ZTNA tags affect the FortiSIEM incident and remediation process
  • Configure a ZTNA tag using FortiSIEM to remediate incidents
  • Generate and export a report
  • Create a custom dashboard
Note : A representative from Datacipher will contact you with further details

Training Credits/Participant: 30

Payment Methods

At DataCipher, we provide a range of payment options for our Palo Alto courses. Here’s what you can choose from:

Palo Alto Networks Training Credits and Vouchers – We accept both training credits and training vouchers issued by Palo Alto Networks. To enroll in a course using your credits or vouchers, please click the Register button. You’ll have the opportunity to apply these credits during the final step of the registration process.

Purchase Order (PO) – If your organization prefers using a purchase order, begin the registration by clicking the Register button. At the conclusion of the registration form, choose the option “My company will pay for it, please send an invoice with the payment details.” Our training team will then provide an official quote and any necessary additional information that your accounts department might need to issue the PO.

Bank Transfer – DataCipher maintains bank accounts in both the US and Europe, accommodating all standard bank transfer methods such as IBAN/BIC, Swift, ACH, or wire transfer. To make a payment via bank transfer, simply use the Register button to sign up for your selected course.

Credit Card Payments – We accept payments from all major credit cards, including Mastercard, VISA, American Express, Discover & Diners, and Cartes Bancaires. Payments can be made directly through the registration link or by requesting an invoice that includes a web link for online payment. All transactions are secure, and DataCipher does not store any credit card information.

These methods are designed to make the registration process as smooth and flexible as possible for all participants.

Status

Guaranteed to Run – DataCipher is committed to running this class unless unforeseen events such as an instructor’s accident or illness occur.

Guaranteed on Next Booking – The course will proceed once an additional student registers.

Scheduled Class – We have scheduled this course and rarely cancel due to low enrollment. We offer a “Cancel No More Than Once” guarantee, ensuring that if a class is canceled due to insufficient enrollment, the next session will run regardless of the number of attendees.

Sold Out – If the class is fully booked, please use our contact form to join the waiting list or to inquire about additional sessions. We’re here to accommodate your training needs and keep you informed of new opportunities.

Half and Full-Day Training

At DataCipher, we offer our training courses in both traditional full-day and convenient half-day formats. Our half-day classes are specifically designed for IT professionals who cannot be away from their workplaces for consecutive full days. This flexible schedule allows participants to dedicate a few hours to learning and then return to their regular work responsibilities.

The curriculum for both the full-day and half-day formats is identical. The primary difference is that the half-day classes spread the coursework over a more extended period, providing a balanced approach to professional education. DataCipher has been successfully running these half-day training sessions for several years, receiving consistently positive feedback from our customers. They appreciate the flexibility and report that the extended timeframe facilitates a deeper understanding of the material, as it gives them more time to absorb and reflect on the information learned.

In this FortiSIEM Analyst course, you will gain practical experience analyzing security events and incidents using FortiSIEM. 

Through guided exercises, you will build advanced queries, analyze incidents, apply remediation workflows, and use analytics, baselines, and machine learning to detect anomalies. 

The course focuses on operational security monitoring, threat hunting, and incident response using FortiSIEM dashboards, reports, and UEBA capabilities.

REQUEST CUSTOM DELIVERY

REQUEST a Quote

Become An Expert By Practice – Get Your Hands On Labs

Don’t let your tech outpace the skills of your people

TRUSTED BY TOP COMPANIES LIKE IBM, DELOITTE, ERICSSON, AND MORE.
DISCOVER OUR CUSTOMER PORTFOLIO.

Dedicated to excellence, we cultivate strong partnerships with worldwide technology innovators.

Testimonials

What Our Clients Say

You’re all set!

Thanks for registering. Our training team will be in touch soon to confirm your class schedule and help you get started.