...

Download Our Latest Course Catalog | Download Now

[woo_multi_currency_layout10]

OT Security Architect

In this course, you will learn to design and secure operational technology environments using Fortinet solutions. You will work with FortiGate, FortiNAC, FortiAnalyzer, and FortiSIEM to protect OT infrastructures across industrial networks.

Overview

Overview

In the OT Security Architect course, you will gain hands-on experience designing, deploying, and operating an OT security architecture based on Fortinet products. 

The course focuses on asset visibility, access control, segmentation, protection, and centralized logging and monitoring to secure OT networks while maintaining operational reliability.

Prerequisites

To attend this course, you should have:

  • An understanding of topics covered in FortiOS Administrator or equivalent experience

It is recommended that you also have experience with following courses:

  • FortiAnalyzer Analyst
  • FortiSIEM Analyst
Scope

The course topics include:

  • OT infrastructure fundamentals
  • Asset management and device visibility
  • Access control and authentication
  • Segmentation and microsegmentation
  • OT network protection strategies
  • Logging and monitoring
  • Risk assessment
Target Audience

Ideal for:

  • Security architects designing OT security solutions
  • Professionals responsible for implementing and administering OT environments using Fortinet technologies
Best Practices

You will learn these skills as part of this course:

  • Applying the Purdue model to OT network security
  • Controlling device access and identity in OT environments
  • Implementing segmentation to reduce risk
  • Centralizing visibility through logging and monitoring
  • Balancing security controls with operational availability
Certification

Completing this course prepares you for the NSE 6 – OT Security Architect exam within the FCSS Secure Networking certification track.

FAQs

Q: Is this course focused on IT or OT environments?
A: This course is focused specifically on securing operational technology environments.

Q: Does the course cover segmentation models like Purdue?
A: Yes. The Purdue model is a core part of the course.

Q: Are multiple Fortinet products covered?
A: Yes. The course covers FortiGate, FortiNAC, FortiAnalyzer, and FortiSIEM.

Exam Resources

Datasheet

Credits Guide

Credits Datasheet

Credits FAQ

Objectives

After completing this course, you will be able to:

  • Explain the fundamentals of an OT infrastructure
  • Secure an OT infrastructure using the Purdue model
  • Use FortiGate and FortiNAC to identify and manage devices
  • Implement segmentation and microsegmentation in an OT network
  • Authenticate users
  • Secure your OT network traffic using FortiGate
  • Use FortiAnalyzer for logging and reporting
  • Use FortiAnalyzer to centralize security information and event management
  • Generate real-time analysis of security events using FortiAnalyzer and FortiSIEM
Note : A representative from Datacipher will contact you with further details

Training Credits/Participant: 30

Payment Methods

At DataCipher, we provide a range of payment options for our Palo Alto courses. Here’s what you can choose from:

Palo Alto Networks Training Credits and Vouchers – We accept both training credits and training vouchers issued by Palo Alto Networks. To enroll in a course using your credits or vouchers, please click the Register button. You’ll have the opportunity to apply these credits during the final step of the registration process.

Purchase Order (PO) – If your organization prefers using a purchase order, begin the registration by clicking the Register button. At the conclusion of the registration form, choose the option “My company will pay for it, please send an invoice with the payment details.” Our training team will then provide an official quote and any necessary additional information that your accounts department might need to issue the PO.

Bank Transfer – DataCipher maintains bank accounts in both the US and Europe, accommodating all standard bank transfer methods such as IBAN/BIC, Swift, ACH, or wire transfer. To make a payment via bank transfer, simply use the Register button to sign up for your selected course.

Credit Card Payments – We accept payments from all major credit cards, including Mastercard, VISA, American Express, Discover & Diners, and Cartes Bancaires. Payments can be made directly through the registration link or by requesting an invoice that includes a web link for online payment. All transactions are secure, and DataCipher does not store any credit card information.

These methods are designed to make the registration process as smooth and flexible as possible for all participants.

Status

Guaranteed to Run – DataCipher is committed to running this class unless unforeseen events such as an instructor’s accident or illness occur.

Guaranteed on Next Booking – The course will proceed once an additional student registers.

Scheduled Class – We have scheduled this course and rarely cancel due to low enrollment. We offer a “Cancel No More Than Once” guarantee, ensuring that if a class is canceled due to insufficient enrollment, the next session will run regardless of the number of attendees.

Sold Out – If the class is fully booked, please use our contact form to join the waiting list or to inquire about additional sessions. We’re here to accommodate your training needs and keep you informed of new opportunities.

Half and Full-Day Training

At DataCipher, we offer our training courses in both traditional full-day and convenient half-day formats. Our half-day classes are specifically designed for IT professionals who cannot be away from their workplaces for consecutive full days. This flexible schedule allows participants to dedicate a few hours to learning and then return to their regular work responsibilities.

The curriculum for both the full-day and half-day formats is identical. The primary difference is that the half-day classes spread the coursework over a more extended period, providing a balanced approach to professional education. DataCipher has been successfully running these half-day training sessions for several years, receiving consistently positive feedback from our customers. They appreciate the flexibility and report that the extended timeframe facilitates a deeper understanding of the material, as it gives them more time to absorb and reflect on the information learned.

In the OT Security Architect course, you will gain hands-on experience designing, deploying, and operating an OT security architecture based on Fortinet products. 

The course focuses on asset visibility, access control, segmentation, protection, and centralized logging and monitoring to secure OT networks while maintaining operational reliability.

REQUEST CUSTOM DELIVERY

REQUEST a Quote

Become An Expert By Practice – Get Your Hands On Labs

Don’t let your tech outpace the skills of your people

TRUSTED BY TOP COMPANIES LIKE IBM, DELOITTE, ERICSSON, AND MORE.
DISCOVER OUR CUSTOMER PORTFOLIO.

Dedicated to excellence, we cultivate strong partnerships with worldwide technology innovators.

Testimonials

What Our Clients Say

You’re all set!

Thanks for registering. Our training team will be in touch soon to confirm your class schedule and help you get started.