ForeScout Technologies is a California’s Silicon Valley based network Security Company. The company’s technology is used mainly in the financial services, technology, government, education, and healthcare markets. ForeScout Counter ACT, dynamically finds and estimates network applications and devices the instant they connect to a company’s network. Counter ACT obtainable as a software or as an out-of-band physical appliance offers real-time perceptibility into IP-connected devices—corporate and personal, managed and unmanaged, wired and wireless.
|Course Name||ForeScout Online Training|
|Contents||Basics of Counter ACT, Architecture and administration techniques|
|Duration||30 Hours with Flexible timings|
|Delivery||Instructor Led-Live Online Training|
|Ideal For||Freshers, aspirants seeking to learn the Counter ACT Administration.|
|Next Batch||Please visit the schedule section|
- Basic concepts of the Network Access Control and ForeScout
- Learn about the Counter ACT Architecture
- How to install and Configure Counter ACT
- Empower aspirants to know Counter ACT administration practices
- How to prepare for project work in real time.
PRE-REQUISITES: Basic Knowledge of Network Concepts would be beneficial.
MODULE 1 : INTRODUCTION
TOPICS : ForeScout’s vision introduction and Network Access Control concepts.
MODULE 2 : TERMS AND ARCHITECTURE
TOPICS : This Module introduces students to normally used terms such as segment, plugin, channel, managerial unit, and networking terms. It also covers the prerequisites for a notional CounterACT deployment.
MODULE 3 : COUNTERACT INSTALLATION
TOPICS : Participants configure CounterACT for installation in a practical network environment; including configuring switch connectivity, Active Directory integration, and account management.
MODULE 4 : CONSOLE OVERVIEW
TOPICS : This is a tour of the console to illustrate features and demonstrate navigation.
MODULE 5 : COUNTERACT CONFIGURATION
TOPICS : Detailed instructions for configuring CounterACT independent from first-time login. Plugins, Channel, Host Property Scanner, Switch Observe and configuration options are covered.
MODULE 6 : COUNTERACT DEPLOYMENT
TOPICS : Students learn the best practices for a successful CounterACT deployment; including appliance locations, layer 2 versus layer 3 installation and network integration.
MODULE 7 : POLICY OVERVIEW
TOPICS : Students get a foundational overview of how policies are created and function within the Counter ACT console.
MODULE 8 : CLASSIFICATION
TOPICS : Students learn the best practices for a successful Counter ACT deployment; including appliance locations, layer 2 versus layer 3 installation and network integration.
MODULE 9 : CLARIFICATION
TOPICS : Students learn how to identify the management capabilities of the hosts; starting with established Classification groups.
MODULE 10 : COMPLIANCE
TOPICS : Students create policies to establish a network and endpoint compliance posture for a typical corporate environment.
MODULE 11 : THREAT
TOPICS : Protection Students are introduced to the concept of ForeScout threat protection and deployment options for any Counter ACT installation.
MODULE 12 : CONTROL
TOPICS : Students enforce a compliance posture by assigning network devices to VLANs and ACLs, updating asset anti-virus and patch levels, and enabling guest registration.
No Reviews found for this course.