3 minute read

Fortinet Extends Availability of

Fortinet Extends Availability of Free Self-Paced NSE Cybersecurity Training Courses

Fortinet has announced that all selfpaced advanced security training courses will remain free beyond 2021. Fortinet is committed to developing a diverse cybersecurity workforce by continuing to offer free security training for anyone around the world.

Advertisement

Rob Rashotte, Vice President, Global Training and Technical Field Enablement at Fortinet said, “With over 800,000 registrations for our free training offerings in 2020, it has become clear that Fortinet’s NSE training is fulfilling a huge need for all levels of security professionals. As such we are committed to continue offering the entire catalogue of self-paced Network Security Expert training at no cost until we see the skills gap trend reverse. Together with our ecosystem of academic and commercial training providers as well as government and NGO partnerships, we will continue to provide the industry with a diverse, equitable and inclusive pipeline of security professionals."

Fortinet’s free training initiative provides learners with the following:

Access to more than 30 free security courses: These courses are on topics ranging from secure SD-WAN to operational technology (OT) security to cloud security with more courses expected to be added throughout the year. Additionally, pre-recorded lab demos by cybersecurity experts are available for on-demand viewing. Preparation for NSE Certification exams: Most of the free courses are from the official curriculum for the Fortinet NSE Certification Program. Fortinet’s Certification Program is an eight-level program that has issued more than half a million certifications. Continuing professional credits: Through a partnership with (ISC)2, individuals can use their free training completion – as well as any NSE training course – to gain Continuing Professional Education (CPE) credits for CISSP and other (ISC)2 designations. Learners earn one credit for every hour of NSE Training Institute training they do with Fortinet.

As the pandemic led to the exponential increase of teleworkers, the need for securing remote networks and users became a top priority for organizations. IT teams already challenged with finding security professionals due to the skills gap were faced with an even greater need for expertise to securely transition to a remote workforce. One way Fortinet responded to this need was by opening its entire Network Security Expert (NSE) Training Institute catalogue of self-paced courses free of charge in April 2020.

In doing so, Fortinet provided IT and security professionals the opportunity to learn new skills, reskill or upskill their security knowledge. Since opening these courses to the public, there have been more than 800,000 registrations.

SentinelOne Releases Free SUNBURST Identification Tool

SentinelOne has released a free SUNBURST identification tool to help enterprises determine attack readiness. The opensource assessment tool allows users to identify if the SUNBURST malware variant at the heart of the SolarWinds attack campaign would have infected their devices.

The SUNBURST attack highlights the risks and realities of a supply-chain attack. Multiple third-party researchers report the cybersecurity products deployed in impacted enterprises. SentinelOne’s free utility tool helps enterprises of all sizes determine their readiness with their existing product set and team by helping any SolarWinds Orion customer determine impact retroactively. The tool also helps non-SolarWinds Orion customers determine if their endpoint vendor would have stopped this high-impact nation-state attack.

The release of SentinelOne’s SUNBURST tool follows SentinelOne’s confirmation that all of its customers are protected from SUNBURST, without requiring any updates to the SentinelOne XDR platform. The free tool is designed to identify processes, services, and drivers that SUNBURST attempts to identify on the victim’s machine and provide definitive evidence if a device would have been impacted.

“The sophistication and scale of the SolarWinds attack campaign present a level of cyber risk that is rarely seen,” said Brian Hussey, VP of Cyber Threat Response, SentinelOne. “Many traditional antivirus and next-gen solutions lack native anti-tampering functionality and were disabled by SUNBURST prior to product updates being made, leaving thousands of organizations exposed. SentinelOne’s autonomous AI and robust anti-tampering capabilities have secured all of our customers against the attack. In addition to continually monitoring and testing the latest SUNBURST variants to ensure our customers remain protected, our SUNBURST tool allows the community-at-large to easily measure their security tools’ effectiveness against SUNBURST activity and mitigate subsequent risk.”

This article is from: