0% found this document useful (0 votes)
113 views

NSE2 Course Description

This course traces the evolution of network security products from simple to sophisticated over time as organizations encountered increasingly complex cyberattacks. The self-paced course takes approximately 2 hours to complete and covers various cybersecurity topics including cloud security, endpoint security, firewalls, network access control, sandboxes, SASE, SD-WAN, secure email gateways, security information and event management, SOAR, threat intelligence services, web application firewalls, web filters, Wi-Fi, and ZTNA. Upon completion, participants will be able to identify network security products and explain how they protect networks and describe how network security technology has developed to counter evolving cyberthreats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
113 views

NSE2 Course Description

This course traces the evolution of network security products from simple to sophisticated over time as organizations encountered increasingly complex cyberattacks. The self-paced course takes approximately 2 hours to complete and covers various cybersecurity topics including cloud security, endpoint security, firewalls, network access control, sandboxes, SASE, SD-WAN, secure email gateways, security information and event management, SOAR, threat intelligence services, web application firewalls, web filters, Wi-Fi, and ZTNA. Upon completion, participants will be able to identify network security products and explain how they protect networks and describe how network security technology has developed to counter evolving cyberthreats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Course Description

The Evolution of
Cybersecurity
In this course, you will learn about products that security vendors have created to
address cyberthreats. This course traces the evolution of network security
products from simple to sophisticated, as organizations encountered increasingly
complex cyberattacks.

Course Duration
l Self-paced course time (estimated): 2 hours

Who Should Attend


Anyone who wants to learn about cybersecurity and security products should attend this course.

Certification
To obtain the NSE 2 Network Security Associate certification, you must complete all of the lessons and quizzes in
this course.

After you complete this course, it may take up to an hour for your certificate to be available.

To download your certificate, do the following:

1. Log in to the Fortinet Training Institute website.


2. In the upper-right corner, click the down arrow of the user menu, and then click Profile.
3. On the profile page, in the Certifications section, in the NSE 2 Network Security Associate row, click Download
Certificate.
The NSE 2 certification is valid for two years from the date of completion.

5/27/2022

https://training.fortinet.com
NSE 2 The Evolution of Cybersecurity Course Description

Prerequisites Training Delivery Options


Fortinet recommends that you complete NSE 1 The Self-Paced Training
Threat Landscape before starting this course.
Online training videos and resources are available
through the Fortinet Training Institute library, free of
Agenda charge.

1. Cloud Security
2. Endpoint Security
Program Policies and FAQs
3. Firewall For questions about courses, certification, or training
4. Network Access Control products, refer to Program Policy Guidelines or
5. Sandbox Frequently Asked Questions.
6. SASE
7. SD-WAN
8. Secure Email Gateway
9. Security Information & Event Management
10. SOAR
11. Threat Intelligence Services
12. Web Application Firewall
13. Web Filter
14. Wi-Fi
15. ZTNA

Objectives
After completing this course, you will be able to:
l Identify network security products and explain how they
protect networks
l Describe how network security technology has developed
to counter evolving cyberthreats

You might also like