<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="24678" language="de" source="https://portal.flane.ch/swisscom/xml-course/fortinet-fort-siem" lastchanged="2026-02-09T19:25:29+01:00" parent="https://portal.flane.ch/swisscom/xml-courses"><title>FortiSIEM Analyst</title><productcode>FORT-SIEM</productcode><vendorcode>FO</vendorcode><vendorname>Fortinet</vendorname><fullproductcode>FO-FORT-SIEM</fullproductcode><version>7.4</version><objective>&lt;p&gt;After completing this course, you should be able to:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe how FortiSIEM solves common cybersecurity challenges&lt;/li&gt;&lt;li&gt;Describe the main components and the unique database architecture on FortiSIEM&lt;/li&gt;&lt;li&gt;Perform real-time and historical searches&lt;/li&gt;&lt;li&gt;Define structured search operators and search conditions&lt;/li&gt;&lt;li&gt;Reference the CMDB data in structured searches&lt;/li&gt;&lt;li&gt;Configure display fields and columns&lt;/li&gt;&lt;li&gt;Build queries from search results and events&lt;/li&gt;&lt;li&gt;Build nested queries and lookup tables&lt;/li&gt;&lt;li&gt;Build rule subpatterns and conditions&lt;/li&gt;&lt;li&gt;Manage and tune incidents&lt;/li&gt;&lt;li&gt;Resolve an incident&lt;/li&gt;&lt;li&gt;Create time-based and pattern-based clear conditions&lt;/li&gt;&lt;li&gt;Configure automation policies&lt;/li&gt;&lt;li&gt;Create rules using baselines&lt;/li&gt;&lt;li&gt;Analyze anomalies against baselines&lt;/li&gt;&lt;li&gt;Describe the threat hunting workflow&lt;/li&gt;&lt;li&gt;Analyze threat hunting dashboards&lt;/li&gt;&lt;li&gt;Describe FortiSIEM ML modes and algorithms&lt;/li&gt;&lt;li&gt;Describe how to train an ML model perform an analysis using a ML model&lt;/li&gt;&lt;li&gt;Describe the benefits of deploying FortiSIEM UEBA&lt;/li&gt;&lt;li&gt;Configure tags, rules, and incidents using UEBA data&lt;/li&gt;&lt;li&gt;Describe how ZTNA tags affect the FortiSIEM incident and remediation process&lt;/li&gt;&lt;li&gt;Configure a ZTNA tag using FortiSIEM to remediate incidents&lt;/li&gt;&lt;li&gt;Generate and export a report&lt;/li&gt;&lt;li&gt;Create a custom dashboard&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;You must have an understanding of the topics covered in the following courses, or have equivalent experience:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;FortiGate Operator&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;attentionbbcode&quot; title=&quot;course: FO-FSM-ADM&quot;&gt;!&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;Security professionals responsible for the detection, analysis, and remediation of security incidents using FortiSIEM should attend this course.&lt;/p&gt;</audience><outline>&lt;ul&gt;
&lt;li&gt;1. Introduction to FortiSIEM&lt;/li&gt;&lt;li&gt;2. Analytics&lt;/li&gt;&lt;li&gt;3. Nested Queries and Lookup Tables&lt;/li&gt;&lt;li&gt;4. Rules and Subpatterns&lt;/li&gt;&lt;li&gt;5. Incidents&lt;/li&gt;&lt;li&gt;6. Clear Conditions and Remediation&lt;/li&gt;&lt;li&gt;7. Threat Hunting&lt;/li&gt;&lt;li&gt;8. Performance Metrics and Baselines&lt;/li&gt;&lt;li&gt;9. Machine Learning&lt;/li&gt;&lt;li&gt;10. User and Entity Behavior Analytics&lt;/li&gt;&lt;li&gt;11. FortiSIEM ZTNA&lt;/li&gt;&lt;li&gt;12. Reports and Dashboards&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>After completing this course, you should be able to:



- Describe how FortiSIEM solves common cybersecurity challenges
- Describe the main components and the unique database architecture on FortiSIEM
- Perform real-time and historical searches
- Define structured search operators and search conditions
- Reference the CMDB data in structured searches
- Configure display fields and columns
- Build queries from search results and events
- Build nested queries and lookup tables
- Build rule subpatterns and conditions
- Manage and tune incidents
- Resolve an incident
- Create time-based and pattern-based clear conditions
- Configure automation policies
- Create rules using baselines
- Analyze anomalies against baselines
- Describe the threat hunting workflow
- Analyze threat hunting dashboards
- Describe FortiSIEM ML modes and algorithms
- Describe how to train an ML model perform an analysis using a ML model
- Describe the benefits of deploying FortiSIEM UEBA
- Configure tags, rules, and incidents using UEBA data
- Describe how ZTNA tags affect the FortiSIEM incident and remediation process
- Configure a ZTNA tag using FortiSIEM to remediate incidents
- Generate and export a report
- Create a custom dashboard</objective_plain><essentials_plain>You must have an understanding of the topics covered in the following courses, or have equivalent experience:



- FortiGate Operator
- (!)</essentials_plain><audience_plain>Security professionals responsible for the detection, analysis, and remediation of security incidents using FortiSIEM should attend this course.</audience_plain><outline_plain>- 1. Introduction to FortiSIEM
- 2. Analytics
- 3. Nested Queries and Lookup Tables
- 4. Rules and Subpatterns
- 5. Incidents
- 6. Clear Conditions and Remediation
- 7. Threat Hunting
- 8. Performance Metrics and Baselines
- 9. Machine Learning
- 10. User and Entity Behavior Analytics
- 11. FortiSIEM ZTNA
- 12. Reports and Dashboards</outline_plain><duration unit="d" days="3">3 Tage</duration><pricelist><price country="PL" currency="EUR">2220.00</price><price country="US" currency="USD">2900.00</price><price country="CA" currency="CAD">4000.00</price></pricelist><miles/></course>