Organizations and individuals today are surrounded by devices from laptops, smartphones and tablets to servers, virtual instances, IoT devices and industrial systems of all kinds. Unknown, Unprotected and Vulnerable systems as well as devices significantly expand your attack surface. Organizations today lack to discover and identify such systems in real time hence they lead to breach. 

Security Starts With Visibility and Detection. Visibility is the key in defending any valuable business network.

Organizations are now adopting Network Access Control Technologies to detect rouge, unprotected, vulnerable systems in real time which also allow to restrict access of such unauthorized as well as non-compliant devices.

Course Overview 

During this program you get the opportunity to learn the leading Network Access Control (NAC) System from Forescout. Forescout Technologies is the leader in device visibility and control. Our unified security platform enables enterprises and government agencies to gain complete situational awareness of their extended enterprise environment and orchestrate actions to reduce cyber and operational risk.

Course Duration – 24 Hour

Prerequisites for participation

  • Network communication, network structure, TCP/IP, Subnetting, Switching & Wireless fundamentals.
  • Windows Active Directory, DHCP, Email and DNS functions.

Course Outline

  • Introduction – A brief discussion and  introduction about  concepts of Network Access Control.
  • Product Architecture – Understand how it works, what it does and its components  including planning deployment in the network with  layer 2 versus layer 3 modes, network integration and rollout strategies.
  • CounterACT Installation – Participants will perform installation & configuration of Forescout NAC such as integration with network switch, Active Directory integration, Email server and account management. 
  • Interface Walk Through – We take you through the product management console to illustrate features such as inventory, assets, policies, detections, dashboard, Plugins, Channel, Host Property Scanner, Switch,  reporting and others.
  • Classification- Learn how to classify network assets in Forescout CounterACT (NAC).
  • Policy Overview– Participants will get a foundational overview of how to create policies and how they function within the CounterACT console.You will learn to create policies to establish a network and endpoint compliance posture for a typical corporate environment.
  • Control/ Enforce – Learners will enforce a compliance posture by assigning network devices to Virtual Local Area Networks (VLANs) and Access Control Lists (ACLs), updating asset antivirus and patch levels, and enabling guest registration, ActiveResponse™ and Domain Name Service (DNS) Enforcement. 
  • CounterACT Host Management – Opportunity to configure Windows, Linux and network endpoints. In addition, you will perform housekeeping tasks such as backups and appliance updates. 
  • Troubleshooting – Learn troubleshooting tasks, commands and  how to capture logs. . 
Related Training

Information Security Management System ISMS

Information Security Management System (ISMS)

Implementer Professional for BS ISO/ IEC 27001:2013 Information Security Management System (ISMS)The International Organization for Standardization (ISO) is a global body that collects and manages various standards for different disciplines. The ISO 27001 standard is designed to function as a ...
Read More
Ethical-Hacking

Penetration Testing and Ethical Hacking

Course Overview Ethical hacking involves penetration testing where trained or experienced professionals attempt to penetrate a IT network or computer system as a service to the owner of the system to find security vulnerabilities which a hacker may be able ...
Read More
Network-Security-Abhiraksha.com

Network Security With Checkpoint Firewall

Course Overview We live in an age where technology is constantly changing and cyber threats are becoming harder to detect. Today unknown attacks too are rising in the count of thousands everyday and attacking every size of the organization. Organizations ...
Read More
System Protection - Abhiraksha.com

System Protection From Malwares

Course Duration - 18 hoursOur System Security training program will provide in-depth learning of protecting endpoint systems (desktop, laptop & server) with McAfee Endpoint security software from malware attacks.This course provides an in-depth understanding of the tasks crucial to set ...
Read More
Security Analyst - Abhiraksha.com

Security Analyst

Cybersecurity Analyst is one of the high demand job roles by the reputed organizations for their security positions.Course OverviewA security analyst is a member of network security operations team  and is responsible to monitor as well as perform cyber incident  ...
Read More

Network Access Control

Organizations and individuals today are surrounded by devices from laptops, smartphones and tablets to servers, virtual instances, IoT devices and industrial systems of all kinds. Unknown, Unprotected and Vulnerable systems as well as devices significantly expand your attack surface. Organizations today ...
Read More
Data Protection - Abhiraksha.com

Data Protection

Course OverviewThis course provides in-depth training to design, implement,configure, and use Endpoint Data Loss Prevention in order to protect business confidential data from intentional or unintentional leakage. We will discuss and explain how to monitor day-to-day end-user data transfer actions, ...
Read More

IT and Cybersecurity Fundamentals

Course Overview This course helps to learn information technology fundamentals which are outlined below and creates a broader understanding of IT concepts making it ideal for non-technical professionals such as beginners in this domain whether passed from school or graduated ...
Read More