ForeScout CounterACT
Objective
ForeScout CounterACT training is a four-day course featuring instruction and hands-on lab experiences in a simulated IT environment. Students learn and practice how to establish security policies using all of our available tools. Students will classify and control network assets in a network environment to observe first-hand how CounterACT monitors and protects an enterprise network. A typical four-day course includes the following.
- Security Administrators
- Security designers and architects
- Network Administrators
DAY 1
Chapter 1 – Introduction
This is a brief introduction to ForeScout’s vision and concepts of Network Access Control.
Chapter 2 – Terms and Architecture
This lesson introduces students to the commonly used terms such as plugin, segment, channel, organisational unit, and networking terms. We also cover the pre-requisites for a notional CounterAct deployment.
Chapter 3 – CounterACT installation
Participants configure CounterACT for installation in a practical network environment including configuring switch connectivity, Active Directory integration, and account management.
Chapter 4 – Console overview
This is a tour of the console to illustrate features and demonstrate navigation.
DAY 2
Chapter 5 – CounterACT configuration
Detailed instructions for configuring CounterACT independent from first-time login. Plugins, Channel, Host Property Scanner, Switch Observe and the configuration of CounterACT options.
Chapter 6 – CounterACT deployment
Students learn the best practices for a successful CounterACT deployment: including appliance locations, layer 2 versus layer 3 installation and network integration.
Chapter 7 – Policy overview
Students get a foundational overview of how policies are created and function within the CounterACT console.
Chapter 8 – Classification
Students learn how to classify network assets in CounterACT.
Chapter 9 – Clarification
The clarification chapter shows how to identify the management capabilities of the hosts, starting with established Classification groups.
DAY 3
Chapter 10 – Compliance
Students create policies to establish a network and endpoint compliance posture for a typical corporate environment.
Chapter 11 – Threat protection
Threat protection introduces students to the concept of ForeScout threat protection and deployment options for any CounterACT installation.
Chapter 12 – Control
Students enforce a compliance posture by assigning network devices to VLANs and ACLs, updating asset anti-virus and patch levels, and enabling guest registration.
Chapter 13 – CounterACT host management
Students configure Windows, Linux, and network endpoints with CounterACT. In addition, the student will perform housekeeping tasks such as backups and appliance updates.
DAY 4
Chapter 14 – CounterACT administration
Students work with CounterACT appliance and CounterACT enterprise manager administration; as well as console user management.
Chapter 15 – Inventory, Assets, Reporting, Dashboard
Students learn to use the inventory, assets portal, reporting, and dashboard.
Chapter 16 – Troubleshooting
This lesson introduces common troubleshooting methods used in a typical CounterACT deployment.
It is assumed that attendees possess background knowledge moderate of TCP/IP fundamentals
Duration: 4 Days
|