Objectives
After completing this course, candidates will be able to:
- Train FortiDDoS to recognize their unique network patterns
- Choose the right FortiDDoS model
- Defend against both volumetric and mechanistic DDoS attacks
- Mitigate SYN floods
- Detect connections from proxies
- Inspect HTTP traffic on non-standard ports
- Deploy FortiDDoS to protect both network appliances and servers
- Describe how the blocking periods and penalty factors intelligently determine which packets will be dropped after an attack has been detected
- Implement bypass or a high availability FortiDDoS cluster for maximum service uptime
- Understand when to use detection and prevention modes
- Whitelist safe clients or servers
- Characterize different types of attacks by using logs and statistics graphs
- Troubleshoot incorrect threshold levels