This 6-week study plan is designed to ensure you thoroughly understand the NSE7_OTS-7.2 exam topics while using effective learning strategies like the Pomodoro Technique for focused study sessions and spaced repetition based on the Forgetting Curve to improve long-term retention. Each week has clear goals, tasks, and timelines, structured for maximum efficiency and engagement.
Study Strategies
- Pomodoro Technique: Study in 25-minute focused intervals followed by 5-minute breaks. After every 4 sessions, take a 15-minute break.
- Spaced Repetition: Regularly review material you've already studied to reinforce memory.
- Active Learning: Take notes, summarize concepts, and practice hands-on labs instead of just reading.
- Mock Testing: Weekly quizzes to simulate exam conditions and identify weak points.
Study Goals
- Learn and internalize core concepts of the six knowledge areas:
- Asset Management
- Access Control
- Segmentation
- Protection
- Logging and Monitoring
- Risk Assessment
- Apply practical skills by configuring Fortinet tools and simulating real-world scenarios.
- Retain knowledge effectively through consistent review and self-assessment.
Week 1: Asset Management
Weekly Goals
- Understand the role and importance of Asset Management in OT security.
- Master asset discovery methods, categorization techniques, and monitoring practices.
- Practice creating an OT asset inventory and simulating monitoring scenarios.
Day 1: Introduction to Asset Management
Study Goals:
- Understand the definition of Asset Management and its importance in OT environments.
- Learn about asset discovery methods and their application.
Tasks:
- Read and Understand Core Concepts:
- What is Asset Management?
- Challenges in discovering OT assets (e.g., legacy devices, protocol variety).
- Research Discovery Techniques:
- Compare passive vs. active discovery methods.
- Write a brief note on the pros/cons of both.
- Practical:
- Use a network topology map (real or simulated) to identify devices and document their roles.
Day 2: Asset Discovery Tools
Study Goals:
- Explore tools used for asset discovery, focusing on FortiNAC.
- Simulate a basic asset discovery process.
Tasks:
- Tool Overview:
- Read about FortiNAC and its capabilities.
- Research real-world examples of OT asset discovery using FortiNAC.
- Hands-On Practice:
- If available, simulate an asset discovery process using a demo network or write steps on how to configure FortiNAC for discovery.
- Document Insights:
- List protocols like Modbus, DNP3, and BACnet that FortiNAC can detect.
Day 3: Asset Categorization
Study Goals:
- Learn how to classify OT assets by type and risk level.
- Develop a framework for critical vs. non-critical asset identification.
Tasks:
- Study Categorization:
- Write definitions for key asset types (e.g., SCADA, PLC, HMI).
- Define risk levels (Critical, Medium, Low) and their criteria.
- Exercise:
- Create a mock OT network with 10 devices.
- Assign roles and risk levels to each device in a table.
- Review Material:
- Create flashcards for asset types and risk levels.
Day 4: Asset Inventory
Study Goals:
- Learn what information should be included in an asset inventory.
- Create a sample OT asset inventory.
Tasks:
- Research Inventory Requirements:
- List essential inventory fields (Device Name, IP, MAC, Firmware, etc.).
- Understand the importance of patch tracking.
- Practical:
- Build an asset inventory in Excel, including:
- Device names, IP addresses, firmware versions, and risk levels.
- Simulate adding and removing devices.
- Document Insights:
- Write a short note on the role of CMDB integration in asset management.
Day 5: Asset Monitoring
Study Goals:
- Understand continuous monitoring of asset health and status.
- Learn how to detect and respond to unauthorized devices.
Tasks:
- Study Monitoring Concepts:
- Read about tools that provide asset monitoring.
- Understand alerting mechanisms for unauthorized device detection.
- Scenario Practice:
- Write a hypothetical scenario where an unauthorized device connects to the network.
- Describe the steps to handle this alert.
- Summarize Findings:
- Create a flowchart showing how asset monitoring works in an OT network.
Day 6: Weekly Review
Study Goals:
- Consolidate understanding of Asset Management concepts.
- Reinforce key terms and practical steps.
Tasks:
- Review Notes:
- Revisit definitions, tools, and processes studied during the week.
- Quiz:
- Take a 10-question self-quiz covering discovery, categorization, inventory, and monitoring.
- Hands-On Practice:
- Repeat one practical task from earlier days to reinforce understanding.
Day 7: Weekly Summary and Assessment
Study Goals:
- Summarize the week’s learning in a structured format.
- Assess progress through a practice test and hands-on exercises.
Tasks:
- Create a One-Page Summary:
- List key takeaways for Asset Management.
- Include a diagram of an OT asset map and inventory.
- Mock Task:
- Imagine you are an OT administrator. Write steps for discovering and categorizing new devices in a factory.
- Take a Quiz:
- Attempt a 15-question quiz on Asset Management.
- Reflect:
- Identify areas needing more attention and plan a quick review session for next week.
Deliverables for Week 1:
- A complete sample asset inventory (Excel or similar).
- Flashcards summarizing key concepts and terms.
- Quiz results and notes on areas needing improvement.
Week 2: Access Control
Weekly Goals
- Develop a comprehensive understanding of Access Control mechanisms.
- Learn how to configure Role-Based Access Control (RBAC) and device authentication.
- Understand secure remote access strategies and their practical application.
- Practice logging, monitoring, and auditing access activities.
Day 8: Introduction to Access Control
Study Goals:
- Understand the definition and importance of Access Control in OT networks.
- Learn the basics of Role-Based Access Control (RBAC).
Tasks:
- Read and Understand:
- Define Access Control and RBAC.
- Learn the principle of least privilege and why it’s critical.
- RBAC Study:
- Identify typical OT roles (e.g., Operators, Engineers, Administrators).
- Write a table mapping roles to permissions.
- Visualize:
- Draw a flowchart showing how access decisions are made based on roles.
- Reflection:
- Write a short paragraph explaining how improper access can lead to security incidents.
Day 9: Device Authentication
Study Goals:
- Learn device authentication methods, such as MAC binding and digital certificates.
- Understand protocol authentication for industrial environments.
Tasks:
- Research:
- Read about MAC address binding and its application.
- Study the use of digital certificates in OT authentication.
- Exercise:
- Write down the steps for configuring MAC address binding on FortiGate.
- Create a hypothetical scenario where a device needs a digital certificate to connect.
- Diagram:
- Draw a diagram showing how device authentication works (e.g., Device → Authentication Server → Network Access).
- Summary:
- Summarize how authentication methods strengthen access security.
Day 10: Secure Remote Access
Study Goals:
- Understand secure remote access techniques, including VPNs and Multi-Factor Authentication (MFA).
- Learn the importance of session logging and monitoring.
Tasks:
- Study:
- Read about secure remote access protocols.
- Learn the benefits of MFA in OT environments.
- Practical:
- Write a step-by-step guide to setting up a secure VPN connection.
- Simulate or research configuring MFA for remote access.
- Scenario Practice:
- Write a scenario describing how a technician accesses OT systems remotely using VPN and MFA.
- Reflection:
- Write a short explanation of why session logging is crucial for accountability.
Day 11: Access Logs and Auditing
Study Goals:
- Understand the purpose of access logs.
- Learn how to audit access logs to identify suspicious activities.
Tasks:
- Research:
- Study how access logs are configured in FortiGate.
- Understand what should be included in an audit trail (e.g., user ID, device, time, activity).
- Practical:
- Write a sample log entry for an operator accessing a SCADA system.
- Create a list of log fields that are essential for compliance.
- Reflect:
- Write an explanation of how access logs support incident investigation and compliance.
Day 12: Hands-On Configuration
Study Goals:
- Apply theoretical knowledge to configure RBAC and secure remote access.
- Review all studied topics through practical tasks.
Tasks:
- RBAC Practice:
- Use a lab environment (real or simulated) to:
- Create roles (e.g., Operator, Engineer) and assign permissions.
- Test role restrictions by attempting unauthorized actions.
- Secure Remote Access Practice:
- Configure a mock VPN connection with MFA.
- Simulate remote session logging.
- Reflection:
- Write a summary of the challenges faced and lessons learned during configuration.
Day 13: Weekly Review
Study Goals:
- Reinforce key concepts of Access Control.
- Identify areas requiring additional review.
Tasks:
- Review Notes:
- Go through notes on RBAC, device authentication, secure access, and logs.
- Create Flashcards:
- Summarize key terms (e.g., RBAC, MFA, VPN) in flashcards.
- Quiz:
- Attempt a 15-question self-quiz on Access Control.
- Reflect:
- Write down 3 key takeaways from this week’s learning.
Day 14: Weekly Assessment
Study Goals:
- Assess knowledge through a mock task and quiz.
- Prepare for the next week’s topic by identifying weak areas.
Tasks:
- Mock Task:
- Imagine you are an OT administrator implementing RBAC and secure remote access for a new site:
- List roles and permissions.
- Outline steps for configuring VPN with MFA.
- Explain how access logs will be reviewed weekly.
- Quiz:
- Take a 20-question quiz covering all aspects of Access Control.
- Plan Ahead:
- Based on quiz results, list topics to revisit during next week’s review.
Deliverables for Week 2:
- Completed mock tasks for RBAC, device authentication, and remote access.
- Flashcards summarizing Access Control concepts.
- Notes and flowcharts visualizing Access Control mechanisms.
Week 3: Segmentation
Weekly Goals
- Understand network segmentation techniques, including zone-based segmentation, VLANs, and IP-based subnets.
- Learn Zero Trust Architecture and industrial protocol protection.
- Practice hands-on configurations for segmenting OT networks and controlling traffic.
Day 15: Zone-Based Segmentation
Study Goals:
- Understand the principles of zone-based segmentation and conduits.
- Learn how to align segmentation with the ISA-99/IEC 62443 framework.
Tasks:
- Research:
- Read about zones and conduits in ISA-99/IEC 62443.
- Learn why zones need different security levels (e.g., trusted vs. untrusted).
- Visualization:
- Create a diagram with three zones:
- Zone 1: SCADA system.
- Zone 2: PLCs and sensors.
- Zone 3: Corporate IT systems.
- Add conduits showing controlled communication between zones.
- Reflection:
- Write a short explanation of how segmentation reduces risks in OT environments.
Day 16: Micro-Segmentation with VLANs
Study Goals:
- Learn how VLANs create logical subnets within a single network.
- Understand VLAN tagging and traffic isolation.
Tasks:
- Research:
- Study how VLANs work and their benefits in OT segmentation.
- Learn about VLAN tagging (802.1Q standard).
- Hands-On Practice:
- Write a step-by-step guide for creating VLANs:
- Assign devices (e.g., PLCs, HMIs) to VLANs.
- Configure a VLAN for SCADA traffic in a simulator or document the configuration steps.
- Diagram:
- Create a flowchart showing VLAN traffic paths (e.g., traffic from SCADA VLAN to PLC VLAN).
- Summary:
- Write a paragraph explaining how VLANs prevent lateral movement of threats.
Day 17: IP-Based Segmentation
Study Goals:
- Understand how to divide networks into subnets using IP-based segmentation.
- Learn subnetting basics and how to design OT subnets.
Tasks:
- Study:
- Review subnetting basics: IP ranges, subnet masks, and CIDR notation.
- Learn why IP-based segmentation enhances visibility and control in OT networks.
- Hands-On Practice:
- Design a subnet plan for an OT network with three subnets:
- Subnet A: SCADA servers.
- Subnet B: PLCs.
- Subnet C: Engineering workstations.
- Document IP ranges and subnet masks.
- Reflection:
- Write a short note explaining how IP-based segmentation complements VLANs.
Day 18: Zero Trust Architecture
Study Goals:
- Understand Zero Trust principles and their application in OT networks.
- Learn how to implement dynamic access controls in a Zero Trust model.
Tasks:
- Research:
- Study the "never trust, always verify" approach of Zero Trust.
- Learn how dynamic access controls ensure secure communication.
- Scenario Practice:
- Imagine a Zero Trust network where:
- Each device must authenticate before communicating.
- Write steps to implement this using FortiGate or similar tools.
- Summary:
- Write a paragraph comparing traditional segmentation to Zero Trust segmentation.
Day 19: Industrial Protocol Protection
Study Goals:
- Learn how to restrict protocol communication across zones.
- Understand the importance of validating and monitoring protocol traffic.
Tasks:
- Study:
- Research industrial protocols like Modbus, DNP3, and OPC UA.
- Learn about risks associated with protocol misuse.
- Practical:
- Write a step-by-step guide for:
- Allowing Modbus traffic only between specific devices using FortiGate rules.
- Blocking unauthorized protocol requests.
- Diagram:
- Create a flowchart showing how traffic flows between zones for Modbus and how unauthorized traffic is blocked.
Day 20: Hands-On Practice
Study Goals:
- Apply theoretical knowledge to configure VLANs and protocol filtering.
- Review previous concepts for consolidation.
Tasks:
- VLAN Configuration:
- Configure VLANs for a simulated OT network.
- Test traffic isolation between VLANs.
- Protocol Filtering:
- Create and test a rule to restrict DNP3 traffic to a specific zone.
- Reflection:
- Write a summary of challenges faced and solutions applied during configuration.
Day 21: Weekly Review and Assessment
Study Goals:
- Consolidate knowledge of segmentation concepts.
- Test understanding through a quiz and mock scenarios.
Tasks:
- Review Notes:
- Go through notes on zone-based segmentation, VLANs, IP subnets, and Zero Trust.
- Use flashcards to reinforce key concepts.
- Mock Task:
- Design a segmented network for a factory with:
- A SCADA zone.
- A PLC zone.
- An engineering zone.
- Include VLANs and IP-based segmentation.
- Quiz:
- Attempt a 20-question quiz covering all aspects of segmentation.
- Reflection:
- Identify any weak areas and plan a quick review session next week.
Deliverables for Week 3:
- Completed diagrams for zone-based segmentation, VLAN traffic paths, and protocol protection flows.
- A subnet plan for an OT network.
- Flashcards summarizing segmentation and Zero Trust principles.
- Quiz results and mock task designs.
Week 4: Protection
Weekly Goals
- Learn how to safeguard OT networks against external and internal threats.
- Master industrial protocol protection using DPI and IPS.
- Understand and implement application control and device patch management.
- Practice configuring protection mechanisms using Fortinet tools.
Day 22: Introduction to Protection
Study Goals:
- Understand the importance of protection mechanisms in OT security.
- Learn about Deep Packet Inspection (DPI) and how it secures industrial protocols.
Tasks:
- Read Core Concepts:
- Define protection in OT security.
- Learn what DPI is and how it analyzes protocol traffic.
- Research Protocol Risks:
- Study examples of attacks exploiting Modbus or OPC UA.
- Write a short summary of why protocol protection is critical in OT environments.
- Practical:
- Write steps for enabling DPI on FortiGate to monitor industrial traffic.
- Reflection:
- Describe in your own words how DPI prevents malicious command injections.
Day 23: Intrusion Prevention Systems (IPS)
Study Goals:
- Understand how IPS works to detect and block threats in OT networks.
- Learn about protocol-specific signatures and their configuration.
Tasks:
- Research:
- Study the functionality of IPS in detecting known vulnerabilities.
- Learn about protocol-specific IPS signatures for Modbus, DNP3, and OPC UA.
- Hands-On Practice:
- Simulate configuring IPS on FortiGate:
- Enable an IPS profile.
- Add rules to block suspicious traffic based on protocol signatures.
- Reflection:
- Write a step-by-step guide for using IPS to secure Modbus communication.
Day 24: Application Control
Study Goals:
- Learn how to restrict applications in OT environments.
- Understand how application control blocks unauthorized or high-risk applications.
Tasks:
- Study Application Control:
- Research how FortiGate manages application control policies.
- Learn about the difference between whitelisting and blacklisting applications.
- Scenario Practice:
- Simulate creating a whitelist for OT-approved applications.
- Write rules for blocking unapproved applications (e.g., gaming software).
- Reflection:
- Write a short note explaining how application control enhances OT security.
Day 25: Device Patch Management
Study Goals:
- Learn the importance of keeping OT devices updated with the latest patches.
- Understand virtual patching for legacy systems.
Tasks:
- Research:
- Study challenges in patching OT devices.
- Learn how virtual patching works when updates are not feasible.
- Practical:
- Simulate a scenario where:
- A legacy PLC cannot be updated.
- Use virtual patching to block an exploit targeting the device.
- Summary:
- Write a short explanation of the steps involved in creating a virtual patch.
Day 26: Hands-On Practice
Study Goals:
- Apply knowledge of DPI, IPS, and application control in a simulated environment.
- Review all previously studied concepts.
Tasks:
- DPI and IPS:
- Configure DPI to monitor Modbus traffic and block unauthorized commands.
- Test IPS rules against simulated attacks on OT protocols.
- Application Control:
- Configure a whitelist for SCADA-related applications.
- Test the system by attempting to run a blocked application.
- Reflection:
- Document the configurations and results in a lab report.
Day 27: Advanced Protection Scenarios
Study Goals:
- Learn how to combine multiple protection mechanisms for enhanced security.
- Simulate a real-world OT protection scenario.
Tasks:
- Scenario Practice:
- Design a protection strategy for a factory:
- Include DPI, IPS, application control, and patch management.
- Describe how these mechanisms work together to secure the network.
- Practical:
- Configure and test a layered security approach in a simulator or lab.
- Reflection:
- Write a one-page report summarizing the scenario and outcomes.
Day 28: Weekly Review and Assessment
Study Goals:
- Consolidate knowledge of protection mechanisms.
- Test understanding through a quiz and practical tasks.
Tasks:
- Review Notes:
- Revisit definitions and configurations for DPI, IPS, application control, and patch management.
- Use flashcards to reinforce key terms.
- Mock Task:
- Simulate an incident where:
- An attacker tries to exploit a vulnerability in Modbus.
- Write steps for using IPS and virtual patching to mitigate the attack.
- Quiz:
- Attempt a 25-question quiz on Protection concepts and configurations.
- Reflection:
- Identify areas for improvement and plan a quick review session next week.
Deliverables for Week 4:
- Configured DPI and IPS profiles for protocol protection.
- Application control policies and a virtual patching plan.
- Diagrams showing layered security strategies.
- Quiz results and notes summarizing the week’s key concepts.
Week 5: Logging and Monitoring
Weekly Goals
- Understand how to log and monitor OT network activities in real-time.
- Learn to detect security threats and anomalies through log analysis.
- Practice configuring logging and monitoring tools like FortiAnalyzer and FortiSIEM.
- Develop incident response strategies based on monitored data.
Day 29: Introduction to Logging
Study Goals:
- Understand the importance of logging in OT security.
- Learn what information should be logged and how logs are stored securely.
Tasks:
- Research Logging Basics:
- Study why logging is critical in OT environments.
- Learn about key data points to log (e.g., user logins, device access, anomalies).
- Practical:
- Write down examples of log entries, such as:
- A successful user login.
- A failed login attempt from an unauthorized device.
- Simulate or write steps to configure logging on FortiGate.
- Reflection:
- Summarize why secure log storage is necessary for forensic analysis.
Day 30: Real-Time Monitoring
Study Goals:
- Learn how to monitor OT networks for performance and traffic patterns.
- Understand how to configure alerts for anomalies.
Tasks:
- Study Monitoring Concepts:
- Learn about real-time monitoring and its benefits.
- Understand how alert thresholds are set for unusual activities (e.g., excessive traffic, repeated login failures).
- Scenario Practice:
- Imagine a scenario where abnormal traffic is detected:
- Write steps for identifying the root cause using monitoring tools.
- Reflection:
- Write a short note explaining the role of monitoring in early threat detection.
Day 31: Threat Detection
Study Goals:
- Learn how to use logs to identify potential threats and attack patterns.
- Understand the importance of correlating events for accurate detection.
Tasks:
- Study Threat Detection:
- Learn how to analyze logs for anomalies, such as unusual IP addresses or failed login attempts.
- Study how FortiSIEM correlates events from multiple devices.
- Scenario Practice:
- Write an example of an attack pattern (e.g., brute force login attempts) and how it appears in logs.
- Simulate using FortiAnalyzer to identify this pattern.
- Reflection:
- Summarize how event correlation improves threat detection accuracy.
Day 32: Incident Response Using Logs
Study Goals:
- Learn how to configure automated responses based on monitoring and log data.
- Understand the steps to investigate and respond to incidents.
Tasks:
- Study Incident Response:
- Learn the steps for investigating incidents using logs.
- Study how to configure automated responses like blocking suspicious traffic or notifying administrators.
- Practical:
- Simulate an incident response scenario:
- A device triggers repeated alerts for unauthorized access.
- Document steps to block the device and notify the security team.
- Reflection:
- Write a short report explaining the role of logs in supporting incident response.
Day 33: FortiAnalyzer and FortiSIEM
Study Goals:
- Learn the capabilities of FortiAnalyzer for centralized log management.
- Understand how FortiSIEM helps correlate events and detect security threats.
Tasks:
- Research Tools:
- Study how FortiAnalyzer collects and manages logs from multiple devices.
- Learn how FortiSIEM correlates logs to identify complex threats.
- Hands-On Practice:
- Simulate or research how to:
- Configure FortiAnalyzer for log collection.
- Set up FortiSIEM to generate alerts for correlated events.
- Reflection:
- Write a summary comparing the functions of FortiAnalyzer and FortiSIEM.
Day 34: Advanced Monitoring and Threat Scenarios
Study Goals:
- Apply logging and monitoring knowledge in simulated threat scenarios.
- Develop a deeper understanding of proactive monitoring.
Tasks:
- Scenario Practice:
- Design a monitoring strategy for an OT network:
- Include log collection, alert thresholds, and event correlation.
- Simulate detecting and mitigating an attack using logs.
- Reflection:
- Write a report on lessons learned and strategies to improve monitoring.
Day 35: Weekly Review and Assessment
Study Goals:
- Consolidate knowledge of logging and monitoring.
- Test understanding through a quiz and mock tasks.
Tasks:
- Review Notes:
- Revisit summaries and diagrams on logging, monitoring, and threat detection.
- Use flashcards to reinforce key concepts.
- Mock Task:
- Simulate detecting and responding to a DDoS attack using logs and monitoring tools.
- Quiz:
- Take a 30-question quiz covering all aspects of logging and monitoring.
- Reflection:
- Identify areas needing improvement and plan a review session for next week.
Deliverables for Week 5:
- Simulated logs and monitoring reports for specific scenarios.
- Configurations for FortiAnalyzer and FortiSIEM.
- Flashcards summarizing logging and monitoring concepts.
- Quiz results and notes highlighting areas for improvement.
Week 6: Risk Assessment and Final Preparation
Weekly Goals
- Master the processes of risk identification, evaluation, mitigation, and response in OT networks.
- Learn how to generate risk assessment reports using tools like FortiAnalyzer and FortiSIEM.
- Consolidate knowledge from all six exam topics and prepare for the final exam.
- Take full-length mock exams to assess readiness and refine weak areas.
Day 36: Risk Identification
Study Goals:
- Understand how to identify potential risks in OT environments.
- Learn to differentiate between external and internal threats.
Tasks:
- Research Risk Categories:
- Study external threats like malware, ransomware, and DDoS attacks.
- Understand internal threats such as privilege misuse and misconfigurations.
- Scenario Practice:
- Create a list of potential risks for a sample OT environment (e.g., a power plant or factory).
- Identify which risks are external and which are internal.
- Reflection:
- Write a short explanation of why identifying risks is the first step in mitigating them.
Day 37: Risk Evaluation
Study Goals:
- Learn how to evaluate risks using a risk matrix.
- Understand how to conduct vulnerability scans for OT systems.
Tasks:
- Study Risk Evaluation:
- Read about risk matrices and their components (likelihood vs. impact).
- Research vulnerability scanning tools like Nessus or FortiAnalyzer.
- Practical:
- Create a mock risk matrix for a sample OT network:
- Assign scores to risks based on likelihood and impact.
- Prioritize risks for mitigation.
- Simulate or write steps for conducting a vulnerability scan.
- Reflection:
- Write a short note on how vulnerability scanning supports risk evaluation.
Day 38: Risk Mitigation
Study Goals:
- Understand strategies for mitigating risks in OT networks.
- Learn how to use firewalls, patch management, and segmentation to reduce risks.
Tasks:
- Study Mitigation Techniques:
- Learn how to prioritize critical assets for protection.
- Study the role of firewalls and virtual patching in risk reduction.
- Scenario Practice:
- Write a mitigation plan for the highest-priority risk from your mock risk matrix.
- Include specific steps like configuring firewall rules or applying patches.
- Reflection:
- Summarize how mitigation efforts reduce the overall risk profile of an OT environment.
Day 39: Incident Response Planning
Study Goals:
- Learn how to develop an incident response plan for OT networks.
- Understand the steps involved in detecting, containing, eradicating, and recovering from incidents.
Tasks:
- Research Incident Response:
- Study the key phases of incident response:
- Detection, containment, eradication, recovery, and post-incident review.
- Practical:
- Write an incident response plan for a scenario where a SCADA server is under a ransomware attack.
- Include automated responses, manual containment steps, and recovery actions.
- Reflection:
- Write a summary of lessons learned from studying incident response planning.
Day 40: FortiAnalyzer and FortiSIEM for Risk Assessment
Study Goals:
- Learn how to generate risk assessment reports using FortiAnalyzer and FortiSIEM.
- Understand how to use these tools to prioritize and manage risks.
Tasks:
- Research Tools:
- Study how FortiAnalyzer collects data for risk reporting.
- Learn how FortiSIEM correlates logs to detect risks and vulnerabilities.
- Hands-On Practice:
- Simulate or research how to:
- Generate a risk report in FortiAnalyzer.
- Create an alert in FortiSIEM for a high-priority risk.
- Reflection:
- Write a short comparison of FortiAnalyzer and FortiSIEM for risk management.
Day 41: Mock Exam 1
Study Goals:
- Assess overall understanding of all six exam topics.
- Identify weak areas and create a revision plan.
Tasks:
- Mock Exam:
- Take a full-length mock exam (60 minutes, 35 questions).
- Analysis:
- Review incorrect answers and categorize them by topic.
- Note weak areas for further review.
- Reflection:
- Write a short list of specific topics to revisit.
Day 42: Mock Exam 2 and Final Review
Study Goals:
- Solidify knowledge and boost confidence for the real exam.
- Create a final checklist for exam day.
Tasks:
- Mock Exam:
- Take a second full-length mock exam under timed conditions.
- Final Review:
- Revisit notes, flashcards, and diagrams for weak areas identified in mock exams.
- Summarize key points from each topic into a quick-reference sheet.
- Exam Day Preparation:
- Write down exam strategies (e.g., time management, prioritizing known answers).
- Ensure all study materials are organized for quick last-minute review.
Deliverables for Week 6:
- Completed risk matrix and mitigation plan.
- Incident response plan for a ransomware scenario.
- Risk assessment reports generated using FortiAnalyzer or FortiSIEM.
- Results and analysis from two mock exams.
- Final quick-reference sheet summarizing all key concepts.