FT-FGSEC FortiGate Security

by Fast Lane Computer Consultancy

Participants should have a thorough understanding of all the topics covered in FortiGate Security before attending the FortiGate Infrastructure course.

Price : Enquire Now

Contact the Institutes

Fill this form
Fast Lane Computer Consultancy Logo

img Duration

3 Days

Course Details

Who Should Attend

Network and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks .

Participants should have a thorough understanding of all the topics covered in FortiGate Security before attending the FortiGate Infrastructure course.

Course Content

In this three day course, you will learn how to use basic FortiGate features, including security profiles.
In interactive labs, you will explore firewall policies, user authentication, SSL, VPN, dial-up IPsec, VPN, and how to protect your network using security profiles

such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security.

Prerequisites

• Knowledge of network protocols

• Basic understanding of firewall concepts

Course Objectives

After completing these courses, you will be able to:
• Deploy the appropriate operation mode for your network
• Use the GUI and CLI for adminitstration
• Identify the characteristics of the Fortinet security fabric
• Control network access to configured networks using firewall policies
• Apply port forwarding, source NAT, and destination NAT
• Authenticate users using firewall policies
• Understand excryption functions and certificates
• Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies

• Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites
• Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports
• Fight hacking and denial of service (DoS)
• Defend against data leaks by identifying files with sensitive data, and block them for leaving your private network
• Offer an SSL VPN for secure access to your private network
• Implement a dialup IPsec VPN tunnel between FortiGate and FortiClient
• Collect and interpret log entries

Course Outline

• Introduction to FortiGate and the Security Fabric
• Firewall policies
• Network Address Translation (NAT)
• Firewall Authentication
• Logging and Monitoring
• Certificate Operations
• Web Filtering

• Application Control
• Antivirus
• Intrusion Prevention and Denial of Service
• SSL VPN
• Dialup IPsec VPN
• Data Leak Prevention (DLP)

Who are We?

We can help your company gain and develop all the technology skills it needs to rise to high-end challenges. After all, technology is the tool and only those who master it can capitalize on its benefits. Our customers and partners rely on us, and for very good reasons.

  • Dubai Knowledge Park Branch

    Block 17 1st Floor PO Box 53941, Dubai Knowledge Park, Dubai

Check out more Fortinet courses in UAE

Global Business Advisors (Corporate Training Providers) Logo

Principles and Practices of Cyber Security

Learn about cybersecurity and understand the key role it plays in every business to protect sensitive data, intellectual property, personal information, data, and other important information from damage and theft by adversaries and criminals

by Global Business Advisors (Corporate Training Providers)
  • Price
  • Start Date
  • Duration
Career Turn Training & Skills Development Logo

IT Security

This is an interesting training that takes into account the latest epidemic of cybercrime & its control/prevention mechanism. This training includes learning and covering key areas like IT Security fundamentals and penetration testing.

by Career Turn Training & Skills Development
Keygains MATT Logo

Certified Information Security Manager (CISM)

This comprehensive CISM training focuses on the construction, development, and governance of information security operations. This qualification demonstrates your ability and understanding of information security management. 

by Keygains MATT
Mesk Management Sciences Institute Logo

Certified Information Security Manager CISM

'Certified Information Security Manager' training is offered by Mesk Management Sciences Institute. Kindly contact us to inquire and find out about the schedule and complete outline.

by Mesk Management Sciences Institute
IP Rulers Computer Training Logo

CISSP

Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive re

by IP Rulers Computer Training
  • Price
  • Start Date
  • Duration

© 2024 www.coursetakers.ae All Rights Reserved. Terms and Conditions of use | Privacy Policy