FT-FGSEC FortiGate Security

by Fast Lane Computer Consultancy

Participants should have a thorough understanding of all the topics covered in FortiGate Security before attending the FortiGate Infrastructure course.

Price : Enquire Now

Contact the Institutes

Fill this form
Fast Lane Computer Consultancy Logo

img Duration

3 Days

Course Details

Who Should Attend

Network and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks .

Participants should have a thorough understanding of all the topics covered in FortiGate Security before attending the FortiGate Infrastructure course.

Course Content

In this three day course, you will learn how to use basic FortiGate features, including security profiles.
In interactive labs, you will explore firewall policies, user authentication, SSL, VPN, dial-up IPsec, VPN, and how to protect your network using security profiles

such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security.

Prerequisites

• Knowledge of network protocols

• Basic understanding of firewall concepts

Course Objectives

After completing these courses, you will be able to:
• Deploy the appropriate operation mode for your network
• Use the GUI and CLI for adminitstration
• Identify the characteristics of the Fortinet security fabric
• Control network access to configured networks using firewall policies
• Apply port forwarding, source NAT, and destination NAT
• Authenticate users using firewall policies
• Understand excryption functions and certificates
• Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies

• Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites
• Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports
• Fight hacking and denial of service (DoS)
• Defend against data leaks by identifying files with sensitive data, and block them for leaving your private network
• Offer an SSL VPN for secure access to your private network
• Implement a dialup IPsec VPN tunnel between FortiGate and FortiClient
• Collect and interpret log entries

Course Outline

• Introduction to FortiGate and the Security Fabric
• Firewall policies
• Network Address Translation (NAT)
• Firewall Authentication
• Logging and Monitoring
• Certificate Operations
• Web Filtering

• Application Control
• Antivirus
• Intrusion Prevention and Denial of Service
• SSL VPN
• Dialup IPsec VPN
• Data Leak Prevention (DLP)

Who are We?

We can help your company gain and develop all the technology skills it needs to rise to high-end challenges. After all, technology is the tool and only those who master it can capitalize on its benefits. Our customers and partners rely on us, and for very good reasons.

  • Dubai Knowledge Park Branch

    Block 17 1st Floor PO Box 53941, Dubai Knowledge Park, Dubai

Check out more Fortinet courses in UAE

NobleProg MEA Logo

CyberSAFE (Securing Assets for the End User)

The course is designed to prepare you for 'Certified CyberSAFE credential'. Several risks involved in using end-user technology will be discussed along with determining the safe way of usage and techniques to protect yourself.

by NobleProg MEA
  • Price
  • Start Date
  • Duration
G-TEC Education Institute Logo

Cyber Security

The Cyber Security Essentials Course at G-TEC Education Institute in Dubai is a comprehensive program designed to equip individuals with the essential knowledge and skills to safeguard digital assets and counteract cyber threats. In a world

by G-TEC Education Institute
ASK Consulting & Training Logo

Cyber Security for Leaders

A certificate will be given to all participants as a recognition upon completion. The aim is to equip leaders of today to face and tackle the cyber challenges common in organizations nowadays. The course is facilitated by Thomas Paulger and

by ASK Consulting & Training
  • Price
  • Start Date
  • Duration
G-TEC Education Institute Logo

IT Courses

Our IT courses cover a wide range of topics and technologies, including but not limited to programming languages, software development, web development, database management, networking, cybersecurity, and system administration.

by G-TEC Education Institute
  • Price
  • Start Date
  • Duration
Accountants And Auditors Association Logo

Certified Information Security Manager (CISM)

Certified Information Security Manager will be a 32-hour workshop in which participants will enhance their competitive advantage and improve their earning potential by demonstrating their information security management expertise.

by Accountants And Auditors Association
  • Price
  • Start Date
  • Duration

© 2024 www.coursetakers.ae All Rights Reserved. Terms and Conditions of use | Privacy Policy