Participants should have a thorough understanding of all the topics covered in FortiGate Security before attending the FortiGate Infrastructure course.
Who Should Attend
Network and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks .
Participants should have a thorough understanding of all the topics covered in FortiGate Security before attending the FortiGate Infrastructure course.
Course Content
In this three day course, you will learn how to use basic FortiGate features, including security profiles.
In interactive labs, you will explore firewall policies, user authentication, SSL, VPN, dial-up IPsec, VPN, and how to protect your network using security profiles
such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security.
Prerequisites
• Knowledge of network protocols
• Basic understanding of firewall concepts
Course Objectives
After completing these courses, you will be able to:
• Deploy the appropriate operation mode for your network
• Use the GUI and CLI for adminitstration
• Identify the characteristics of the Fortinet security fabric
• Control network access to configured networks using firewall policies
• Apply port forwarding, source NAT, and destination NAT
• Authenticate users using firewall policies
• Understand excryption functions and certificates
• Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies
• Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites
• Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports
• Fight hacking and denial of service (DoS)
• Defend against data leaks by identifying files with sensitive data, and block them for leaving your private network
• Offer an SSL VPN for secure access to your private network
• Implement a dialup IPsec VPN tunnel between FortiGate and FortiClient
• Collect and interpret log entries
Course Outline
• Introduction to FortiGate and the Security Fabric
• Firewall policies
• Network Address Translation (NAT)
• Firewall Authentication
• Logging and Monitoring
• Certificate Operations
• Web Filtering
• Application Control
• Antivirus
• Intrusion Prevention and Denial of Service
• SSL VPN
• Dialup IPsec VPN
• Data Leak Prevention (DLP)
Who are We?
We can help your company gain and develop all the technology skills it needs to rise to high-end challenges. After all, technology is the tool and only those who master it can capitalize on its benefits. Our customers and partners rely on us, and for very good reasons.
Learn about cybersecurity and understand the key role it plays in every business to protect sensitive data, intellectual property, personal information, data, and other important information from damage and theft by adversaries and criminals
This is an interesting training that takes into account the latest epidemic of cybercrime & its control/prevention mechanism. This training includes learning and covering key areas like IT Security fundamentals and penetration testing.
This comprehensive CISM training focuses on the construction, development, and governance of information security operations. This qualification demonstrates your ability and understanding of information security management.Â
'Certified Information Security Manager' training is offered by Mesk Management Sciences Institute. Kindly contact us to inquire and find out about the schedule and complete outline.
Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive re
© 2024 www.coursetakers.ae All Rights Reserved. Terms and Conditions of use | Privacy Policy