Participants should have a thorough understanding of all the topics covered in FortiGate Security before attending the FortiGate Infrastructure course.
Who Should Attend
Network and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks .
Participants should have a thorough understanding of all the topics covered in FortiGate Security before attending the FortiGate Infrastructure course.
Course Content
In this three day course, you will learn how to use basic FortiGate features, including security profiles.
In interactive labs, you will explore firewall policies, user authentication, SSL, VPN, dial-up IPsec, VPN, and how to protect your network using security profiles
such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security.
Prerequisites
• Knowledge of network protocols
• Basic understanding of firewall concepts
Course Objectives
After completing these courses, you will be able to:
• Deploy the appropriate operation mode for your network
• Use the GUI and CLI for adminitstration
• Identify the characteristics of the Fortinet security fabric
• Control network access to configured networks using firewall policies
• Apply port forwarding, source NAT, and destination NAT
• Authenticate users using firewall policies
• Understand excryption functions and certificates
• Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies
• Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites
• Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports
• Fight hacking and denial of service (DoS)
• Defend against data leaks by identifying files with sensitive data, and block them for leaving your private network
• Offer an SSL VPN for secure access to your private network
• Implement a dialup IPsec VPN tunnel between FortiGate and FortiClient
• Collect and interpret log entries
Course Outline
• Introduction to FortiGate and the Security Fabric
• Firewall policies
• Network Address Translation (NAT)
• Firewall Authentication
• Logging and Monitoring
• Certificate Operations
• Web Filtering
• Application Control
• Antivirus
• Intrusion Prevention and Denial of Service
• SSL VPN
• Dialup IPsec VPN
• Data Leak Prevention (DLP)
Who are We?
We can help your company gain and develop all the technology skills it needs to rise to high-end challenges. After all, technology is the tool and only those who master it can capitalize on its benefits. Our customers and partners rely on us, and for very good reasons.
This course will give you the soft skills and management knowledge required for the successful implementation of an Information Security Management System while ensuring its conformance with ISO/IEC 27001.
This course will give you the skills and knowledge to understand/apply the key methods and ideas of the information security field. You will learn about designing the architecture, design and management of the security of your firm.
Cutting Edge Curriculum to begin your Offensive Cybersecurity Journey
This course will help you in acquiring knowledge of planning and executing the audit process of an Information Security Management System while ensuring the conformance with ISO/IEC 27001 requirements.
You will also learn to create a program for implementing information security strategy. It also includes implementing an information security program, Overseeing and directing information security activities for executing the information sec
© 2025 www.coursetakers.ae All Rights Reserved. Terms and Conditions of use | Privacy Policy