Participants should have a thorough understanding of all the topics covered in FortiGate Security before attending the FortiGate Infrastructure course.
Who Should Attend
Network and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks .
Participants should have a thorough understanding of all the topics covered in FortiGate Security before attending the FortiGate Infrastructure course.
Course Content
In this three day course, you will learn how to use basic FortiGate features, including security profiles.
In interactive labs, you will explore firewall policies, user authentication, SSL, VPN, dial-up IPsec, VPN, and how to protect your network using security profiles
such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security.
Prerequisites
• Knowledge of network protocols
• Basic understanding of firewall concepts
Course Objectives
After completing these courses, you will be able to:
• Deploy the appropriate operation mode for your network
• Use the GUI and CLI for adminitstration
• Identify the characteristics of the Fortinet security fabric
• Control network access to configured networks using firewall policies
• Apply port forwarding, source NAT, and destination NAT
• Authenticate users using firewall policies
• Understand excryption functions and certificates
• Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies
• Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites
• Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports
• Fight hacking and denial of service (DoS)
• Defend against data leaks by identifying files with sensitive data, and block them for leaving your private network
• Offer an SSL VPN for secure access to your private network
• Implement a dialup IPsec VPN tunnel between FortiGate and FortiClient
• Collect and interpret log entries
Course Outline
• Introduction to FortiGate and the Security Fabric
• Firewall policies
• Network Address Translation (NAT)
• Firewall Authentication
• Logging and Monitoring
• Certificate Operations
• Web Filtering
• Application Control
• Antivirus
• Intrusion Prevention and Denial of Service
• SSL VPN
• Dialup IPsec VPN
• Data Leak Prevention (DLP)
Who are We?
We can help your company gain and develop all the technology skills it needs to rise to high-end challenges. After all, technology is the tool and only those who master it can capitalize on its benefits. Our customers and partners rely on us, and for very good reasons.
The course is designed to prepare you for 'Certified CyberSAFE credential'. Several risks involved in using end-user technology will be discussed along with determining the safe way of usage and techniques to protect yourself.
The Cyber Security Essentials Course at G-TEC Education Institute in Dubai is a comprehensive program designed to equip individuals with the essential knowledge and skills to safeguard digital assets and counteract cyber threats. In a world
A certificate will be given to all participants as a recognition upon completion. The aim is to equip leaders of today to face and tackle the cyber challenges common in organizations nowadays. The course is facilitated by Thomas Paulger and
Our IT courses cover a wide range of topics and technologies, including but not limited to programming languages, software development, web development, database management, networking, cybersecurity, and system administration.
Certified Information Security Manager will be a 32-hour workshop in which participants will enhance their competitive advantage and improve their earning potential by demonstrating their information security management expertise.
© 2024 www.coursetakers.ae All Rights Reserved. Terms and Conditions of use | Privacy Policy