FT-FGT-INF : FortiGate Infrastructure

by Trainocate

In this 2 days course, you will learn how to use advanced FortiGate networking and security. Topics include features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, site-to-site IPsec VPN, SSO & more.

Price : Enquire Now

Contact the Institutes

Fill this form
Trainocate Logo

img Duration

2 Days

Course Details

In this 2 days course, you will learn how to use advanced FortiGate networking and security. Topics include features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, site-to-site IPsec VPN, SSO, web proxy, and diagnostics.

What You'll Learn

After completing this course, you should be able to:

  • Analyze a FortiGate's route table.
  • Route packets using policy-based and static routes for multi-path and load balanced deployments.
  • Configure SD-WAN to load balance traffic between multiple WAN links effectively.
  • Inspect traffic transparently, forwarding as a Layer 2 device.
  • Divide FortiGate into two or more virtual devices, each operating as an independent FortiGate, by configuring virtual domains (VDOMs).
  • Establish an IPsec VPN tunnel between two FortiGate appliances.
  • Compare policy-based to route-based IPsec VPN.
  • Implement a meshed or partially redundant VPN.
  • Diagnose failed IKE exchanges.
  • Offer Fortinet Single Sign On (FSSO) access to network services, integrated with Microsoft Active Directory.
  • Deploy FortiGate devices as an HA cluster for fault tolerance and high performance.
  • Deploy implicit and explicit proxy with firewall policies, authentication, and caching.
  • Diagnose and correct common problems.

Who Should Attend

Networking and security professionals involved in the design, implementation, and administration of a network infrastructure using FortiGate appliances.

This course assumes knowledge of basic FortiGate fundamentals. Participants should have a thorough understanding of all the topics covered in the FortiGate Security course before attending the FortiGate Infrastructure course.

Prerequisites

  • Knowledge of OSI layers
  • Knowledge of firewall concepts in an IPv4 network
  • Knowledge of the fundamentals of FortiGate, as presented in the FortiGate Security course

At the Forefront of Learning: A Global Leader in Technology, Business, and People Training. Empowering the Future Workforce with Cutting-Edge Skills!

We deliver training in critical career competencies such as Analytics, Artificial Intelligence, Big Data, Cloud Computing, Data Science, Dev Ops, Machine Learning, and more.

We are proud to be the Authorized Training Partner for big tech companies such as AWS, Alibaba Cloud, Cisco, Dell EMC, Fortinet, Google Cloud, IBM, Microsoft, NetApp, Nutanix, Oracle, Splunk, Red Hat, Trend Micro, and VMware.

We also provide a broad range of human capital development and people skills training to individuals and organizations under American Management Association (AMA).

TRAINOCATE is proud to be partnered with leading testing providers to provide you with the convenience of taking your certification exams with us.

As a authorized testing center for Kryterion, Pearson VUE, and PSI, you can be assured of the highest standards of test delivery and proctoring.

  • Dubai Knowledge Park Branch

    Trainocate Gulf FZ LLC No. G09, B-02,, Dubai Knowledge Park, Dubai

2 Reviews

  • 0

    (Institute Review)

    55 years ago

    0
  • (Institute Review)

    55 years ago

Submit Your Course Review (For Enrolled Students Only)

This form is for submitting course reviews only. If you have questions about the course, please use the Ask Us? form.

Check out more Fortinet courses in UAE

Global Business Advisors (Corporate Training Providers) Logo

Principles and Practices of Cyber Security

Learn about cybersecurity and understand the key role it plays in every business to protect sensitive data, intellectual property, personal information, data, and other important information from damage and theft by adversaries and criminals

by Global Business Advisors (Corporate Training Providers)
  • Price
  • Start Date
  • Duration
NobleProg MEA Logo

EC Council Certified Security Analyst

This course concludes with students conducting a penetration test on a firm that has different departments, servers and subnets, and operating systems with a defense mechanisms architecture that comes with both militarized and non-militarize

by NobleProg MEA
  • Price
  • Start Date
  • Duration
Keygains MATT Logo

Certified Information Security Manager (CISM)

This comprehensive CISM training focuses on the construction, development, and governance of information security operations. This qualification demonstrates your ability and understanding of information security management. 

by Keygains MATT
NobleProg MEA Logo

EC Council Certified Secure Computer User (CSCU)

This interactive course promises the acquisition of fundamental knowledge and skills to understand different computer and security threats like credit card fraud, identity theft, email hoaxes, online banking phishing scams and more.

by NobleProg MEA
  • Price
  • Start Date
  • Duration
IP Rulers Computer Training Logo

CISSP

Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive re

by IP Rulers Computer Training
  • Price
  • Start Date
  • Duration

© 2025 www.coursetakers.ae All Rights Reserved. Terms and Conditions of use | Privacy Policy