Course Objectives
Deploy the appropriate operation mode for your network
Use the GUI and CLI for administration
Identify the characteristics of the Fortinet Security Fabric
Control network access to configured networks using firewall policies
Apply port forwarding, source NAT, and destination NAT
Authenticate users using firewall policies
Understand encryption functions and certificates
Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies
Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites
Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports
Fight hacking and denial of service (DoS)
Offer an SSL VPN for secure access to your private network
Collect and interpret log entries
System Requirements
If you take the online format of this class, you must use a computer that has the following:
- A high-speed Internet connection
- An up-to-date web browser
- A PDF viewer
- Speakers or headphones
- HTML 5 support or
- An up-to-date Java Runtime Environment (JRE) with Java plugin enabled in your web browser
You should use a wired Ethernet connection, not a WiFi connection. Firewalls, including Windows Firewall or FortiClient, must allow connections to the online labs.
Who Should Attend?
Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks should attend this course.
You should have a thorough understanding of all the topics covered in the FortiGate Security course before attending the FortiGate Infrastructure course.
- Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
- Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
- Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
- Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
- Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
- Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.
Agenda
1 - Outline
- Introduction and Initial Configuration
- Security Fabric
- Firewall Policies
- Network Address Translation (NAT)
- Firewall Authentication
- Logging and Monitoring
- Certificate Operations
- Web Filtering
- Application Control
- Antivirus
- Intrusion Prevention and Denial of Service
- SSL VPN