Unlock the potential of generative AI across all your managerial functions.
Log in
Or create your account
You have just added to your selection
Your cart is empty, See our trainings

Description

This FortiGate security and infrastructure training will provide you with all the knowledge related to Unified Threath Management (UTM) on the same platform. The “security” part will provide you with knowledge of practices related to general rules for management and protection against malware. The “infrastructure” part will allow mastery of the advanced architectural functions of FortiGate.

Who is this training for ?

For whom ?

Network engineers/administrators and technicians and anyone involved in the design of network and security architectures based on FortiGate hardware.

Prerequisites

Basic knowledge of IT security as well as good knowledge of TCP/IP.

Training objectives

  • Deploy the appropriate operating mode for your network (proxy, flow, NGFW, etc.)
  • Use the graphical and CLI interfaces jointly for administration
  • Control network access to networks configured using security policies fire
  • Apply port forwarding, source Network Address Translation (NAT), and destination NAT
  • Authenticate users using firewall policies
  • Understand encryption features and certificates
  • Decrypt SSL/secure traffic TLS in order to inspect it
  • Configure security profiles to neutralize threats and abuse
  • Apply network application control techniques
  • Use standard or non-standard protocols and ports
  • Fight against hacking and denial of service ( DoS)
  • Collect and interpret items collected in logs
  • Identify Fortinet Security Fabric characteristics
  • Analyze a FortiGate routing table
  • Route packets using static routes and rule-based routes
  • Deploy load-balanced multipath
  • Split FortiGate into two or more virtual devices
  • Configure virtual domains (VDOM)
  • Understand the fundamentals and benefits of using ZTNA
  • Offer SSL VPN for secure access to your private network
  • Establish an IPsec VPN tunnel between two FortiGate devices
  • Implement a mesh or partially redundant VPN
  • Diagnose failed IKE exchanges
  • Provide Single Sign-On (FSSO) access to network services by leveraging access to Microsoft Active Directory (AD)
  • Deploy FortiGate devices in high availability cluster
  • Improve fault tolerance and deliver high performance
  • Deploy SD-WAN virtual interface
  • Implement dynamic flow distribution based on measured performance on member interfaces
  • Diagnose and fix common problems
  • Training program

    • 1396
    • 35 h

    Submit your review

    Translated By Google Translate