Unlock the potential of generative AI across all your managerial functions.
Log in
Or create your account
You have just added to your selection
Your cart is empty, See our trainings

Description

During this training, you will learn how to master the core UTM features of FortiGate devices. You will work directly on equipment available through our dedicated training environment.

Through hands-on exercises, you will configure firewall policies, set up IPsec VPN tunnels and SSL VPN access. You will also implement malware protection, create URL filtering profiles, and manage user authentication through a captive portal.

Who is this training for ?

For whom ?

  • Network engineers/administrators and technicians.

Prerequisites

Training objectives

  • Prepare effectively for the Fortinet NSE4 certification exam (FortiGate I and II)
  • Understand and describe the core UTM features of FortiGate devices
  • Implement user authentication through firewall policies
  • Deploy an IPsec VPN tunnel between two FortiGate appliances
  • Analyze logs and generate meaningful reports
  • Training program

      • Equipment administration, account and authentication.
      • Fortigate as DHCP server, DNS server.
      • Configuration file and firmware upgrade.
      • Antivirus: antiviral filter of web flows (HTTP, HTTPS, FTP) and messaging (SMTP, SMTPS, IMAP, IMAPS, POP3, POP3S).
      • Web filtering.
      • Applicative IPS. Application control.
      • DoS protection (Denial of Service).
      • Security rules.
      • Workstation control.
      • Log and analysis.
      • NAT, IP address translation .
      • Traffic inspection.
      • Security rules diagnosis.
      • Proxy authentication and authentication methods.
      • Two-factor authentication.
      • Authentication types and rules.
      • Users and groups .
      • User supervision.
      • VPN topologies, understanding Fortigate SSL VPN.
      • SSL VPN options and security.
      • Configuring SSL VPN, IPSec VPN.
      • IPSec VPN Monitoring.
      • VPN Dialup, redundant.
      • Understanding the structure of Logs.
      • Navigation in Logs.
      • Email Alerts and Logs settings.
      • Monitoring and storing Logs .
      • Digital certificates.
      • SSL content inspection.
      • Synchronization between devices.
      • Clustering options.
      • Le diagnostic du HA.
      • Diagnotics et Troubleshooting.
    • 546
    • 35 h

    Submit your review

    Translated By Google Translate