KEMBAR78
FortiGate Security | PDF | Computer Network | Security
0% found this document useful (0 votes)
56 views3 pages

FortiGate Security

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views3 pages

FortiGate Security

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

FortiGate

Security

Course Description
In this three-day course, you will learn how 5. Firewall Authentication
to use basic FortiGate features, including
6. Logging and Monitoring
security profiles.
7. Certificate Operations
In interactive labs, you will explore firewall
8. Web Filtering
policies, security fabric, user authentication,
9. Application Control
SSL VPN, and how to protect your network
using security profiles such as IPS, antivirus, 10. Antivirus
web filtering, application control, and more. 11. Intrusion Prevention and Denial ofService
These administration fundamentals will 12. SSL VPN
provide you with a solid understanding of
how to implement basic network security.
Objectives
Product Version After completing this course, you should be able
to:
FortiOS 6.4
 Deploy the appropriate operation mode
for your network
Formats  Use the GUI and CLI foradministration
 Instructor-led classroom  Identify the characteristics of the Fortinet
Security Fabric
 Instructor-led online
 Control network access to configured
 Self-paced online
networks using firewall policies
 Apply port forwarding, source NAT, and
Agenda destination NAT
1. Introduction and Initial Configuration  Authenticate users using firewall policies
2. Security Fabric  Understand encryption functions and
certificates
3. Firewall Policies
 Inspect SSL/TLS-secured traffic to prevent
4. Network Address Translation (NAT)
encryption used to bypass security policies
 Configure security profiles to neutralize
threats and misuse, including viruses, Website:
torrents, andinappropriate websites
https://datacipher.c
 Apply application control techniques to monitor
and control network applications that might om.au/
use standard or non-standard protocols and
ports https://datacipher.
 Fight hacking and denial of service(DoS) com/
 Offer an SSL VPN for secure access to your
private network
 Collect and interpret log entries

Who Should Attend


Networking and security professionals
involved in the management, configuration,
administration, and monitoring of FortiGate
devices used to secure their organizations'
networks should attend this course.

Participants should have a thorough


understanding of all the topics covered in the
FortiGate Security course before attending the
FortiGate Infrastructure course.

Prerequisites
 Knowledge of network protocols
 Basic understanding of firewall concepts

System Requirements
If you take the online format of this class,
you must use a computer that has the
following:

 A high-speed Internet connection


 An up-to-date web browser
 A PDFviewer
 Speakers or headphones
 One of the following:
 HTML5 support
 An up-to-date Java Runtime Environment
(JRE) with Java plugin enabled in your
web browser
You should use a wired Ethernet connection,
not a WiFi connection. Firewalls, including
Windows Firewall or FortiClient, must allow
connections to the online labs.
Certification
This course and the FortiGate Infrastructure course
are intended to help you prepare for the NSE 4
certification exam.

Email:
training@datacipher.com.a
u training@datacipher.net

You might also like