Course Description Security
In this course, you will learn how to use the most common FortiGate features, including security profiles.
In interactive labs, you will explore firewall policies, the Fortinet Security Fabric, user authentication, and how to protect your network using security profiles, such
as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement
basic network security.
Prerequisites
- Knowledge of network protocols
- Basic understanding of firewall concepts
Agenda
1. Introduction and Initial Configuration
2. Firewall Policies
3. Network Address Translation
4. Firewall Authentication
5. Logging and Monitoring
6. Certificate Operations
7. Web Filtering
8. Application Control
9. Antivirus
10. Intrusion Prevention and Denial of Service
11. Security Fabric
Objectives
After completing this course, you will be able to:
- Deploy the appropriate operation mode for your network
- Use the GUI and CLI for administration
- Control network access to configured networks using
firewall policies
- Apply port forwarding, source NAT, and destination NAT
- Authenticate users using firewall policies
- Understand encryption functions and certificates
- Inspect SSL/TLS-secured traffic to prevent encryption
used to bypass security policies
- Configure security profiles to neutralize threats and
misuse, including viruses, torrents, and inappropriate
websites
- Apply application control techniques to monitor and
control network applications that might use standard or
non-standard protocols and ports
- Fight hacking and denial of service (DoS)
- Collect and interpret log entries
- Identify the characteristics of the Fortinet Security Fabric
Course Description Infrastructure
In this course, you will learn how to use the most common FortiGate networking and infrastructure features.
Topics include features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, redundant infrastructure, virtual domains
(VDOMs), zero trust network access (ZTNA), SSL VPN, site-to-site IPsec VPN, single sign-on (SSO), and diagnostics.
Prerequisites
- Knowledge of OSI layers
- Knowledge of firewall concepts in an IPv4 network
- Knowledge of the fundamentals of FortiGate, as
presented in the FortiGate Security course
Agenda
1. Routing
2. Virtual Domains
3. Fortinet Single Sign-On
4. ZTNA
5. SSL VPN
6. IPsec VPN
7. High Availability
8. Diagnostics
Objectives
After completing this course, you will be able to:
- Analyze a FortiGate route table
- Route packets using policy-based and static routes for
multipath and load-balanced deployments
- Divide FortiGate into two or more virtual devices, each
operating as an independent FortiGate, by configuring
virtual domains (VDOMs)
- Understand the fundamentals and benefits of using ZTNA
- Offer an SSL VPN for secure access to your private
network
- Establish an IPsec VPN tunnel between two FortiGate
devices
- Implement a meshed or partially redundant VPN
- Diagnose failed IKE exchanges
- Offer Fortinet Single Sign-On (FSSO) access to network
services, integrated with Microsoft Active Directory (AD)
- Deploy FortiGate devices as an HA cluster for fault
tolerance and high performance
- Diagnose and correct common problems