For business inquiries : (+1) 438 601-1155
For special requests : (+1) 438 601-1155
This training focuses on FortiGate UTM solutions and firewall administration.
Module 1: Introduction to FortiGate and UTM
Overview of FortiGate and Unified Threat Management (UTM)
Understanding the role of FortiGate in network security
Exploring the features and capabilities of UTM
Module 2: Log Management and Monitoring
Importance of log management in network security
Configuring log settings on FortiGate
Monitoring network activities and security events
Module 3: Firewall Rules Configuration
Basics of firewall rules on FortiGate
Creating and managing firewall policies
Implementing security policies to control traffic flow
Module 4: User Authentication Firewall Rules
Enhancing firewall rules with user authentication
Configuring user-based access control policies
Integrating authentication mechanisms into firewall rules
Module 5: SSL VPN Configuration
Understanding SSL VPN technology
Configuring SSL VPN on FortiGate
Providing secure remote access to network resources
Module 6: Introduction to IPSEC VPN
Overview of IPSEC VPN
Setting up IPSEC VPN tunnels on FortiGate
Securing communication between network sites using IPSEC VPN
Module 7: Antivirus Protection
Implementing antivirus protection on FortiGate
Configuring antivirus scanning policies
Detecting and preventing malware threats
Module 8: Explicit Proxy Configuration
Deploying explicit proxy services on FortiGate
Configuring proxy settings for web traffic filtering
Monitoring and managing proxy services
Module 9: URL Filtering
Understanding URL filtering techniques
Configuring URL filtering policies on FortiGate
Restricting access to malicious or inappropriate websites
Module 10: Application Control
Implementing application control policies on FortiGate
Managing and controlling application usage within the network
Preventing unauthorized application access
Module 11: Routing Configuration
Configuring routing protocols on FortiGate
Managing routing tables and routing policies
Optimizing network routing for efficient data transmission
Module 12: Virtualization Setup
Understanding virtualization concepts in FortiGate
Configuring virtual domains and virtual routers
Deploying virtualized network environments
Module 13: Transparent Mode Configuration
Implementing transparent mode on FortiGate
Configuring bridge interfaces and transparent firewall policies
Monitoring traffic in transparent mode
Module 14: High Availability Setup
Ensuring high availability with FortiGate
Configuring HA clusters for redundancy and failover
Monitoring HA status and health
Module 15: Advanced IPSEC VPN
Advanced configurations for IPSEC VPN tunnels
Implementing advanced encryption and authentication methods
Troubleshooting complex IPSEC VPN issues
Module 16: Intrusion Prevention System (IPS)
Deploying IPS on FortiGate for threat prevention
Configuring IPS policies and signatures
Detecting and blocking intrusion attempts
Module 17: Fortinet Single Sign-On (FSSO)
Integrating FortiGate with Single Sign-On (SSO) solutions
Configuring FSSO authentication for network access control
Implementing user-based policies and access controls
Module 18: Certificates and Cryptography
Managing digital certificates on FortiGate
Configuring cryptographic algorithms and protocols
Ensuring secure communication using encryption techniques
Module 19: Data Loss Prevention (DLP)
Implementing DLP policies on FortiGate
Monitoring and preventing data leakage incidents
Protecting sensitive information within the network
Module 20: Diagnostics and Troubleshooting
Performing diagnostics and troubleshooting tasks on FortiGate
Identifying and resolving network security issues
Troubleshooting hardware and software failures
Module 21: Hardware Acceleration
Understanding hardware acceleration features on FortiGate
Configuring hardware acceleration for optimized performance
Improving network throughput and scalability
Module 22: IPv6 Configuration
Implementing IPv6 support on FortiGate
Configuring IPv6 addressing and routing
Ensuring compatibility with IPv6-enabled networks