For business inquiries : (+1) 438 601-1155

For special requests : (+1) 438 601-1155

A propos de la formation NSE 4 FortiGate Network Security Professional

This training focuses on FortiGate UTM solutions and firewall administration.

Détails
Objectifs pédagogiques de la formation NSE 4 FortiGate Network Security Professional
  • Configure FortiGate security features
  • Implement VPN solutions
  • Manage NAT policies
  • Control network access. Mitigate threats.

Qui devrait suivre cette formation NSE 4 FortiGate Network Security Professional ?

Public visé par la formation NSE 4 FortiGate Network Security Professional

This course is intended for network administrators and security professionals managing FortiGate firewalls.  

Prérequis de la formation NSE 4 FortiGate Network Security Professional

Basic firewall and networking knowledge is required.

Formations Similaires

  • NIST CyberSecurity Framework 2.0 Détails
  • Security Manager Détails
  • COBIT 2019 Détails
  • TOGAF 9.2 Détails
  • ISO 45001 Lead Auditor Détails
  • ISO 27001 Lead Auditor Détails
  • ISO 27001 Lead Implementer Course Détails
  • ISO 45001 Lead Implementer Détails
  • ISO 27001 Lead Auditor Training Course Détails
  • ISO 27005 Training Détails
  • ISO 27002 Foundation Détails
  • Offensive Security Certified Professional (OSCP) Détails
  • EBios Détails
  • TOGAF® 10 Détails
  • ISO 22301 Lead Implementer Détails
  • Stormshield Détails
  • Configuring BIG-IP - Application Security Manager (ASM) Détails
  • ForgeRock Détails
  • Spring Security 5 Détails
  • Certified Ethical Hacker (CEH) v12 Détails
  • Implementing PowerShell Security Détails
  • Veeam Backup and Replication v12 Détails
  • KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
  • LPIC-3 Exam 303: Security Détails
  • SSO (Single Sign-On) Détails
  • IT Governance Détails
  • CCSA, Check Point Certified Security Administrator R81 Détails
  • CCSE - Check Point Certified Security Expert R80.10 Détails
  • Securing Email with Cisco Email Security Appliance SESA Détails
  • Certified Ethical Hacker CEH v12 Détails
  • FCNSA Fortinet Certified Network Security Administrator Détails
  • NSE 4 FortiGate Network Security Professional Détails
  • NSE5 FortiManager 7.0 Détails
  • Securing the Web with Cisco Web Security Appliance Détails
  • Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
  • CCNP Security Détails
  • Android app security Détails
  • Mastering IT Project Audit: Techniques and Best Practices Détails
  • SharePoint : Planification et administration (70-339) Détails

Déroulé de la formation NSE 4 FortiGate Network Security Professional


Module 1: Introduction to FortiGate and UTM

Overview of FortiGate and Unified Threat Management (UTM)

Understanding the role of FortiGate in network security

Exploring the features and capabilities of UTM


Module 2: Log Management and Monitoring

Importance of log management in network security

Configuring log settings on FortiGate

Monitoring network activities and security events


Module 3: Firewall Rules Configuration

Basics of firewall rules on FortiGate

Creating and managing firewall policies

Implementing security policies to control traffic flow


Module 4: User Authentication Firewall Rules

Enhancing firewall rules with user authentication

Configuring user-based access control policies

Integrating authentication mechanisms into firewall rules


Module 5: SSL VPN Configuration

Understanding SSL VPN technology

Configuring SSL VPN on FortiGate

Providing secure remote access to network resources


Module 6: Introduction to IPSEC VPN

Overview of IPSEC VPN

Setting up IPSEC VPN tunnels on FortiGate

Securing communication between network sites using IPSEC VPN


Module 7: Antivirus Protection

Implementing antivirus protection on FortiGate

Configuring antivirus scanning policies

Detecting and preventing malware threats


Module 8: Explicit Proxy Configuration

Deploying explicit proxy services on FortiGate

Configuring proxy settings for web traffic filtering

Monitoring and managing proxy services


Module 9: URL Filtering

Understanding URL filtering techniques

Configuring URL filtering policies on FortiGate

Restricting access to malicious or inappropriate websites


Module 10: Application Control

Implementing application control policies on FortiGate

Managing and controlling application usage within the network

Preventing unauthorized application access


Module 11: Routing Configuration

Configuring routing protocols on FortiGate

Managing routing tables and routing policies

Optimizing network routing for efficient data transmission


Module 12: Virtualization Setup

Understanding virtualization concepts in FortiGate

Configuring virtual domains and virtual routers

Deploying virtualized network environments


Module 13: Transparent Mode Configuration

Implementing transparent mode on FortiGate

Configuring bridge interfaces and transparent firewall policies

Monitoring traffic in transparent mode


Module 14: High Availability Setup

Ensuring high availability with FortiGate

Configuring HA clusters for redundancy and failover

Monitoring HA status and health


Module 15: Advanced IPSEC VPN

Advanced configurations for IPSEC VPN tunnels

Implementing advanced encryption and authentication methods

Troubleshooting complex IPSEC VPN issues


Module 16: Intrusion Prevention System (IPS)

Deploying IPS on FortiGate for threat prevention

Configuring IPS policies and signatures

Detecting and blocking intrusion attempts


Module 17: Fortinet Single Sign-On (FSSO)

Integrating FortiGate with Single Sign-On (SSO) solutions

Configuring FSSO authentication for network access control

Implementing user-based policies and access controls


Module 18: Certificates and Cryptography

Managing digital certificates on FortiGate

Configuring cryptographic algorithms and protocols

Ensuring secure communication using encryption techniques


Module 19: Data Loss Prevention (DLP)

Implementing DLP policies on FortiGate

Monitoring and preventing data leakage incidents

Protecting sensitive information within the network


Module 20: Diagnostics and Troubleshooting

Performing diagnostics and troubleshooting tasks on FortiGate

Identifying and resolving network security issues

Troubleshooting hardware and software failures


Module 21: Hardware Acceleration

Understanding hardware acceleration features on FortiGate

Configuring hardware acceleration for optimized performance

Improving network throughput and scalability


Module 22: IPv6 Configuration

Implementing IPv6 support on FortiGate

Configuring IPv6 addressing and routing

Ensuring compatibility with IPv6-enabled networks

Formations Similaires
NIST CyberSecurity Framework 2.0 Détails
Security Manager Détails
COBIT 2019 Détails
TOGAF 9.2 Détails
ISO 45001 Lead Auditor Détails
ISO 27001 Lead Auditor Détails
ISO 27001 Lead Implementer Course Détails
ISO 45001 Lead Implementer Détails
ISO 27001 Lead Auditor Training Course Détails
ISO 27005 Training Détails
ISO 27002 Foundation Détails
Offensive Security Certified Professional (OSCP) Détails
EBios Détails
TOGAF® 10 Détails
ISO 22301 Lead Implementer Détails
Stormshield Détails
Configuring BIG-IP - Application Security Manager (ASM) Détails
ForgeRock Détails
Spring Security 5 Détails
Certified Ethical Hacker (CEH) v12 Détails
Implementing PowerShell Security Détails
Veeam Backup and Replication v12 Détails
KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
LPIC-3 Exam 303: Security Détails
SSO (Single Sign-On) Détails
IT Governance Détails
CCSA, Check Point Certified Security Administrator R81 Détails
CCSE - Check Point Certified Security Expert R80.10 Détails
Securing Email with Cisco Email Security Appliance SESA Détails
Certified Ethical Hacker CEH v12 Détails
FCNSA Fortinet Certified Network Security Administrator Détails
NSE 4 FortiGate Network Security Professional Détails
NSE5 FortiManager 7.0 Détails
Securing the Web with Cisco Web Security Appliance Détails
Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
CCNP Security Détails
Android app security Détails
Mastering IT Project Audit: Techniques and Best Practices Détails
SharePoint : Planification et administration (70-339) Détails

Vous pouvez faire l’inscription ou la demande du devis avec un seul click