FortiGate Security

Course Description

Fortinet is Award Winning Firewall Providing End-to- End Security Across the Entire Network Internal Segmentation, Perimeter Security, Cloud, Data Center Distributed or Small Business Deployment.

The Course Content Delivers Comprehensive Coverage on FortiGate NGFW Configuration and Troubleshooting. All Engineers Looking forward to Work on World best UTM Solution will Gain Tremendously from This Course.

Horizon Computers is Know to Deliver High Quality Training In the Field of SecurityCourse contents are Designed by Experts Trainers to Provide Real Life Experience on Complex Setup. FortiGate Training is Delivered in Horizon Computers Vashi, Vile Parle and Pune Center



FortiGate Security

In this three-day course, you will learn how to use basic FortiGate features, including security profiles. In interactive labs, you will explore firewall policies, user authentication, SSL VPN, dial-up IPsec VPN, and how to protect your network using security profiles such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security.

Product Version

  • FortiOS 6.0.0

Formats

  • Instructor-led classroom
  • Instructor-led online
  • Self-paced online

Agenda

  • Introduction to FortiGate and the Security Fabric
  • Firewall Policies
  • Network Address Translation (NAT)
  • Firewall Authentication
  • Logging and Monitoring
  • Certificate Operations
  • Web Filtering
  • Application Control
  • Antivirus
  • Intrusion Prevention and Denial of Service
  • SSL VPN
  • Dialup IPsec VPN
  • Data Leak Prevention (DLP)

Objectives:

    After completing this course, you should be able to:

  • Deploy the appropriate operation mode for your network.
  • Use the GUI and CLI for administration.
  • Identify the characteristics of the Fortinet security fabric.
  • Control network access to configured networks using firewall policies.
  • Apply port forwarding, source NAT, and destination NAT.
  • Authenticate users using firewall policies.
  • Understand encryption functions and certificates.
  • Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies.
  • Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites.
  • Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports.
  • Fight hacking and denial of service (DoS).
  • Defend against data leaks by identifying files with sensitive data, and block them from leaving your private network.
  • Offer an SSL VPN for secure access to your private network.
  • Implement a dialup IPsec VPN tunnel between FortiGate and FortiClient.
  • Collect and interpret log entries.

Who Should Attend

  • Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks.
  • Participants should have a thorough understanding of all the topics covered in the FortiGate Security course before attending the FortiGate Infrastructure course.

Prerequisites

  • Knowledge of network protocols.
  • Basic understanding of firewall concepts

System Requirements

If you take the online format of this class, you must use a computer that has the following:

  • A high-speed Internet connection
  • An up-to-date web browser
  • A PDF viewer
  • Speakers or headphones
  • One of the following:
    • HTML5 support
    • An up-to-date Java Runtime Environment (JRE) with Java plugin enabled in your web browser

You should use a wired Ethernet connection, not a Wi-Fi connection. Firewalls, including Windows Firewall or FortiClient, must allow connections to the online labs.

Certification

This course and the FortiGate Infrastructure course are intended to help participants prepare for the NSE 4 certification exam

Firewall fundamentals by Chandan Sir

History and Types of Firewalls | 1st Generation Firewalls


ACL Limitations and Issues | Stateless Packet Inspection Firewall (ACL)

Stateful Packet Inspection Firewalls | Packet Filter Firewalls Introduction