online site builder

© Copyright 2019 Caliberr Technologies- All Rights Reserved

SPECIALIZATION LEVEL

FortiGate Firewall

FORTIGATE SECURITY

AGENDA:

1. Introduction and Initial Configuration

2. Security Fabric

3. Firewall Policies

4. Network Address Translation (NAT)

5. Firewall Authentication

6. Logging and Monitoring

7. Certificate Operations

8. Web Filtering

9. Application Control

10. Antivirus

11. Intrusion Prevention and Denial of Service

12. SSL VPN

13. Dialup IPsec VPN

OBJECTIVES:

After completing this course, you should be able to:

• Deploy the appropriate operation mode for your network

• Use the GUI and CLI for administration

• Identify the characteristics of the Fortinet Security Fabric

• Control network access to configured networks using firewall policies

• Apply port forwarding, source NAT, and destination NAT

• Authenticate users using firewall policies

• Understand encryption functions and certificates

• Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies

• Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites

• Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports

• Fight hacking and denial of service (DoS)

• Offer an SSL VPN for secure access to your private network

• Implement a dialup IPsec VPN tunnel between FortiGate and FortiClient

• Collect and interpret log entries

FORTIGATE INFRASTRUCTURE

AGENDA:

1. Routing

2. Software-Defined WAN (SD-WAN)

3. Virtual Domains

4. Layer 2 Switching

5. Site-to-Site IPsec VPN

6. Fortinet Single Sign-On (FSSO)

7. High Availability (HA)

8. Web Proxy

9. Diagnostics

OBJECTIVES:

After completing this course, you should be able to:

• Deploy the appropriate operation mode for your network

• Use the GUI and CLI for administration

• Identify the characteristics of the Fortinet Security Fabric

• Control network access to configured networks using firewall policies

• Apply port forwarding, source NAT, and destination NAT

• Authenticate users using firewall policies

• Understand encryption functions and certificates

• Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies

• Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites

• Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports

• Fight hacking and denial of service (DoS)

• Offer an SSL VPN for secure access to your private network

• Implement a dialup IPsec VPN tunnel between FortiGate and FortiClient

• Collect and interpret log entries

Address

#1A, Alsa Glenridge,
32, Langford Road,
Bangalore-560025.

Contacts

Email: info@networkexpert.co 
Phone: 07619205606