Szkolenia Fortinet

Cel szkolenia

kod: FT-FGT-ADM | wersja: 7.4.x

In this course, you will learn how to use the most common FortiGate features. In interactive labs, you will explore firewall policies, user authentication, high availability, SSL VPN, site-to-site IPsec VPN, Fortinet Security Fabric, and how to protect your network using security profiles, such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement the most common FortiGate features.

Objectives

After completing this course, you will be able to:

  • Configure FortiGate basic networking from factory default settings
  • Configure and control administrator access to FortiGate
  • Use the GUI and CLI for administration
  • Control network access to configured networks using firewall policies
  • Apply port forwarding, source NAT, and destination NAT
  • Analyze a FortiGate route table
  • Route packets using policy-based and static routes for multi-path and load-balanced deployments
  • Authenticate users using firewall policies
  • Monitor firewall users from the FortiGate GUI
  • Offer Fortinet Single Sign-On (FSSO) access to network services, integrated with Microsoft Active Directory (AD)
  • Understand encryption functions and certificates
  • Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies
  • Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites
  • Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports
  • Offer an SSL VPN for secure access to your private network
  • Establish an IPsec VPN tunnel between two FortiGate devices
  • Configure static routing
  • Configure SD-WAN underlay, overlay, and, local breakout
  • Identify the characteristics of the Fortinet Security Fabric
  • Deploy FortiGate devices as an HA cluster for fault tolerance and high performance
  • Diagnose and correct common problems

Who Should Attend

Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiGate devices used to secure their organizations' networks should attend this course.

You should have a thorough understanding of all the topics covered in the FortiGate Operator course before attending the FortiGate Administrator course.

Plan szkolenia Rozwiń listę

  1. System and Network Settings
  2. Firewall Policies and NAT
  3. Routing
  4. Firewall Authentication
  5. Fortinet Single Sign-On (FSSO)
  6. Certificate Operations
  7. Antivirus
  8. Web Filtering
  9. Intrusion Prevention and Application Control
  10. SSL VPN
  11. IPsec VPN
  12. SD-WAN Configuration and Monitoring
  13. Security Fabric
  14. High Availability
  15. Diagnostics and Troubleshooting
Pobierz konspekt szkolenia w formacie PDF

Dodatkowe informacje

Wymagania wstępne
  • Knowledge of network protocols
  • Basic understanding of firewall concepts
Poziom trudności
Czas trwania 4 dni
Certyfikat

The participants will obtain certificates signed by Fortinet.

This course is intended also to help you prepare for the FCP – FortiOS exam. This exam is part of the following certification tracks:

  • Fortinet Certified Professional - Network Security
  • Fortinet Certified Professional - Public Cloud Security
  • Fortinet Certified Professional - Security Operations

FortiOS/FortiGate Administrator certification exam is a one of the steps required to gain the Fortinet Certified Professional (FCP) title. Fortinet certification exams are offered at Pearson Vue test centers worldwide. More information about Fortinet Certification Program on the https://www.fortinet.com/training-certification

Prowadzący

Fortinet Certified Trainer (FCT)

Informacje dodatkowe

ISC2

  • CPE training hours: 12
  • CPE lab hours: 10
  • l CISSP domains: Security Operations

Pozostałe szkolenia Fortinet | Fortinet Certified Professional (FCP)

Szkolenia powiązane tematycznie

Sieci komputerowe

Bezpieczeństwo

Security