In this course you will Learn About Fortigate Infrastructure and Security.
Mohamed Ibrahim
-
Rating
(0) - 0 Reviews
- 252 Students Enrolled
- 13:47 Hours
Course Overview
FortiGate Security
In this course, you will learn how to use basic FortiGate features, including security profiles. These administration fundamentals will provide you with a solid understanding of how to implement basic network security.
FortiGate Infrastructure
In this course, you will learn how to use advanced FortiGate networking and security. Topics include features commonly applied in a complex or larger enterprise or MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, site-to-site IPsec VPN, single sign-on (SSO), and diagnostics.
Who this course is for:
- System Administrators
- Information Security Professionals
- Network Administrators and Engineers
- Fresh Graduates looking to get into Network Security
- IT Professionals Looking to get into Network Security
What you'll learn
- Introduction and Initial Configuration
- Security Fabric
- Firewall Policies
- Network Address Translation (NAT)
- Firewall Authentication
- Logging and Monitoring
- Certificate Operations
- Web Filtering
- Application Control
- Antivirus
- Intrusion Prevention and Denial of Services
- SSL-VPN
- Routing
- SD-WAN Local Breakout
- Virtual Domains (VDOMs)
- Switching
- IPsec VPN
- Fortinet Single Sign-On (FSSO)
- High Availability (HA)
- Diagnostics
Course Curriculum
-
Course Overview 00:07:47
-
Course Overview 00:07:47
-
Demo setup 00:11:59
-
Demo setup 00:11:59
-
Digital and Security T... 00:05:02
-
Digital and Security Transformation 00:05:02
-
Security Fabric 00:02:31
-
Security Fabric 00:02:31
-
Why Fortigate 00:04:45
-
Why Fortigate 00:04:45
-
What is Network Securi... 00:03:20
-
What is Network Security 00:03:20
-
Web Application Securi... 00:01:40
-
Web Application Security 00:01:40
-
Advance Threat Protect... 00:01:46
-
Advance Threat Protection 00:01:46
-
Endpoint Security 00:00:33
-
Endpoint Security 00:00:33
-
Growth is great and ch... 00:01:19
-
Growth is great and challenging 00:01:19
-
Fortigate Demo 00:16:44
-
Fortigate Demo 00:16:44
-
Difference between tra... 00:02:24
-
What is a Firewall 00:14:45
-
What is a Firewall 00:14:45
-
What we learnt 00:03:46
-
What we learnt 00:03:46
-
what we will learn 00:03:06
-
what we will learn 00:03:06
-
Lesson Overview 00:00:59
-
Lesson Overview 00:00:59
-
High Level Features 00:27:25
-
High Level Features 00:27:25
-
Setup Decisions 00:09:49
-
Setup Decisions 00:09:49
-
Basic Administration 00:14:56
-
Basic Administration 00:14:56
-
Built-in Servers 00:07:24
-
Built-in Servers 00:07:24
-
Fundamental Maintenanc... 00:01:50
-
Fundamental Maintenance 00:01:50
-
FortiGate within the s... 00:07:59
-
FortiGate within the security fabric 00:07:59
-
Firewall Demo 00:06:01
-
Firewall Demo 00:06:01
-
Firewall Policies 00:48:03
-
Firewall Policies 00:48:03
-
Configuring Firewall P... 00:08:41
-
Configuring Firewall Policy 00:08:41
-
Managing Firewall Poli... 00:04:53
-
Managing Firewall Policies 00:04:53
-
Best Practices and tro... 00:02:23
-
Best Practices and troubleshooting 00:02:23
-
Demo Session 00:17:20
-
Demo Session 00:17:20
-
Lesson Overview 00:04:49
-
Lesson Overview 00:04:49
-
Methods Of Firewall Au... 00:15:07
-
Methods Of Firewall Authentication 00:15:07
-
Remote Authentication ... 00:10:51
-
Remote Authentication Server 00:10:51
-
User Groups 00:02:24
-
User Groups 00:02:24
-
Firewall Policies For ... 00:04:30
-
Firewall Policies For Authentication 00:04:30
-
Authenticating Through... 00:04:20
-
Monitoring and Trouble... 00:02:24
-
Monitoring and Troubleshooting 00:02:24
-
Review 00:01:44
-
Review 00:01:44
-
Logging Basics 00:21:11
-
Logging Basics 00:21:11
-
Local Logging 00:02:16
-
Local Logging 00:02:16
-
Remote Logging 00:04:03
-
Remote Logging 00:04:03
-
Log Settings 00:01:47
-
Log Settings 00:01:47
-
View, Search and Monit... 00:04:43
-
View, Search and Monitor Log 00:04:43
-
Protecting Log Data 00:01:27
-
Protecting Log Data 00:01:27
-
Inspection Modes 00:08:39
-
Inspection Modes 00:08:39
-
Web Filtering Basics 00:14:42
-
Web Filtering Basics 00:14:42
-
Additional Proxy-Based... 00:08:58
-
DNS Filtering 00:02:35
-
DNS Filtering 00:02:35
-
Best Practices and Tro... 00:04:03
-
Best Practices and Troubleshooting 00:04:03
-
Lab Demo 00:06:00
-
Lab Demo 00:06:00
-
Network Address Transl... 00:08:09
-
Network Address Translation 00:08:09
-
What Is NAT 00:16:30
-
What Is NAT 00:16:30
-
Introduction To NAT 00:03:37
-
Introduction To NAT 00:03:37
-
Firewall Policy NAT 00:09:51
-
Firewall Policy NAT 00:09:51
-
Central NAT 00:03:44
-
Central NAT 00:03:44
-
Session Helpers 00:02:02
-
Session Helpers 00:02:02
-
Sessions 00:04:18
-
Sessions 00:04:18
-
Best Practices And Tro... 00:02:47
-
Best Practices And Troubleshooting 00:02:47
-
Authenticate And Secur... 00:13:34
-
Inspect Encrypted Data 00:09:32
-
Inspect Encrypted Data 00:09:32
-
Manage Digital Certifi... 00:03:23
-
Application Control Ba... 00:14:43
-
Application Control Basics 00:14:43
-
Application Control Co... 00:14:22
-
Application Control Configuration 00:14:22
-
Logging And Monitoring... 00:02:17
-
Best Practices And Tro... 00:01:44
-
Best Practices And Troubleshooting 00:01:44
-
Antivirus Basics 00:08:02
-
Antivirus Basics 00:08:02
-
Antivirus Scanning Mod... 00:06:03
-
Antivirus Scanning Modes 00:06:03
-
Antivirus Configuratio... 00:04:17
-
Antivirus Configuration 00:04:17
-
Best Practices 00:02:26
-
Best Practices 00:02:26
-
Troubleshooting 00:01:23
-
Troubleshooting 00:01:23
-
DDOS Attack 00:11:06
-
DDOS Attack 00:11:06
-
Intrusion Prevention S... 00:19:35
-
Intrusion Prevention System 00:19:35
-
Denial Of Service 00:06:44
-
Denial Of Service 00:06:44
-
Web Application Firewa... 00:10:02
-
Web Application Firewall 00:10:02
-
Best Practices 00:03:05
-
Best Practices 00:03:05
-
Troubleshooting 00:02:52
-
Troubleshooting 00:02:52
-
SSL-VPN 00:14:52
-
SSL-VPN 00:14:52
-
SSL-VPN Deployment Mod... 00:12:41
-
SSL-VPN Deployment Modes 00:12:41
-
Configuring SSL-VPNs 00:06:24
-
Configuring SSL-VPNs 00:06:24
-
Realms and Personal Bo... 00:02:32
-
Realms and Personal Bookmarks 00:02:32
-
Hardening SSL-VPN Acce... 00:02:44
-
Hardening SSL-VPN Access 00:02:44
-
Monitoring and Trouble... 00:04:12
-
Monitoring and Troubleshooting 00:04:12
-
Fortigate Infrastructu... 00:01:10
-
Fortigate Infrastructure 00:01:10
-
Routing On Fortigate 00:15:45
-
Routing On Fortigate 00:15:45
-
Routing Monitor And Ro... 00:06:19
-
Routing Monitor And Route Attributes 00:06:19
-
Equal Cost Multipath R... 00:03:39
-
Equal Cost Multipath Routing 00:03:39
-
Reverse Path Forwardin... 00:06:16
-
Reverse Path Forwarding 00:06:16
-
Best Practices 00:04:55
-
Best Practices 00:04:55
-
Diagnostics 00:03:47
-
Diagnostics 00:03:47
-
What Is SD-WAN 00:05:50
-
What Is SD-WAN 00:05:50
-
Enterprise SD-WAN Use ... 00:09:20
-
Enterprise SD-WAN Use Cases 00:09:20
-
SD-WAN Configuration 00:01:30
-
SD-WAN Configuration 00:01:30
-
SD-WAN Load Balancing ... 00:00:59
-
SD-WAN Load Balancing Methods 00:00:59
-
SD-WAN Virtual Interfa... 00:01:50
-
SD-WAN Virtual Interface 00:01:50
-
SD-WAN Performance SLA 00:09:25
-
SD-WAN Performance SLA 00:09:25
-
SD-WAN Rules 00:07:03
-
SD-WAN Rules 00:07:03
-
SD-WAN Diagnostics 00:03:19
-
SD-WAN Diagnostics 00:03:19
-
Lab 00:13:00
-
Lab 00:13:00
-
VDOM Concepts 00:06:29
-
VDOM Concepts 00:06:29
-
VDOM Administrators 00:03:05
-
VDOM Administrators 00:03:05
-
Configuring VDOMs 00:05:00
-
Configuring VDOMs 00:05:00
-
Inter-VDOM Links 00:03:00
-
Inter-VDOM Links 00:03:00
-
Best Practices And Tro... 00:03:21
-
Best Practices And Troubleshooting 00:03:21
-
Virtual Local Area Net... 00:08:11
-
Virtual Local Area Networks 00:08:11
-
Transparent Mode 00:04:55
-
Transparent Mode 00:04:55
-
Virtual Wire Pairing 00:03:26
-
Virtual Wire Pairing 00:03:26
-
Software Switch 00:01:35
-
Software Switch 00:01:35
-
Spanning Tree Protocol 00:01:41
-
Spanning Tree Protocol 00:01:41
-
Best Practices 00:01:26
-
Best Practices 00:01:26
-
VPN Topologies 00:09:46
-
VPN Topologies 00:09:46
-
Site To Site VPN Confi... 00:17:05
-
Site To Site VPN Configuration 00:17:05
-
Best Practices And Tro... 00:06:39
-
Best Practices And Troubleshooting 00:06:39
-
FSSO Function And Depl... 00:04:34
-
FSSO Function And Deployment 00:04:34
-
FSSO With Active Direc... 00:07:19
-
FSSO With Active Directory 00:07:19
-
NTLM Authentication 00:04:14
-
NTLM Authentication 00:04:14
-
FSSO Settings 00:04:37
-
FSSO Settings 00:04:37
-
Troubleshooting 00:02:51
-
Troubleshooting 00:02:51
-
HA Operation Modes 00:08:42
-
HA Operation Modes 00:08:42
-
HA Cluster Synchroniza... 00:06:49
-
HA Cluster Synchronization 00:06:49
-
HA Failover And Worklo... 00:05:24
-
HA Failover And Workload 00:05:24
-
Monitoring and Trouble... 00:03:28
-
Monitoring and Troubleshooting 00:03:28
-
General Diagnosis 00:04:34
-
General Diagnosis 00:04:34
-
Debug Flow 00:01:24
-
Debug Flow 00:01:24
-
CPU And Memory 00:05:02
-
CPU And Memory 00:05:02
-
Firmware And Hardware 00:03:18
-
Firmware And Hardware 00:03:18
Item Reviews - 0
Submit Reviews
This Course Include:
- 13:47 Hours On-Demand Videos
- 123 Lessons
- Lifetime Access
- Access on Mobile and TV