• Course Overview

    In this two-day course, you will learn how to use advanced fort iGATE networking and security. Topics include features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, site-to-site IPsec VPN, SSO, web proxy, and diagnostics.

    Part 1: NSE 4 Fort iGATE infrastructure

     

    Course Overview

    In this two-day course, you will learn how to use advanced fort iGATE networking and security. Topics include features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, site-to-site IPsec VPN, SSO, web proxy, and diagnostics.

    Course Outline

    • Routing

    • Software-Defined WAN (SD-WAN)

    • Virtual Domains

    • Layer 2 Switching

    • Site-to-Site IPsec VPN

    • Fortinet Single Sign-On (FSSO)

    • High Availability (HA)

    • Web Proxy

    • Diagnostics

    Course Outcomes

    After completing these modules, you will be able to:

     

    • Analyze a fort iGATE’s route table.

    • Route packets using policy-based and static routes for multi-path and load balanced deployments.

    • Configure SD-WAN to load balance traffic between multiple WAN links effectively.

    • Inspect traffic transparently, forwarding as a Layer 2 device.

    • Divide fort iGATE into two or more virtual devices, each operating as an independent fort iGATE, by configuring virtual domains (VDOMs).

    • Establish an IPsec VPN tunnel between two Fort iGATE appliances.

    • Compare policy-based to route-based IPsec VPN.

    • Implement a meshed or partially redundant VPN.

    • Diagnose failed IKE exchanges.

    • Offer Fortinet Single Sign On (FSSO) access to network services, integrated with Microsoft Active Directory.

    • Deploy Fort iGATE devices as an HA cluster for fault tolerance and high performance.

    • Deploy implicit and explicit proxy with firewall policies, authentication, and caching.

    • Diagnose and correct common problems.

    Audience profiles

    • Networking and security professionals involved in the design, implementation, and administration of a network infrastructure using Fort iGATE appliances.

    Prerequisites

    • Knowledge of OSI layers

    • Knowledge of firewalling concepts in an IPv4 network

    • Knowledge of the fundamentals of Fort iGATE, as presented in the Fort iGATE Security course

     

    This course assumes knowledge of basic Fort iGATE fundamentals. Participants should have a thorough understanding of all the topics covered in the Fort iGATE Security course before attending the Fort iGATE Infrastructure course.

Part 2: NSE 4 FortiGate Security

Course Overview

In this three-day course, you will learn how to use basic FortiGate features, including security profiles. In interactive labs, you will explore firewall policies, user authentication, SSL VPN, dial-up IPsec VPN, and how to protect your network using security profiles such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement basic network security.

Course Outline

1. Introduction to FortiGate and the Security Fabric

2. Firewall Policies

3. Network Address Translation (NAT)

4. Firewall Authentication

5. Logging and Monitoring

6. Certificate Operations

7. Web Filtering

8. Application Control

9. Antivirus

10. Intrusion Prevention and Denial of Service

11. SSL VPN

12. Dialup IPsec VPN

13. Data Leak Prevention (DLP)

Course Outcomes

After completing these courses, you will be able to:

 

• Deploy the appropriate operation mode for your network.

• Use the GUI and CLI for administration.

• Identify the characteristics of the Fortinet security fabric.

• Control network access to configured networks using firewall policies.

• Apply port forwarding, source NAT, and destination NAT.

• Authenticate users using firewall policies.

• Understand encryption functions and certificates.

• Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies.

• Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites.

• Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports.

• Fight hacking and denial of service (DoS).

• Defend against data leaks by identifying files with sensitive data, and block them from leaving your private network.

• Offer an SSL VPN for secure access to your private network.

• Implement a dialup IPsec VPN tunnel between FortiGate and FortiClient.

• Collect and interpret log entries.

Audience profiles

Networking and security professionals involved in the management, configuration, administration and monitoring of FortiGate devices used to secure their organizations’ networks.

Prerequisites

• Knowledge of network protocols

• Basic understanding of firewall concepts

Participants should have a thorough understanding of all the topics covered in the FortiGate Security course before attending the FortiGate Infrastructure course.


SecureWay advises and supports businesses with a global service package designed to meet their IT security needs. SecureWay is a company specialized in cybersecurity and information security to offer a full range of services in the security field such as :
• Cybersecurity.
• Secure Infrastructure.
• Red Teaming Services (RTS).
• Governance, Risk & Compliance (GRC).
• Awareness & Training.

Our team members are extremely trained and experienced with past exposure in the corporate world as distinguished professionals.

Read More

Contact Us