FortiGate Security 7.0 Course Description-Online

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Course Description

FortiGate Security

In this course, you will learn how to use basic FortiGate features, including security
profiles.

In interactive labs, you will explore firewall policies, the Fortinet Security Fabric,
user authentication, SSL VPN, and how to protect your network using security
profiles, such as IPS, antivirus, web filtering, application control, and more. These
administration fundamentals will provide you with a solid understanding of how to
implement basic network security.

Product Version
FortiOS 7.0

Course Duration
l Lecture time (estimated): 10 hours
l Lab time (estimated): 7 hours
l Total course duration (estimated): 17 hours / 3 days

Who Should Attend


Networking and security professionals involved in the management, configuration, administration, and monitoring of
FortiGate devices used to secure their organizations' networks should attend this course.

You should have a thorough understanding of all the topics covered in the FortiGate Security course before
attending the FortiGate Infrastructure course.

Certification
This course and the FortiGate Infrastructure course are intended to help you prepare for the NSE 4 certification
exam.

1/27/2022

https://training.fortinet.com
FortiGate Security 7.0 Course Description

Prerequisites Training Delivery Options and SKUs


l Knowledge of network protocols Instructor-Led Training
l Basic understanding of firewall concepts Includes standard NSE training content delivered in
person onsite, or live online using a virtual classroom
Agenda application. Training is delivered within public classes
or as a private class. Private requests are scoped,
1. Introduction and Initial Configuration quoted, developed, and delivered by Fortinet Training
2. Security Fabric (minimum quantities apply).
3. Firewall Policies Use the following ILT Training SKU to purchase
4. Network Address Translation (NAT) scheduled public classes of this course through
5. Firewall Authentication Fortinet Resellers or Authorized Training Partners:
6. Logging and Monitoring FT-FGT-SEC
7. Certificate Operations
Self-Paced Training
8. Web Filtering
9. Application Control Includes online training videos and resources through
the NSE Training Institute library, free of charge.
10. Antivirus
11. Intrusion Prevention and Denial of Service You can purchase on-demand lab access with
12. SSL VPN interactive, hands-on activities using the following
methods:
l Credit card, through the course on the NSE Training
Objectives
Institute
After completing this course, you will be able to: l Purchase order (PO), through Fortinet Resellers or
Authorized Training Partners
l Deploy the appropriate operation mode for your network
l Use the GUI and CLI for administration After you complete the purchase, you receive lab
access and the accompanying lab guide within the self-
l Identify the characteristics of the Fortinet Security Fabric
paced course.
l Control network access to configured networks using
firewall policies Use the following on-demand lab training SKU to
l Apply port forwarding, source NAT, and destination NAT purchase lab access using a PO:
l Authenticate users using firewall policies FT-FGT-SEC-LAB
l Understand encryption functions and certificates See Purchasing Process for more information about
l Inspect SSL/TLS-secured traffic to prevent encryption purchasing Fortinet training products.
used to bypass security policies
l Configure security profiles to neutralize threats and
misuse, including viruses, torrents, and inappropriate
(ISC)2
websites l CPE training hours: 10
l Apply application control techniques to monitor and l CPE lab hours: 7
control network applications that might use standard or
non-standard protocols and ports
l CISSP domains: Security Operations
l Fight hacking and denial of service (DoS)
l Offer an SSL VPN for secure access to your private Program Policies and FAQs
network
For questions about courses, certification, or training
l Collect and interpret log entries
products, refer to Program Policy Guidelines or
Frequently Asked Questions.

You might also like