Fortigate Firewall Training / Network Security Courses

Fortigate Firewall Training

fortigate firewall training in kochi

Fortigate is an American multinational corporation headquartered in Sunnyvale, California. It develops and markets cybersecurity software, firewalls, anti-viruses, intrusion prevention, and endpoint security. We have the training to deploy Fortigate's FortiGate Next-Generation firewall tool. You will learn how to block inappropriate websites into viruses on the network. You will learn how to block certain applications, such as BitTorrent and Skype, on your network. You will learn how to block certain files uploaded to the Internet. How will you learn how to enable remote access for users to access the network remotely?

Features

  • Deploy the appropriate operation mode for your network
  • Use the GUI and CLI for administration
  • Identify the characteristics of the Fortinet Security Fabric
  • Control network access to configured networks using firewall policies
  • Apply port forwarding, source NAT, and destination NAT
  • Authenticate users using firewall policies
  • Understand encryption functions and certificates
  • Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies

Syllabus

Module 1: Introduction to FortiGate and Network Security

  • Overview of Network Security Fundamentals
    • Firewall types and functions
    • Threats and mitigation strategies
  • Introduction to Fortinet and FortiGate
    • Fortinet Security Fabric
    • FortiGate models and deployment scenarios
  • Understanding FortiOS
    • Key features of FortiOS
    • Licensing and support

Module 2: FortiGate Basics

  • Initial Setup and Configuration
    • FortiGate hardware setup
    • Accessing the FortiGate GUI and CLI
    • Basic network settings and initial configuration
  • FortiGate Dashboard Overview
    • System information widgets
    • Monitoring tools and logs
  • Interface Configuration
    • Types of interfaces: physical, VLAN, and virtual
    • Configuring IP addresses and DHCP

Module 3: Firewall Policies

  • Policy Basics
    • Understanding security policies
    • Implicit deny and policy precedence
  • Creating and Managing Firewall Policies
    • Traffic inspection
    • Configuring NAT (SNAT and DNAT)
    • Logging and monitoring policies

Module 4: User Authentication

  • Authentication Concepts
    • Types of authentication: local, RADIUS, LDAP
    • Single Sign-On (SSO) integration
  • Configuring User Authentication
    • Creating user accounts and groups
    • Enforcing authentication in policies

Module 5: Virtual Private Networks (VPNs)

  • IPsec VPN Configuration
    • Site-to-site VPN setup
    • Remote access VPN
  • SSL VPN Configuration
    • Portal customization
    • Split tunneling
  • Troubleshooting VPNs

Module 6: Advanced Security Features

  • Intrusion Prevention System (IPS)
    • Understanding signatures and actions
    • Configuring IPS profiles
  • Application Control
    • Identifying and controlling applications
    • Creating application control policies
  • Web Filtering
    • URL filtering and categorization
    • Configuring and customizing web filter profiles
  • Antivirus and Antimalware
    • On-access and on-demand scanning
    • Configuring antivirus profiles

Module 7: High Availability and Scalability

  • High Availability (HA)
    • Active-passive and active-active modes
    • Configuring HA clusters
  • Load Balancing
    • Load balancing concepts and configuration
    • Monitoring and failover

Module 8: Logging and Monitoring

  • FortiView and Logging
    • Real-time traffic analysis
    • Customizing FortiView dashboards
  • Log Management
    • Configuring log settings and storage
    • Integrating with FortiAnalyzer
  • Reporting
    • Generating custom reports
    • Scheduling automated reports

Module 9: Troubleshooting and Maintenance

  • Common Troubleshooting Techniques
    • Diagnostic tools: ping, traceroute, packet capture
    • Debugging commands
  • Firmware Management
    • Upgrading and downgrading firmware
    • Managing firmware versions and backups
  • Backup and Restore
    • Configuration backup methods
    • Restoring configurations

Module 10: Real-World Deployment Scenarios

  • Case Studies
    • Configuring FortiGate for small to medium businesses
    • Securing branch offices with FortiGate
    • Integrating FortiGate with cloud services
  • Best Practices
    • Security hardening
    • Regular audits and compliance

Module 11: Certification Preparation (Optional)

  • Fortinet NSE 4 Exam Preparation
    • Exam objectives and study materials
    • Practice tests and hands-on labs
  • Additional Certifications
    • Overview of Fortinet NSE 5-8 certifications