- Lectures: 36
- Students: 3
FORTINET: FortiGate Firewall Training (NSE4)
Description
The Network Security Professional designation recognizes your ability to install and manage the day-to-day configuration, monitoring, and operation of a FortiGate device to support specific corporate network security policies
Table of Contents
Chapter 0: Course Introduction and Admin Guide (Preview)
Chapter 1: Overview of Firewall Technologies
Chapter 2: Enterprise Firewall Solution overview
Chapter 3: Security Fabric
Chapter 4: FortiGate Firewall Features
Chapter 5: Performing initial Configuration
Chapter 6: Firewall Security Policy
Chapter 7: Network Address Translation
Chapter 8: Policy Based Vs Central SNAT
Chapter 9: Inspection Mode – Proxy and Flow Based
Chapter 10: NAT (Routed) Mode Vs Transparent Mode
Chapter 11: Virtual Wire Pair and one armed sniffer
Chapter 12: SSL Inspection and Digital Certificate
Chapter 13: Application Control and Web Filter – Security Profiles
Chapter 14: Intrusion Prevention System (IPS)
Chapter 15: Virtual Domain (VDOM)
Chapter 16: Routing with Fortigate Firewall
Chapter 17: Equal Cost Multipath (ECMP
Chapter 18: Software Defined WAN (SDWAN) Basics
Chapter 19: Understanding IPsec Site to Site VPN
Chapter 20: Configuring Site to Site IPsec VPN
Chapter 21: Remote Access VPN
Chapter 22: High Availability
Chapter 23: Packet Flow Logic
Chapter 24: Command Line Interface
Chapter 25: Firewall Admin Guide (PDF)
-
Chapter 0: Course Introduction and Admin Guide (Preview)
-
Chapter 1: Overview of Firewall Technologies
-
Lecture 2.1Overview of Firewall Technologies
-
-
Chapter 2: Enterprise Firewall Solution overview
-
Lecture 3.1Enterprise Firewall Solution overview
-
-
Chapter 3: Fortinet Security Fabric
-
Lecture 4.1Fortinet Security Fabric
-
-
Chapter 4: FortiGate Firewall Features
-
Lecture 5.1FortiGate Firewall Features
-
-
Chapter 5: Performing initial Configuration
-
Lecture 6.1Performing initial Configuration (Part 1)
-
Lecture 6.2Performing initial Configuration (Part 2)
-
-
Chapter 6: Firewall Security Policy
-
Lecture 7.1Firewall Security Policy
-
-
Chapter 7: Network Address Translation
-
Lecture 8.1Network Address Translation (Part 1)
-
Lecture 8.2Network Address Translation (Part 2)
-
Lecture 8.3Network Address Translation (Part 3)
-
-
Chapter 8: Policy Based Vs Central SNAT
-
Lecture 9.1Policy Based Vs Central SNAT
-
-
Chapter 9: Inspection Mode - Proxy and Flow Based
-
Lecture 10.1Inspection Mode – Proxy and Flow Based
-
-
Chapter 10: NAT (Routed) Mode Vs Transparent Mode
-
Lecture 11.1NAT (Routed) Mode Vs Transparent Mode
-
-
Chapter 11: Virtual Wire Pair and one armed sniffer
-
Lecture 12.1Virtual Wire Pair and one armed sniffer (Part 1)
-
Lecture 12.2Virtual Wire Pair and one armed sniffer (Part 2)
-
-
Chapter 12: SSL Inspection and Digital Certificate
-
Lecture 13.1SSL Inspection and Digital Certificate
-
-
Chapter 13: Application Control and Web Filter - Security Profiles
-
Lecture 14.1Application Control and Web Filter – Security Profiles
-
-
Chapter 14: Intrusion Prevention System (IPS)
-
Lecture 15.1Intrusion Prevention System (IPS)
-
-
Chapter 15: Virtual Domain (VDOM)
-
Lecture 16.1Virtual Domain (VDOM)
-
-
Chapter 16: Routing with Fortigate Firewall
-
Lecture 17.1Routing with Fortigate Firewall (Part 1)
-
Lecture 17.2Routing with Fortigate Firewall (Part 2)
-
Lecture 17.3Routing with Fortigate Firewall (Part 3)
-
-
Chapter 17: Equal Cost Multipath (ECMP)
-
Lecture 18.1Equal Cost Multipath (ECMP)
-
-
Chapter 18: Software Defined WAN (SDWAN) Basics
-
Lecture 19.1Software Defined WAN Basics (Part 1)
-
Lecture 19.2Software Defined WAN Basics (Part 2)
-
-
Chapter 19: Understanding IPsec Site to Site VPN
-
Lecture 20.1Understanding IPsec Site to Site VPN (Part 1)
-
Lecture 20.2Understanding IPsec Site to Site VPN (Part 2)
-
-
Chapter 20: Configuring Site to Site IPsec VPN
-
Lecture 21.1Configuring Site to Site IPsec VPN (Part 1)
-
Lecture 21.2Configuring Site to Site IPsec VPN (Part 2)
-
-
Chapter 21: Remote Access VPN
-
Lecture 22.1Remote Access VPN
-
-
Chapter 22: High Availability
-
Lecture 23.1High Availability
-
-
Chapter 23: Packet Flow Logic
-
Lecture 24.1Packet Flow Logic
-
-
Chapter 24: Command Line Interface
-
Lecture 25.1Command Line Interface
-
-
Chapter 25: FortiGate Admin Guide (PDF)
-
Lecture 26.1FortiGate Admin Guide (PDF)
-