• Classroom
  • Online, Instructor-Led
Course Description

FortiGate Bootcamp is a comprehensive course where you will learn how to use advanced FortiGate features, including both networking and security. This course includes instruction and hands-on labs with the goal of teaching the concepts of FortiGate Administrator followed by learning reinforcement using the self-directed FortiGate Immersion labs. The intent of the course is to best prepare you for passing the NSE 4 certification exam.

Learning Objectives

  • Configure FortiGate basic networking from factory default settings
  • Configure and control administrator access to FortiGate
  • Use the GUI and CLI for administration
  • Control network access to configured networks using firewall policies
  • Apply port forwarding, source NAT, and destination NAT
  • Analyze a FortiGate route table
  • Route packets using policy-based and static routes for multi-path and load-balanced deployments
  • Authenticate users using firewall policies
  • Monitor firewall users from the FortiGate GUI
  • Offer Fortinet Single Sign-On (FSSO) access to network services, integrated with Microsoft Active Directory (AD)
  • Understand encryption functions and certificates
  • Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies
  • Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites
  • Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports
  • Offer an SSL VPN for secure access to your private network
  • Establish an IPsec VPN tunnel between two FortiGate devices
  • Configure static routing
  • Configure SD-WAN underlay, overlay, and, local breakout
  • Identify the characteristics of the Fortinet Security Fabric
  • Deploy FortiGate devices as an HA cluster for fault tolerance and high performance
  • Diagnose and correct common problems
  • Use the GUI and CLI for administration
  • Control access to network resources using firewall policies
  • Authenticate users using firewall policies
  • Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies
  • Apply web filter and application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports
  • Protect your network against known attacks using IPS signatures
  • Mitigate and block DoS attacks
  • Configure SSL VPN and IPSec VPN for remote access
  • Route packets using ECMP routing
  • Deploy FortiGate devices as an HA cluster for fault tolerance and high performance
  • Configure the Fortinet Security Fabric

Framework Connections