The Administration, Content Inspection and SSL VPN course provides 2 days of instructor-led online training where participants will gain an introduction to the configuration and administration of the FortiGate Unified Threat Management appliance. Instruction is provided in real time over the web through supported browsers; students can participate from any computer with an Internet connection.

The lecture and demonstration components of the classroom are presented by a Fortinet-certified trainer. Through a variety of hands-on labs, students will learn about some of the most commonly used features of the FortiGate unit. A virtual lab environment allows student to access the FortiGate devices required for the hands-on exercises without requiring physical Fortinet hardware.

Participants will gain a solid understanding of how to integrate the FortiGate unit into their existing environment, and the operational maintenance involved to ensure optimal performance and full protection of their corporate assets.

Target Audience

  • This introductory-level course is intended for anyone who is responsible for the day-to-day administration and management of a FortiGate unit. Students must be familiar with the topics presented in this course before attending the FortiGate Multi-Threat SecuritySystems II - Secured Network Deployment and IPSec VPNcourse.


Upon completion of this course, students will be able to:

  • Describe the capabilities of the FortiGate Unified Threat Management appliance.
  • Use Web Config and CLI to complete administration and maintenance tasks.
  • Understand the basic differences between the NAT/Route and Transparent operational modes.
  • Implement logging to a FortiAnalyzer appliance.
  • Construct firewall policies to control traffic passing through the FortiGate unit.
  • Implement SSL VPNs to offer secure access to private networks.
  • Implement threat management filtering including antivirus, email filtering, web filtering, data leak prevention, application control and endpoint control.

Course Outline

AGENDA - Day 1
Introduction to Fortinet Unified Threat Management

  • Unified Threat Management
  • The Fortinet Solution
  • FortiGate Capabilities and Components
  • Device Administration
  • Initial Device Configuration

Logging and Monitoring

  • Logging Levels
  • Log Storage Locations
  • Log Types
  • Viewing Log Files
  • Content Archiving
  • Alert Email
  • SNMP
  • Logging to a FortiAnalyzer device
  • FortiGate Reporting

Firewall Policies

  • Policy Matching
  • Firewall Policy Elements
  • Identity-Based Policies
  • Threat Management
  • Traffic Shaping
  • Load Balancing
  • Virtual IPs
  • Denial of Service Policies
  • Object Tagging
  • Local User Authentication
  • Authentication Methods
  • Authentication Groups
  • Local and Remote Users
  • User Groups
  • Identity-Based Policies
  • Authentication Rules
  • Disclaimers
  • Password Policies
  • Two-Factor Authentication
  • FortiToken Administration
  • FortiGate VPN
  • SSL VPN Operating Modes
  • User Groups
  • Portals
  • SSL VPN Firewall Policies
  • Client Integrity Checking

AGENDA - Day 2

  • Virus Types
  • Antivirus Elements
  • File Filters
  • Virus Databases
  • Grayware
  • Quarantine
  • Antivirus Profiles

Email Filtering

  • Email Filtering Actions
  • Email Filtering Methods
  • FortiGuard Email Filters
  • Banned Word
  • IP Address Filtering

Email Address Filtering

  • Multipurpose Internet Mail Extensions (MIME) Headers Check
  • DNS Blackhole List and Open Relay Database List
  • Email Filter Profiles
  • FortiMail Email Filtering

Web Filtering

  • Web Filtering Elements
  • Web Content Filter
  • Flow-based Web Filtering
  • URL Filters
  • FortiGuard Web Filter
  •  Web Filtering Quotas
  • Overrides
  • Local Ratings
  • Local Categories
  • Web Filter Profiles
  • Data Leak Prevention
  • Monitored Data Types
  • Document Fingerprinting
  • Data Leak Preventions Rules
  • Data Leak Prevention Sensors
  • File Type/Pattern Filtering

Application Control

  • Application Types
  • Application Control Lists
  • Application Control Profiles

Endpoint Control

  • Endpoint Detection Lists
  • FortiClient Compliance
  • Application Detection
  • Endpoint Control Profiles
  • Vulnerability Scanning
  • Monitoring Endpoints

EquiTrain –a pision of Equinox International- equips organizations with IT skills that are the lifeblood of modern corporate life, as Theyll as the professional expertise required for ensuring productivity and to remain competitive now and tomorrow.

At EquiTrain, They tailor end-to-end training solutions that incorporate both IT and business consultancy to the specific needs of each inpidual customer. They can equip yTheir IT professionals with all they need to quickly maximize yTheir new technology investments as Theyll as pushing forward absolute beginners on their road to IT proficiency.

They offer a broad range of IT and Management training cTheirses and certifications from top technology vendors with a choice of on-site or offsite, public or closed and local or abroad training. Their portfolio of cTheirses is supplemented by Their strategic training alliance with world's leading providers of learning solutions.

See all Equitrain courses

Contact information not available.

Courses you can instantly connect with...
Hospital Major Incident Medical Management And Support HMIMMS Vocational Harvest Consultancy Cisco Secure Access Control Server vv2.0 Equitrain

Is this the right course for you?

Rate our content

Didn't find what you were looking for ?