TypeClassroom Training
Time3 Days

Contact Us

Fields marked with an * are required


Trainings Schedule

Fortinet Customized Training Course & Certification

Fortinet Customized Training Course & Certification


Audience & Prerequisites


Fortinet Customized Training

Fortinet is an American multinational corporation headquartered in Sunnyvale, California. It develops and markets cybersecurity software, appliances and services, such as firewalls, anti-virus, intrusion prevention and endpoint security, among others. It is the fourth-largest network security company by revenue.

Pre-requisites for Fortinet Course

Students should enter the class with a basic understanding of business networking and security issues

For more info contact us.

Give Your Reviews on this Course

89 + 8 =


Section 1Introduction to fortinet
Lecture 1Understanding Features of Fortigate
Lecture 2Understanding Fortigaurd Queries & Packages
Lecture 3Initial Configuration
Lecture 4Upgrading Firmware
Lecture 5Backup & Restore
Lecture 6Configuring DHCP
Section 2Firewall Policies
Lecture 7Implicit vs Explicit Policies
Lecture 8Understanding Firewall Components
Lecture 9Understanding NAT
Lecture 10Configuring Source NAT
Lecture 11Configuring DNAT using Virtual Server
Section 3Authentication
Lecture 12Understanding Authentication Protocols
Lecture 13Integrating Active Directory Server
Lecture 14Integrating Radius Server
Lecture 15Create Authentication Policies
Lecture 16Configure Captive Portal
Lecture 17Monitor firewall Users
Section 4SSL VPN
Lecture 18Understanding SSL Architecture
Lecture 19Operation Modes of SSL
Lecture 20Configuring SSL VPN WebMode
Lecture 21Configuring Bookmark
Lecture 22Configure firewall policies for SSL VPN
Lecture 23Monitor SSL Users
Section 5Basic IPSEC VPN
Lecture 24Understanding Architecture of IPSEC
Lecture 25Understanding IKE Phase 1 & 2
Lecture 26Understanding SAD,SPD
Lecture 27Configure IPSEC between two networks
Lecture 28Monitor VPN Traffic
Section 6Antivirus
Lecture 29Types of Virus & Malware
Lecture 30Proxy based vs flow based scans
Lecture 31Forti Sandbox
Lecture 32Submit virus sample to fortiguard
Lecture 33Configure Antivirus scanning
Lecture 34Identify order of Evaluation
Section 7Explicit Proxy
Lecture 35Implicit vs Explicit Proxy
Lecture 36Configuring Explicit Proxy
Lecture 37PAC vs WPAD
Lecture 38Configuring Web cache
Lecture 39Monitor Proxy Users
Section 8Webfilter
Lecture 40Understanding Fortigate Webfiltering Mechanism
Lecture 41Configuring Content Filtering
Lecture 42Configuring URL Filtering
Lecture 43Configuring Web filter overrides
Lecture 44Monitor Webfilter logs
Section 9Application Control
Lecture 45Updating Application Control Database
Lecture 46Configuring Application control profile
Lecture 47Traffic Shaping
Lecture 48Logging Application control events
Section 10Logging & Monitoring
Lecture 49Understanding Log severity levels
Lecture 50Understanding Logs & Sublog types
Lecture 51Understanding Log structures
Lecture 52Configuring log settings
Lecture 53Configuring Forticloud
Lecture 54Redirect logs to Syslog & SNMP
Section 11Routing
Lecture 55Interpret Routing Tables
Lecture 56Configuring Wan Link load balance
Lecture 57Configuring RPF
Lecture 58Overriding Static route using Policy base routing
Lecture 59Diagnose Routing Issues
Section 12Virtual Domains
Lecture 60Understanding VDOM, VDOM resource vs Global resource
Lecture 61Configuring Independent VDOM
Lecture 62Configuring Management through VDOM
Lecture 63Configuring Intervdom Links
Lecture 64Monitoring VDOM Traffic
Section 13Transparent Mode
Lecture 65Changing Operation Mode
Lecture 66Configuring Forward Domains
Lecture 67Configuring Port pairing
Lecture 68Implementing Security Profiles
Lecture 69Monitor Mac Table
Section 14High Availability
Lecture 70Understanding Active-Active, Active-Passive modes
Lecture 71Implementing HA Solution
Lecture 72Configuring Session Synchronization
Lecture 73Configuring FGSP
Lecture 74Upgrading Firmware on a cluster
Lecture 75Monitor HA Statistics
Section 15Advance IPSEC VPN
Lecture 76Differentiate Main Mode & Aggressive Mode
Lecture 77Deploy a remote access vpn using Forticlient
Lecture 78Configure redundant VPN
Lecture 79Diagnose VPN Tunnels
Section 16Intrusion Prevention system
Lecture 80Choose IPS Signatures
Lecture 81Configure Anomaly based Detection
Lecture 82Configure signature based detection
Lecture 83Configure DOS Sensor
Lecture 84Monitor & Recognize Attacks using IPS
Section 17FSSO
Lecture 85Understanding FSSO
Lecture 86DC Agent Vs Polling mode
Lecture 87Configure DC agent
Lecture 88Monitor FSSO logins
Section 18Certificate Operations
Lecture 89Generating a CSR
Lecture 90Importing CRL into Fortigate
Lecture 91Configuring SSL/SSH inspection
Lecture 92Generating Self signed Certificate
Lecture 93Enable SSL Inspection in fortigate
Section 19Data Leakage Prevention
Lecture 94Understanding Function of DLP
Lecture 95Filter files & Messages
Lecture 96Fingerprinting
Lecture 97Watermark Based inspection
Section 20Diagnostics
Lecture 98Identifying Normal Behavior
Lecture 99Understanding Traffic flow
Lecture 100Connectivity Troubleshooting
Lecture 101Diagnose Resource Issues
Lecture 102Testing Firmware Without Installing
Section 21Hardware Acceleration
Lecture 103Understanding ASIC
Lecture 104Understanding NP, SP, CP, SOC
Lecture 105Offloading Sessions to NP
Lecture 106Configure Content Inspection using CP
Lecture 107Configure Antivirus Inspection using SP
Section 22Troubleshooting
Lecture 108System Resources
Lecture 109Network Troubleshooting
Lecture 110Firewall Policies
Lecture 111Firewall Authentication
Lecture 112FSSO
Lecture 113IPsec
Lecture 114Security Profiles
Lecture 115Explicit Web Proxy
Lecture 116Operation Modes
Lecture 117External BGP
Lecture 118OSPF
Lecture 119HA