NSE 4 FortiGate Security
Overview
Fortinet NSE4 program is available in Instructor Led and Virtual training Made up of;
- FortiGate Security - 3 days training
- FortiGate Infrastructure - 2 days training
Course Content/Exam(s)
Course Code | Description | Exam Code | Duration |
---|---|---|---|
FORTIGATE I $ II | FORTINET-NSE-4.pdf | NSE4 | 5 Days |
Course Benefits
After completing this course, you should be able to:- Deploy the appropriate operation mode for your network
- Use the GUI and CLI for administration
- Identify the characteristics of the Fortinet Security Fabric
- Control network access to configured networks using firewall policies
- Apply port forwarding, source NAT, and destination NAT
- Authenticate users using firewall policies
- Understand encryption functions and certificates
- Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies
- Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites
- Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports
- Fight hacking and denial of service (DoS)
- Offer an SSL VPN for secure access to your private network
- Implement a dialup IPsec VPN tunnel between FortiGate and FortiClient
- Collect and interpret log entries
- Analyze a FortiGate route table
- Route packets using policy-based and static routes for multipath and load -balanced deployments
- Configure SD-WAN to load balance traffic between multiple WAN links effectively
- Inspect traffic transparently, forwarding as a Layer 2 device
- Divide FortiGate into two or more virtual devices, each operating as an independent FortiGate, by configuring virtual domains (VDOMs)
- Establish an IPsec VPN tunnel between two FortiGate devices
- Compare policy-based to route-based IPsec VPN
- Implement a meshed or partially redundant VPN
- Diagnose failed IKE exchanges
- Offer Fortinet Single Sign-On (FSSO) access to network services, integrated with Microsoft Active Directory (AD)
- Deploy FortiGate devices as an HA cluster for fault tolerance and high performance
- Deploy implicit and explicit proxy with firewall policies, authentication, and caching
- Diagnose and correct common problems