We may earn an affiliate commission when you visit our partners.
Course image
Coursera logo

Enterprise Firewall Administrator

Fortinet Training Institute

In this course, you will learn how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices.

Enroll now

What's inside

Syllabus

Introduction to Network Security Architecture
In this lesson, you will learn about the architecture of FortiOS.
Central Management
In this lesson, you will learn about using FortiManager for the central administration of all FortiGate devices in an enterprise network.
Read more
FortiGuard and Security Profiles
In this lesson, you will learn about FortiGuard, web filtering, antivirus, and application control. You will also learn how FortiManager is acting as a local FortiGuard server and use with web filtering.
Intrusion Prevention System
In this lesson, you will learn about the intrusion prevention system (IPS).
IPsec VPN
In this lesson, you will learn about IPsec.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches skills, knowledge, and tools appropriate for an enterprise setting, which is standard in the security industry
Ideal for network security professionals
Introduces FortiOS architecture, which is fundamental to understanding this topic
Covers various FortiGate devices, which is essential knowledge for managing enterprise security
Provides in-depth knowledge of central administration using FortiManager, which is a crucial skill for managing multiple security devices

Save this course

Save Enterprise Firewall Administrator to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Enterprise Firewall Administrator with these activities:
Fortinet Beginners Tutorial
Can provide you with a foundation in the topic before the course starts
Show steps
  • Find beginner-friendly tutorials on Fortinet networking
  • Follow the tutorials and take notes on key concepts
  • Practice configuring basic Fortinet security policies
Review Course Prerequisites
Can help you refresh your understanding of networking concepts and prepare for the course
Show steps
  • Review basic networking concepts
  • Review concepts of firewall security
  • Review concepts of security policies
Design a Network Security Diagram
Can help you visualize and understand the concepts of network security
Show steps
  • Identify the different components of a network security architecture
  • Draw a diagram that illustrates the flow of traffic and the placement of security devices
  • Label the diagram with appropriate descriptions and explanations
Five other activities
Expand to see all activities and additional details
Show all eight activities
FortiGate Firewall Configuration Exercises
Can help you develop hands-on experience in configuring Fortinet firewalls
Show steps
  • Set up a lab environment with FortiGate devices
  • Follow guided exercises to configure basic firewall policies
  • Troubleshoot common firewall issues
Organize Course Materials
Can support better organization and retention of learned materials
Show steps
  • Review all available course materials, including lectures, notes, and assignments
  • Categorize and organize materials by topic
  • Create a study plan that incorporates the organized materials
Fortinet Security Workshop
Can provide you with practical experience and networking opportunities
Show steps
  • Attend a Fortinet Security workshop or webinar
  • Engage with instructors and other attendees
  • Practice configuring and troubleshooting Fortinet security solutions
Summarize a Fortinet Whitepaper
Can enhance your understanding of advanced security topics
Show steps
  • Choose a Fortinet whitepaper on a topic of interest
  • Read the whitepaper and extract key points
  • Create a summary that includes the main findings and your own insights
Assist Other Learners
Can strengthen your understanding of the concepts by explaining them to others
Show steps
  • Participate in online forums or discussion groups
  • Answer questions from other learners
  • Provide guidance and support to those struggling with the material

Career center

Learners who complete Enterprise Firewall Administrator will develop knowledge and skills that may be useful to these careers:
Network Administrator
Network Administrators plan, implement, and maintain computer networks. This course may be useful for Network Administrators because it provides an introduction to network security architecture and how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's computer networks and systems, and investigate and respond to cybersecurity incidents. This course may be useful for Information Security Analysts because it provides an introduction to network security architecture and how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices.
DevSecOps Engineer
DevSecOps Engineers integrate security into the software development process. This course may be useful for DevSecOps Engineers because it provides an introduction to network security architecture and how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices.
Security Engineer
Security Engineers design, implement, and maintain security measures to protect an organization's computer networks and systems. This course may be useful for Security Engineers because it provides an introduction to network security architecture and how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices.
Cybersecurity Analyst
Cybersecurity Analysts investigate and respond to cybersecurity incidents, and develop and implement security measures to protect an organization's computer networks and systems. This course may be useful for Cybersecurity Analysts because it provides an introduction to network security architecture and how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices.
Security Consultant
Security Consultants help organizations develop and implement security measures to protect their computer networks and systems. This course may be useful for Security Consultants because it provides an introduction to network security architecture and how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices.
System Administrator
System Administrators maintain and repair computer systems and networks. This course may be useful for System Administrators because it provides an introduction to network security architecture and how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices.
Cloud Security Engineer
Cloud Security Engineers design, implement, and maintain security measures to protect an organization's cloud-based systems and data. This course may be useful for Cloud Security Engineers because it provides an introduction to network security architecture and how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices.
Network Security Analyst
Network Security Analysts are responsible for securing computer networks from unauthorized access, use, disclosure, disruption, modification, or destruction. This course may be useful for Network Security Analysts because it provides an introduction to network security architecture and how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices.
Penetration Tester
Penetration Testers identify and exploit vulnerabilities in computer networks and systems. This course may be useful for Penetration Testers because it provides an introduction to network security architecture and how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices.
Security Architect
Security Architects design and implement security measures to protect an organization's computer networks and systems. This course may be useful for Security Architects because it provides an introduction to network security architecture and how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices.
Security Researcher
Security Researchers identify and develop new security measures to protect computer networks and systems. This course may be useful for Security Researchers because it provides an introduction to network security architecture and how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices.
Forensic Analyst
Forensic Analysts investigate and analyze computer systems and networks to identify and collect evidence of cybercrimes. This course may be useful for Forensic Analysts because it provides an introduction to network security architecture and how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices.
Security Manager
Security Managers are responsible for developing and implementing an organization's security strategy. This course may be useful for Security Managers because it provides an introduction to network security architecture and how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices.
Chief Information Security Officer
Chief Information Security Officers are responsible for developing and implementing an organization's information security strategy. This course may be useful for Chief Information Security Officers because it provides an introduction to network security architecture and how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Enterprise Firewall Administrator.
Provides a comprehensive overview of network security management, which is essential for ensuring that an enterprise network is secure.
Provides a detailed overview of virtual private networks, which are essential for securing remote access to an enterprise network.
Provides a comprehensive overview of network security auditing, which is essential for ensuring that an enterprise network is secure.
Provides a detailed overview of firewalls and intrusion detection systems, including their history, architecture, and implementation. It valuable resource for anyone who wants to learn more about these essential security technologies.
Provides an overview of the architecture of network security, including firewalls, intrusion detection systems, and virtual private networks.
Provides a comprehensive overview of intrusion prevention systems, which are essential for detecting and preventing attacks.
Provides a comprehensive overview of network security, including firewalls, intrusion detection systems, and virtual private networks.
Provides a comprehensive overview of firewalls and intrusion detection systems, which are essential for protecting an enterprise network.
Provides a comprehensive overview of security policies and procedures, including their development, implementation, and enforcement. It valuable resource for anyone who wants to learn more about how to create and manage effective security programs.
Provides a unique perspective on network security by exploring the techniques used by hackers. It valuable resource for anyone who wants to learn more about how to protect their networks from attack.
Provides a technical overview of intrusion detection systems and firewalls, including their design, implementation, and evaluation. It valuable resource for anyone who wants to learn more about these essential security technologies.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser