We may earn an affiliate commission when you visit our partners.
Course image
Daniel Botescu

Course updated with new information and new activities. See below.

Read more

Course updated with new information and new activities. See below.

Today we live in a world where network and cyber security are two of the most important subjects. Everyone is talking about them, about how to protect the network and how to protect end-users against malicious attackers.

Network security is one of the big trends with unparalleled growth, because the number and severity of attacks in increasing everyday. Businesses all around the globe are finding out the hard way that if you are not paying attention to how you secure your IT infrastructure, you stand to lose not only huge amounts of money, but also you can lose your reputation.

This course covers one of the best tools you can deploy in your fight against IT threats, namely the Fortigate UTM and how you can use this tool to take control of your network while assuring that you are protected.

You will learn how the Fortigate UTM works, how to configure it and adapt it to your business, how to protect your users with it along with your network and how to prevent incidents from the inside of your network. You also have powerful reporting available within the device.

By the end of this course you will be able to transform your network security with a very powerful device and have the solid skills that you can use in the future to expand your knowledge.

Course Updated - 30.12.2016

In the update you will find lessons regarding the FortiOS 5.4 Update, recovery procedure and productivity tools, Wifi deplayment with Fortinet Wifi Access Points, Transparent Mode, Virtual Domains, Single Sign-On, SSL VPN, Site-To-Site VPN, Data Leak Prevention, E-mail Filtering and Intrusion Prevention

Enroll now

What's inside

Learning objectives

  • Install a fortigate utm
  • Understand the functioning of the utm device
  • Configure basic parameters of the device
  • Create policies for traffic
  • Create objects and work with virtual ips
  • Learn to configure users on the device
  • Configure logs and additional logging parameters
  • Create vpn connections
  • Create and use web filters for traffic
  • Create antivirus and application filters
  • Get to know the new version of fortios, namely 5.4
  • Perform device recovery and use additional tools
  • Deploy fortinet wifi access points and use the fortios wifi controller
  • Understand and use the transparent mode
  • Understand vdoms
  • Deploy the fortinet single sign-on solution
  • Configure and deploy ssl vpns and portals
  • Create site-to-site vpn tunnels
  • Understand and use the data leak prevention function
  • Show more
  • Show less

Syllabus

Understand the concepts behind the appliance

Your first contact with the world of Fortinet

Get to know the Fortigate 90D device that we will be working with

PDF download included

Read more
You will be able to install the device, get to know ports and caracteristics, reset configs and passwords, connect to management options and to the console

Learn about the USB management capabilities of the device

Learn how to connect to the console

Learn how to reset the admin account password in case you forget it

Learn how to return the device to factory settings

Learn how to change the important Switch to Interface Mode setting

Learn how to update the firmware on the Fortigate unit

Go through every System configuration panel and learn the available settings and options

Go through the dashboard and status settings

Go through the network settings offered by the device and lean what the different parameters do

You also have a PDF which explains Redundant Connections and an external link for Dual WAN scenarios

Understand the settings offered in the Config section of the menu

Learn to change the settings in the Admin section of the device

Learn how to monitor DHCP leases and also how to monitor connections

You also have a PDF which teaches you how to change the default DHCP lease time

Learn what policies are and how you can work with them and also what other options you have in the Policy and Objects section of the menu

You also have a PDF which explains the Policy Monitor

Learn about the security profiles that the Fortigate unit offers

Learn about the VPN capabilities of the device and the different options in which you can create VPNs

You also have a PDF which explains how to use the VPN Monitor

Learn about the way in which you can define users and devices in the Fortigate unit

You also have a PDF which explains the User Monitor

Learn a bit about the integrated Wifi and Switch controller

Learn about the logging options the unit offers

You also have a PDF which explains the FortiView option in great detail

Learn how to configure the device to perform tasks

Let's start doing some practical exercises

You also have a PDF with the network topology we will be using

Configure interfaces on the system to get the desired result

Configure addresses on the system to make identification and policy work much easier

Start creating policies and influence the traffic flow through the device

Configure a Virtual IP to allow traffic towards an intended target system

Create a web filter to block certain webpages

Create an antivirus filter in order to block viruses from entering your network

Create an application filter to block or allow traffic of a given app

Create a dial-in VPN in order to let remote users connect to our local network

View logs and create a report

Conclusion of the course and tips for further learning

This lecture is the conclusion to all our work together so far and more. I say more because I have included some tips on how you can improve your knowledge and some which I consider your key reference when dealing with Fortigate devices.

All in all this is our last lesson, but don't stop learning here. Use the resources I have given and feel free to ask for help from me or the large Fortinet community located at https://forum.fortinet.com/

Get to know more advanced functionality offered by the Fortigate UTM

In this lesson we'll discuss about the 5.4 version of FortiOS which packed with many new features and improvements

Learn how to recover a system that has trouble booting and also how to use some tools which are great in your admin arsenal

Learn how to deploy Fortinet Wifi Access Points and also how to use the Wireless Controller which is integrated with FortiOS

Learn how to use the Transparent Mode offered by the Fortigate units in order to gain advanced threat protection in difficult to modify network environments

Learn how to use the Virtual Domain feature present in the Fortigate units

Learn how to integrate your Fortigate unit with an Active Directory infrastructure and how to enable and offer Single Sign-On capabilities to your users

Learn how to create SSL VPNs and portals for your users

Learn how to configure site-to-site VPNs between your branches

Implement Data Leak Prevention measures in order to avoid your digital data getting stolen or leaked

Get to know the E-mail and Spam filtering capabilities of your Fortigate unit and also the Intrusion Prevention features offered by the UTM

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Core audience consists of network and cyber security professionals who work with IT in various industries
Core audience consists of IT professionals who have little to no knowledge of Fortigate UTM appliances
Core audience may also include technology enthusiasts who want to strengthen their cybersecurity skillset

Save this course

Save Configuring Fortigate Unified Threat Management Appliances to your list so you can find it easily later:
Save

Reviews summary

Well-received fortigate course

Learners say Configuring Fortigate Unified Threat Management Appliances is a well-received course with easy to understand lectures and plenty of examples. The material is well-structured and engaging, which makes it a solid course for beginners of all levels.

Students highly recommend this course for anyone interested in learning more about Fortinet and its products.
The course provides many clear examples to help learners.
"easy to understand and lots of examples"
"Sal provides many examples."
Students rate this course very highly.
"amazing I've learnt so much so far"
"it is absolutely great"
"Love how Sal is so detailed with her teaching"
The course is organized in a way that's easy to understand for beginners.
"It was great course for beginners. Simple to follow."
"The course is structured in a way that is very helpful and easy to follow."
The course does not cover advanced material.
"I hope it gets more advanced when I follow with the rest."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Configuring Fortigate Unified Threat Management Appliances with these activities:
Review Network Security Fundamentals
Refresh your knowledge of basic network security concepts to strengthen your foundation for this course.
Browse courses on network security
Show steps
  • Review online resources
  • Read technical articles
  • Take practice tests
Peer Study Group for Fortigate
Join a study group to exchange knowledge, collaborate on projects, and reinforce your understanding of Fortigate and network security.
Browse courses on FortiGate
Show steps
  • Find or create a peer study group
  • Meet regularly to discuss concepts
  • Work together on projects
Network Security Resources Compilation
Create a comprehensive collection of resources related to network security to support your learning and future reference.
Browse courses on network security
Show steps
  • Identify relevant resources
  • Organize and categorize resources
  • Include a variety of resources (e.g., articles, videos, whitepapers)
Five other activities
Expand to see all activities and additional details
Show all eight activities
FortiOS 5.4 Advanced Features Guided Tutorials
Explore advanced features of FortiOS 5.4 through guided tutorials to enhance your knowledge of the latest updates and capabilities.
Browse courses on network security
Show steps
  • Access tutorial resources
  • Follow step-by-step instructions
  • Practice implementing advanced features
Configure a Fortigate VPN
Build a simple VPN on your own using a Fortigate device to solidify your understanding of VPNs and Fortigate's capabilities.
Browse courses on FortiGate
Show steps
  • Gather necessary equipment and materials
  • Configure the Fortigate device
  • Test the VPN connection
Fortigate Policy Configuration Drills
Practice configuring policies on a Fortigate device to strengthen your skills in network security and firewall management.
Browse courses on FortiGate
Show steps
  • Identify different types of policies
  • Configure basic firewall policies
  • Configure advanced policy features
Mentoring on Fortigate for Beginners
Provide guidance and support to other students who are new to Fortigate, helping them build their knowledge and skills.
Browse courses on FortiGate
Show steps
  • Connect with other students
  • Share your knowledge and experience
  • Answer questions and provide guidance
Network Security Blog Post
Write a blog post to share your knowledge and insights on a specific topic related to network security, demonstrating your understanding and communication skills.
Browse courses on network security
Show steps
  • Choose a topic and research
  • Write and edit your post
  • Publish and promote your blog post

Career center

Learners who complete Configuring Fortigate Unified Threat Management Appliances will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
An Information Security Analyst plans and implements security measures to protect an organization's computer networks and systems. Information Security Analysts also monitor and analyze network traffic for suspicious activity.
Network Security Analyst
A Network Security Analyst plans and implements security measures to protect an organization's computer networks and systems. Network Security Analysts also monitor and analyze network traffic for suspicious activity.
Security Engineer
A Security Engineer designs, implements, and manages security systems to protect an organization's computer networks and systems. Security Engineers also monitor and analyze network traffic for suspicious activity.
Cybersecurity Consultant
A Cybersecurity Consultant helps organizations to protect their computer networks and systems from cyberattacks. Cybersecurity Consultants also help organizations to recover from cyberattacks.
Threat Intelligence Analyst
A Threat Intelligence Analyst collects and analyzes information about cyber threats. Threat Intelligence Analysts also provide recommendations to organizations on how to protect themselves from cyberattacks.
Incident Responder
An Incident Responder responds to and investigates cyberattacks. Incident Responders also help organizations to recover from cyberattacks.
Security Architect
A Security Architect designs and implements security systems to protect an organization's computer networks and systems. Security Architects also monitor and analyze network traffic for suspicious activity.
Chief Information Security Officer (CISO)
A Chief Information Security Officer (CISO) is responsible for the overall security of an organization's computer networks and systems. CISOs also work with other departments to ensure that the organization's security policies are being followed.
Network Administrator
A Network Administrator installs, configures, and maintains computer networks. Network Administrators also monitor and troubleshoot network problems.
Systems Administrator
A Systems Administrator installs, configures, and maintains computer systems. Systems Administrators also monitor and troubleshoot system problems.
IT Manager
An IT Manager oversees the day-to-day operations of an organization's IT department. IT Managers also work with other departments to ensure that the organization's IT systems are meeting the needs of the business.
IT Director
An IT Director is responsible for the overall IT strategy and direction of an organization. IT Directors also work with other departments to ensure that the organization's IT systems are meeting the needs of the business.
Chief Technology Officer (CTO)
A Chief Technology Officer (CTO) is responsible for the overall technology strategy and direction of an organization. CTOs also work with other departments to ensure that the organization's technology systems are meeting the needs of the business.
Chief Executive Officer (CEO)
A Chief Executive Officer (CEO) is responsible for the overall management and operations of an organization. CEOs also work with other departments to ensure that the organization is meeting its goals.
Chief Information Officer (CIO)
A Chief Information Officer (CIO) is responsible for the overall IT strategy and direction of an organization. CIOs also work with other departments to ensure that the organization's IT systems are meeting the needs of the business.

Reading list

We've selected 13 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Configuring Fortigate Unified Threat Management Appliances.
Provides a comprehensive overview of computer security. It good resource for students who are interested in learning more about computer security.
Provides a comprehensive overview of network security with OpenSSL. It good resource for students who are interested in learning more about network security with OpenSSL.
Provides a comprehensive overview of computer network security. It good resource for students who are interested in learning more about computer network security.
Provides a comprehensive overview of network security with intrusion detection systems. It good resource for students who are interested in learning more about network security with intrusion detection systems.
Covers the fundamentals of network security, including firewalls, intrusion detection, and VPNs. It good resource for students who are new to network security or who want to learn more about the topic.
Provides a friendly, easy-to-follow guide to firewalls. It good resource for students who are new to firewalls or who want to learn more about the topic.
Provides a practical guide to conducting network security assessments. It covers various techniques and tools used to identify vulnerabilities and improve network security posture.
This textbook provides a comprehensive overview of computer networking concepts and protocols. It valuable resource for understanding the underlying principles of network security and how FortiGate devices operate within a network environment.
Covers the principles and practices of using Snort, a popular open-source intrusion detection system (IDS). It provides a deep dive into Snort's configuration, rule writing, and analysis capabilities.
Provides a practical introduction to network forensics techniques and tools. It covers how to investigate and analyze network traffic to uncover security incidents and identify the root cause of network problems.
Covers the principles and practices of firewall and intrusion detection system (IDS) technologies. It provides a comprehensive overview of network security threats and how to mitigate them using these technologies.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser