We may earn an affiliate commission when you visit our partners.
Course image
Google Cloud Training

This is a self-paced lab that takes place in the Google Cloud console.”

Read more

This is a self-paced lab that takes place in the Google Cloud console.”

This lab is intended for network administrators implementing network traffic inspection in Google Cloud using FortiGate next-gen firewalls. You will learn the reference architecture and configure inbound, outbound, and east-west traffic inspection using a FortiGate HA cluster.

Enroll now

Two deals to help you save

We found two deals and offers that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

FortiGate: Protecting Google Compute resources

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Focuses on outbound, inbound, and east-west network traffic inspection
Creates a modular lesson by using a HA cluster to implement FortiGate traffic inspection
Serves network administrators implementing network traffic inspection in Google Cloud

Save this course

Save FortiGate: Protecting Google Compute resources to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in FortiGate: Protecting Google Compute resources with these activities:
Review Networking Fundamentals
Reinforce foundational knowledge of networking concepts to enhance understanding of FortiGate's functionality.
Browse courses on Computer Networking
Show steps
  • Review introductory networking textbooks or online resources
  • Practice configuring basic network devices, such as routers and switches
  • Take practice quizzes or exams on networking fundamentals
FortiGate Training Academy Tutorial
Explore the official FortiGate training resources to deepen understanding of the product's capabilities and configurations.
Browse courses on FortiGate
Show steps
  • Enroll in the FortiGate Training Academy tutorial
  • Work through the interactive labs and modules
  • Complete the quizzes and assessments
Network Traffic Inspection Simulations
Simulate real-world network scenarios to test and reinforce FortiGate's traffic inspection capabilities.
Show steps
  • Set up a lab environment with FortiGate firewalls
  • Create virtual machines and simulate client and server traffic
  • Configure FortiGate to inspect inbound, outbound, and east-west traffic
  • Monitor and analyze network traffic logs and reports
One other activity
Expand to see all activities and additional details
Show all four activities
Network Security Design Plan
Develop a comprehensive plan that utilizes FortiGate to enhance the security posture of an enterprise network.
Browse courses on Network Traffic Analysis
Show steps
  • Analyze existing network infrastructure and security requirements
  • Design and document the deployment of FortiGate firewalls
  • Configure FortiGate settings and policies for optimal traffic inspection and security
  • Create a plan for ongoing monitoring and maintenance

Career center

Learners who complete FortiGate: Protecting Google Compute resources will develop knowledge and skills that may be useful to these careers:
Cloud Architect
A Cloud Architect designs, develops, and manages cloud computing systems. They work with a variety of technologies and tools to ensure that their systems are reliable, scalable, and secure. Many Cloud Architects work with FortiGate next-gen firewalls to protect their systems from threats. This course can help Cloud Architects learn more about FortiGate firewalls and how to use them to protect their systems.
Cloud Security Architect
A Cloud Security Architect is responsible for designing and implementing security controls for cloud computing systems. This includes designing, implementing, and managing firewalls, intrusion detection systems, and other security technologies. This course can help Cloud Security Architects learn more about FortiGate next-gen firewalls and how to use them to protect cloud systems.
Security Architect
A Security Architect is responsible for designing and implementing security controls for an organization's IT systems. This includes designing, implementing, and managing firewalls, intrusion detection systems, and other security technologies. This course can help Security Architects learn more about FortiGate next-gen firewalls and how to use them to protect systems.
Network Security Engineer
A Network Security Engineer is responsible for designing, implementing, and managing network security systems. They work with a variety of technologies and tools to ensure that networks are protected from threats. This course can help Network Security Engineers learn more about FortiGate next-gen firewalls and how to use them to protect networks.
Infrastructure Security Engineer
An Infrastructure Security Engineer is responsible for securing the infrastructure that supports an organization's IT systems. This includes designing, implementing, and managing security controls for networks, servers, and other infrastructure components. This course can help Infrastructure Security Engineers learn more about FortiGate next-gen firewalls and how to use them to protect infrastructure.
Information Security Analyst
An Information Security Analyst is responsible for identifying, assessing, and mitigating security risks. They work with a variety of technologies and tools to protect information systems from threats. This course can help Information Security Analysts learn more about FortiGate firewalls and how to use them to protect information systems.
Security Consultant
A Security Consultant is responsible for providing security advice and guidance to organizations. This includes assessing security risks, developing security plans, and implementing security controls. This course can help Security Consultants learn more about FortiGate next-gen firewalls and how to use them to protect organizations from threats.
DevSecOps Engineer
A DevSecOps Engineer is responsible for integrating security into the development and operations process. They work with developers and operations teams to ensure that applications and infrastructure are secure. DevSecOps Engineers often use FortiGate firewalls to protect their systems from threats. This course can help DevSecOps Engineers learn more about FortiGate firewalls and how to use them to protect their systems.
Network Engineer
A Network Engineer is responsible for designing, implementing, and managing networks. This includes designing, implementing, and managing firewalls, routers, and other network devices. This course can help Network Engineers learn more about FortiGate next-gen firewalls and how to use them to protect networks.
Network Security Administrator
A Network Security Administrator is responsible for managing and maintaining network security systems. This includes managing firewalls, intrusion detection systems, and other security devices. This course can help Network Security Administrators learn more about FortiGate next-gen firewalls and how to use them to protect networks.
Cloud Engineer
A Cloud Engineer is responsible for designing, implementing, and managing cloud computing systems. This includes designing, implementing, and managing firewalls, load balancers, and other cloud services. This course can help Cloud Engineers learn more about FortiGate next-gen firewalls and how to use them to protect cloud systems.
Systems Administrator
A Systems Administrator is responsible for managing and maintaining computer systems. This includes installing and configuring software, managing user accounts, and maintaining security. This course can help Systems Administrators learn more about FortiGate next-gen firewalls and how to use them to protect systems.
Information Technology Manager
An Information Technology Manager is responsible for managing an organization's IT systems. This includes managing hardware, software, and networks. This course may be useful for Information Technology Managers who are responsible for managing network security.
Information Security Officer
An Information Security Officer is responsible for overseeing an organization's information security program. This includes developing and implementing security policies and procedures, and managing security risks. This course may be useful for Information Security Officers who are responsible for making decisions about network security.
Chief Technology Officer
A Chief Technology Officer is responsible for overseeing an organization's technology strategy. This includes making decisions about which technologies to invest in and how to use them to achieve business goals. This course may be useful for Chief Technology Officers who are responsible for making decisions about network security.

Reading list

We've selected 14 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in FortiGate: Protecting Google Compute resources.
Provides a detailed overview of the TCP/IP protocol suite, including a chapter on network security. It valuable resource for network administrators who want to learn more about the technical details of networking.
Provides a comprehensive overview of hacking techniques, including a chapter on network security. It valuable resource for network administrators who want to learn more about how hackers can attack networks.
Provides a practical guide to cloud security, including a chapter on network security. It valuable resource for network administrators who want to learn more about how to secure their cloud-based networks.
Provides a comprehensive overview of information security, including a chapter on network security. It valuable resource for network administrators who want to learn more about information security.
Provides a practical guide to network security, including a chapter on next-generation firewalls. It valuable resource for network administrators who want to learn more about how to secure their networks.
Provides a comprehensive guide to network security assessment, including a chapter on next-generation firewalls. It valuable resource for network administrators who want to learn more about how to assess the security of their networks.
Provides a comprehensive overview of network security, including a chapter on next-generation firewalls. It valuable resource for network administrators who want to learn more about network security.
Provides comprehensive documentation on the Palo Alto Networks operating system, which is commonly used in enterprise network security. While it's not specific to FortiGate, it offers a broader perspective on network security architectures.
Provides a comprehensive overview of computer networking, including a chapter on network security. It valuable resource for network administrators who want to learn more about the fundamentals of networking.
Provides a non-technical introduction to cloud computing, including a chapter on security. It good starting point for network administrators who are new to cloud computing.
Provides a non-technical introduction to firewalls, including a chapter on next-generation firewalls. It good starting point for network administrators who are new to firewalls.
Provides an overview of exploitation techniques. While not specific to network security, it helps build a foundation for understanding the underlying principles.
Covers web application security testing. While not specific to FortiGate, it provides valuable insights into the security aspects of web applications.
A comprehensive textbook covering the fundamentals of network security. While not specific to FortiGate, it provides a solid theoretical background for network security principles.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to FortiGate: Protecting Google Compute resources.
VPC Flow Logs - Analyzing Network Traffic
Most relevant
Rate Limiting with Cloud Armor
Most relevant
Palo Alto Networks: VM-Series Network Tags and TCP/UDP...
Most relevant
Create a Component Anomaly Detection Model using Visual...
Most relevant
Create a Cosmetic Anomaly Detection Model using Visual...
Most relevant
Fiddler Classic 5: The Big Picture
Most relevant
Introduction to Firewalls
Most relevant
Deploy and Test a Visual Inspection AI Component Anomaly...
Most relevant
Deploy and Test a Visual Inspection AI Cosmetic Anomaly...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser