We may earn an affiliate commission when you visit our partners.
Leigh Bogardis

This course will teach you about the products and service Fortinet can offer you and compare them to other more prominent vendors in the marketplace.

Read more

This course will teach you about the products and service Fortinet can offer you and compare them to other more prominent vendors in the marketplace.

There are many vendors and many products in the marketplace for networks and security, without some knowledge of these offerings and how they compare it can be difficult to make an informed choice. In this course, Fortinet: The Big Picture, you’ll learn how to position Fortinet in the marketplace. First, you’ll explore Fortinet's history and offerings. Next, you’ll discover Fortinet security hardware and software offerings. Finally, you’ll learn how to harden your systems and services with Fortinet products. When you’re finished with this course, you’ll have the skills and knowledge of what Fortinet offers needed to make an informed decision about their services.

Enroll now

What's inside

Syllabus

Course Overview
Fortinet Background
Product Portfolio Overview
FortiGate Firewalls and FortiClient
Read more
FortiManager and FortiAnalyzer
FortiSIEM, FortiAuthenticator, and FortiNAC
FortiWeb and FortiMail
FortiAP and FortiSwitch

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Provides a concise overview of security hardware and software
May help learners understand the role and offerings of Fortinet
May assist learners in finding suitable Fortinet products for their needs
Features a course outline that aligns with the learning objectives
Could be suitable for learners with an intermediate understanding
Covers a comprehensive range of Fortinet offerings

Save this course

Save Fortinet: The Big Picture to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Fortinet: The Big Picture with these activities:
Review the OSI model
Helps you understand the fundamentals of networking.
Browse courses on OSI Model
Show steps
  • Read about the OSI model
  • Draw a diagram of the OSI model
  • Explain how the OSI model works
Show all one activities

Career center

Learners who complete Fortinet: The Big Picture will develop knowledge and skills that may be useful to these careers:
Systems Engineer
As a Systems Engineer, you will get a strong foundation by starting with the Fortinet background, including their history and offerings. You will then have the opportunity to help design and support network security services and systems. This course can help you with your implementation, support and monitoring of systems. The hands-on experience that this course provides will help you understand how to configure and troubleshoot equipment.
Network Security Engineer
Network Security Engineers are highly in demand as the need for cybersecurity increases. This course may help prepare you for your role to defend networks and computer systems against cyberattacks and breaches. If you aspire for this role, this course will familiarize you with FortiManager and FortiAnalyzer, and other products that network security engineers utilize.
Security Architect
Security Architects are responsible for designing and implementing security measures to protect an organization's computer networks and systems. This course can help build a foundation by teaching you about Fortinet's offerings, including their network and security hardware and software, as well as how to harden systems using Fortinet's products.
Security Analyst
Security Analysts are responsible for monitoring and analyzing security data to identify and respond to threats. As a security analyst, you will learn about Fortinet's security hardware and software offerings, and gain experience with the configuration and troubleshooting of security equipment. This course may help prepare you for this role by giving you knowledge in FortiSIEM, FortiAuthenticator, and FortiNAC.
Cybersecurity Engineer
Cybersecurity Engineers are responsible for protecting computer networks and systems from cyberattacks. This course will give you a comprehensive overview of Fortinet's products and services and compare them to other prominent security vendors in the marketplace. This knowledge may assist you in designing, implementing, and maintaining cybersecurity solutions for your organization.
IT Security Manager
IT Security Managers are responsible for planning and implementing security measures to protect an organization's computer networks and systems. You will need to be familiar with a variety of security products and technologies. This course can help provide background on Fortinet's products and services, including network security, endpoint security, and cloud security.
Network Administrator
Network Administrators are responsible for the day-to-day operation and maintenance of computer networks. This course can help build a foundation in network security by teaching you about Fortinet security hardware and software offerings, as well as how to harden systems using Fortinet's products.
Information Security Analyst
Information Security Analysts are responsible for monitoring and analyzing security data to identify and respond to threats. This course will give you a comprehensive overview of Fortinet's products and services and compare them to other prominent security vendors in the marketplace. You will learn about Fortinet security hardware and software offerings, and gain experience with the configuration and troubleshooting of security equipment.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to protect their computer networks and systems from cyberattacks. This course will give you a comprehensive overview of Fortinet's products and services and compare them to other prominent security vendors in the marketplace.
Infrastructure Engineer
Infrastructure Engineers are responsible for designing, implementing, and maintaining the physical and virtual infrastructure of an organization's IT environment. This course can help provide background on Fortinet's network security offerings, including firewalls, intrusion detection and prevention systems, and virtual private networks.
IT Manager
IT Managers are responsible for the overall operation and management of an organization's IT department. This course may assist you to stay abreast of network security trends and technologies by providing a comprehensive overview of Fortinet's products and services, and comparing them to other prominent security vendors in the marketplace.
Web Application Security Analyst
Web Application Security Analysts are responsible for protecting web applications from security vulnerabilities and attacks. This course may be useful by giving you an understanding of Fortinet Web Application Firewall, which can help you secure web applications.
Database Administrator
Database Administrators are responsible for the maintenance and administration of database systems. This course may be useful to understand database security and how to protect databases from unauthorized access and attacks. You will gain experience with Fortinet's database security products.
Cloud Security Architect
Cloud Security Architects are responsible for designing and implementing security measures to protect cloud computing environments. This course may be useful to gain knowledge about network security, endpoint security, and cloud security.
Cloud Engineer
Cloud Engineers are responsible for designing, implementing, and maintaining cloud computing environments. This course may be useful to help you understand cloud security and how to protect cloud-based applications and data.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Fortinet: The Big Picture.
Provides an overview of Fortinet products and services as well as their use cases.
Provides a comprehensive overview of cryptography engineering principles and practices. It covers topics such as symmetric and asymmetric cryptography, hash functions, and digital signatures.
Provides a comprehensive overview of secure coding practices in C and C++. It covers topics such as memory management, input validation, and buffer overflows.
Provides a comprehensive overview of computer security principles and practices. It covers topics such as cryptography, network security, and operating system security.
Provides a comprehensive overview of security engineering principles and practices. It covers topics such as threat modeling, risk assessment, and secure software development.
Provides a comprehensive overview of cloud security principles and practices. It covers topics such as cloud security architecture, cloud data protection, and cloud compliance.
Provides a comprehensive introduction to cybersecurity concepts and best practices. It covers topics such as network security, cryptography, and security operations.
Provides a detailed overview of network security assessment techniques and tools. It covers topics such as vulnerability scanning, penetration testing, and security audits.
Provides a comprehensive overview of firewalls and intrusion detection systems. It covers topics such as firewall architectures, intrusion detection techniques, and security management.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser