Configuring Fortigate Unified Threat Management Appliances | Udemy


Configuring Fortigate Unified Threat Management Appliances | Udemy
English | Size: 642.55 MB
Genre: eLearning

What you’ll learn
Install a Fortigate UTM
Understand the functioning of the UTM device
Configure basic parameters of the device
Create policies for traffic
Create objects and work with virtual IPs
Learn to configure users on the device
Configure logs and additional logging parameters
Create VPN connections
Create and use web filters for traffic
Create antivirus and application filters
Get to know the new version of FortiOS, namely 5.4
Perform device recovery and use additional tools
Deploy Fortinet Wifi Access Points and use the FortiOS Wifi Controller
Understand and use the Transparent Mode
Understand VDOMs
Deploy the Fortinet Single Sign-on solution
Configure and deploy SSL VPNs and portals
Create Site-to-Site VPN Tunnels
Understand and use the Data Leak Prevention function

*** Course updated with new information and new activities! See below! ***

Today we live in a world where network and cyber security are two of the most important subjects. Everyone is talking about them, about how to protect the network and how to protect end-users against malicious attackers.

Network security is one of the big trends with unparalleled growth, because the number and severity of attacks in increasing everyday. Businesses all around the globe are finding out the hard way that if you are not paying attention to how you secure your IT infrastructure, you stand to lose not only huge amounts of money, but also you can lose your reputation.

This course covers one of the best tools you can deploy in your fight against IT threats, namely the Fortigate UTM and how you can use this tool to take control of your network while assuring that you are protected.

You will learn how the Fortigate UTM works, how to configure it and adapt it to your business, how to protect your users with it along with your network and how to prevent incidents from the inside of your network. You also have powerful reporting available within the device.

By the end of this course you will be able to transform your network security with a very powerful device and have the solid skills that you can use in the future to expand your knowledge.

*** Course Updated – 30.12.2016 ***

In the update you will find lessons regarding the FortiOS 5.4 Update, recovery procedure and productivity tools, Wifi deplayment with Fortinet Wifi Access Points, Transparent Mode, Virtual Domains, Single Sign-On, SSL VPN, Site-To-Site VPN, Data Leak Prevention, E-mail Filtering and Intrusion Prevention

Who this course is for:
Anyone with a basic understanding of networking concepts. This course in not for you if you are already proficient with other UTM devices

nitroflare.com/view/9BD20B74AC45669/ConfiguringFortigateUnifiedThreatManagementAppliances.14.1.part1.rar
nitroflare.com/view/8A5D6CB2E4CE8C3/ConfiguringFortigateUnifiedThreatManagementAppliances.14.1.part2.rar
nitroflare.com/view/2D2A9BB48A83619/ConfiguringFortigateUnifiedThreatManagementAppliances.14.1.part3.rar
nitroflare.com/view/4D1C35AB7C763D5/ConfiguringFortigateUnifiedThreatManagementAppliances.14.1.part4.rar

rapidgator.net/file/9f8ead011d64ce2cb8556e613efeb567/ConfiguringFortigateUnifiedThreatManagementAppliances.14.1.part1.rar.html
rapidgator.net/file/9c0993669e159c773a7a660804051c74/ConfiguringFortigateUnifiedThreatManagementAppliances.14.1.part2.rar.html
rapidgator.net/file/84087038be89bb8a1e50478231addb4c/ConfiguringFortigateUnifiedThreatManagementAppliances.14.1.part3.rar.html
rapidgator.net/file/dccd300d640c2ca01dff00d41880b1d8/ConfiguringFortigateUnifiedThreatManagementAppliances.14.1.part4.rar.html

If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9

Leave a Comment