Skip to main content

Fortinet Security Fabric Mastery; Architecting Resilient Networks

$199.00
When you get access:
Course access is prepared after purchase and delivered via email
How you learn:
Self-paced • Lifetime updates
Your guarantee:
30-day money-back guarantee — no questions asked
Who trusts this:
Trusted by professionals in 160+ countries
Toolkit Included:
Includes a practical, ready-to-use toolkit with implementation templates, worksheets, checklists, and decision-support materials so you can apply what you learn immediately - no additional setup required.
Adding to cart… The item has been added

Fortinet Security Fabric Mastery: Architecting Resilient Networks - Course Curriculum

Fortinet Security Fabric Mastery: Architecting Resilient Networks

Embark on a transformative journey to become a Fortinet Security Fabric expert! This comprehensive course provides you with the knowledge and practical skills to design, implement, and manage robust and resilient network security architectures using the Fortinet Security Fabric. Gain deep insights into the latest Fortinet technologies, best practices, and real-world scenarios to protect your organization from evolving cyber threats.

Upon successful completion of this course, you will receive a prestigious CERTIFICATE issued by The Art of Service, validating your expertise in Fortinet Security Fabric!

This course is designed to be Interactive, Engaging, Comprehensive, Personalized, Up-to-date, Practical, and filled with Real-world applications. Benefit from High-quality content, Expert instructors, Flexible learning options, a User-friendly platform, Mobile accessibility, and a thriving Community. You'll gain Actionable insights, Hands-on project experience, Bite-sized lessons, and Lifetime access to the course materials. Enjoy a gamified learning experience with Progress tracking to keep you motivated and engaged.



Course Modules

Module 1: Introduction to the Fortinet Security Fabric

  • Topic 1: Overview of the Cyber Security Landscape and Evolving Threats
  • Topic 2: Introduction to the Fortinet Security Fabric: Vision, Mission, and Core Principles
  • Topic 3: Key Components of the Security Fabric: FortiGate, FortiAnalyzer, FortiManager, FortiClient, and more
  • Topic 4: Understanding the Fabric Topology and Integration Points
  • Topic 5: The Importance of a Unified Security Architecture
  • Topic 6: Benefits of the Fortinet Security Fabric: Automation, Visibility, and Control
  • Topic 7: Licensing and Support Options for the Security Fabric
  • Topic 8: Setting Up Your Lab Environment for Hands-on Exercises

Module 2: FortiGate Fundamentals and Advanced Security Policies

  • Topic 9: Initial FortiGate Configuration: CLI and GUI Overview
  • Topic 10: Network Configuration: Interfaces, Routing, and VLANs
  • Topic 11: Security Policies: Rules, Zones, and Services
  • Topic 12: Understanding Security Policy Matching and Evaluation
  • Topic 13: Advanced Security Policy Features: Application Control, Web Filtering, and Intrusion Prevention
  • Topic 14: Configuring and Managing Application Control Profiles
  • Topic 15: Implementing Web Filtering Categories and Customizations
  • Topic 16: Understanding and Configuring IPS Signatures and Protections
  • Topic 17: SSL Inspection: Deep Packet Inspection and Certificate Management
  • Topic 18: Troubleshooting Common FortiGate Policy Issues

Module 3: Threat Protection and Intrusion Prevention Systems (IPS)

  • Topic 19: Deep Dive into Intrusion Prevention Systems (IPS) Technologies
  • Topic 20: Understanding IPS Signatures and Vulnerability Exploits
  • Topic 21: Configuring and Customizing IPS Signatures on FortiGate
  • Topic 22: Advanced IPS Features: Anomaly Detection and Behavior Analysis
  • Topic 23: Integrating IPS with Other Security Fabric Components
  • Topic 24: Malware Protection: Antivirus, Anti-bot, and Sandbox Integration
  • Topic 25: Understanding and Configuring FortiSandbox for Advanced Threat Analysis
  • Topic 26: Implementing Botnet Detection and Mitigation Strategies
  • Topic 27: Responding to Security Incidents and Analyzing IPS Logs

Module 4: VPNs and Secure Remote Access

  • Topic 28: Introduction to VPN Technologies: IPsec and SSL VPN
  • Topic 29: Configuring Site-to-Site IPsec VPNs between FortiGates
  • Topic 30: Advanced IPsec VPN Configuration: Tunnel Monitoring and Redundancy
  • Topic 31: Understanding and Implementing SSL VPN for Remote User Access
  • Topic 32: FortiClient Integration with SSL VPN
  • Topic 33: Two-Factor Authentication (2FA) with FortiToken
  • Topic 34: Implementing Client Certificate Authentication for Enhanced Security
  • Topic 35: Troubleshooting VPN Connectivity Issues
  • Topic 36: Remote Access Security Best Practices

Module 5: FortiAnalyzer: Logging, Reporting, and Security Analytics

  • Topic 37: Introduction to FortiAnalyzer: Architecture and Functionality
  • Topic 38: Configuring FortiGate Logging to FortiAnalyzer
  • Topic 39: Understanding and Utilizing FortiAnalyzer Logs and Events
  • Topic 40: Creating Custom Reports and Dashboards
  • Topic 41: Analyzing Security Incidents with FortiAnalyzer
  • Topic 42: Integrating FortiAnalyzer with SIEM Solutions
  • Topic 43: Threat Hunting with FortiAnalyzer Logs
  • Topic 44: Compliance Reporting and Auditing

Module 6: FortiManager: Centralized Management and Automation

  • Topic 45: Introduction to FortiManager: Architecture and Functionality
  • Topic 46: Adding and Managing FortiGates in FortiManager
  • Topic 47: Centralized Policy Management and Provisioning
  • Topic 48: Object Management: Address Groups, Services, and Schedules
  • Topic 49: Using ADOMs (Administrative Domains) for Multi-Tenant Environments
  • Topic 50: Policy Packages and Installation Targets
  • Topic 51: Change Management and Audit Trails
  • Topic 52: Automation with FortiManager APIs
  • Topic 53: CLI Scripting and Automation Tasks

Module 7: FortiAuthenticator and Identity Management

  • Topic 54: Introduction to FortiAuthenticator: Authentication Methods and Integration
  • Topic 55: Integrating FortiAuthenticator with Active Directory and LDAP
  • Topic 56: Two-Factor Authentication (2FA) with FortiToken and SMS
  • Topic 57: Guest Access Management and Captive Portal Configuration
  • Topic 58: Single Sign-On (SSO) Implementation with FortiAuthenticator
  • Topic 59: Certificate Management and Enrollment
  • Topic 60: User Group Management and Policy Enforcement

Module 8: FortiClient Endpoint Security and Integration

  • Topic 61: Introduction to FortiClient: Features and Deployment Options
  • Topic 62: Installing and Configuring FortiClient on Endpoints
  • Topic 63: Centralized Management of FortiClient via FortiManager
  • Topic 64: Endpoint Compliance and Vulnerability Scanning
  • Topic 65: Real-time Threat Protection and Antivirus Features
  • Topic 66: VPN Integration with FortiClient
  • Topic 67: Web Filtering and Application Control on Endpoints
  • Topic 68: Remote Access Control and Data Loss Prevention (DLP)

Module 9: Wireless Security and FortiAP Integration

  • Topic 69: Understanding Wireless Security Protocols: WPA2/3, RADIUS
  • Topic 70: Integrating FortiAP Wireless Access Points with FortiGate
  • Topic 71: Configuring Wireless Security Policies and SSIDs
  • Topic 72: Guest Wireless Access and Captive Portal Setup
  • Topic 73: Rogue AP Detection and Mitigation
  • Topic 74: Wireless Intrusion Prevention System (WIPS)
  • Topic 75: Wireless Mesh Networking with FortiAP

Module 10: Advanced Security Fabric Architectures and Best Practices

  • Topic 76: Designing Resilient Security Fabric Architectures
  • Topic 77: High Availability (HA) Configuration for FortiGate and Other Components
  • Topic 78: Segmentation and Microsegmentation Strategies
  • Topic 79: Security Fabric Integration with Cloud Environments (AWS, Azure, GCP)
  • Topic 80: Zero Trust Network Access (ZTNA) Implementation
  • Topic 81: SD-WAN Security Considerations and Configuration
  • Topic 82: Automating Security Operations with FortiSOAR
  • Topic 83: Security Hardening and Best Practices for Fortinet Devices
  • Topic 84: Incident Response Planning and Execution with the Security Fabric

Module 11: Cloud Security with Fortinet

  • Topic 85: Securing AWS, Azure, and GCP with Fortinet Solutions
  • Topic 86: FortiGate VM Deployment and Configuration in the Cloud
  • Topic 87: Cloud Security Best Practices and Compliance
  • Topic 88: Integrating On-Premise Security Fabric with Cloud Environments
  • Topic 89: Cloud Workload Protection and Security Automation

Module 12: SD-WAN Implementation and Security

  • Topic 90: Understanding SD-WAN Principles and Benefits
  • Topic 91: Configuring SD-WAN on FortiGate Devices
  • Topic 92: Secure SD-WAN Architectures and Security Policies
  • Topic 93: Traffic Shaping and Quality of Service (QoS) for SD-WAN
  • Topic 94: Monitoring and Troubleshooting SD-WAN Connectivity

Module 13: Security Automation and Orchestration

  • Topic 95: Introduction to Security Automation and Orchestration
  • Topic 96: Using FortiSOAR for Incident Response and Automation
  • Topic 97: Creating Playbooks for Automated Security Tasks
  • Topic 98: Integrating Fortinet Solutions with Third-Party Tools
  • Topic 99: Benefits of Security Automation and Orchestration

Module 14: Advanced Troubleshooting and Optimization

  • Topic 100: Advanced Troubleshooting Techniques for Fortinet Devices
  • Topic 101: Performance Optimization and Tuning
  • Topic 102: Identifying and Resolving Network Bottlenecks
  • Topic 103: Log Analysis and Security Auditing
  • Topic 104: Best Practices for Maintaining a Secure and Optimized Network
Upon successful completion of this course, you will receive a prestigious CERTIFICATE issued by The Art of Service, validating your expertise in Fortinet Security Fabric!