slider_img

Administración de UTM Fortigate I

ADMINISTRACION DE UTM FORTIGATE I

    Administración de UTM Fortigate I (24 Hrs)


    En este curso usted aprenderá la configuración y administración de las características más utilizadas de los appliances FortiGate Unified Threat Management (UTM).
    Los laboratorios se realizaran con equipamiento físico, explorará las políticas de firewall, autenticación de usuario, VPNs básicos, detección de virus, filtrado de correo electrónico, filtrado web, control de aplicaciones y más.
    Estos fundamentos administrativos le proporcionarán una sólida comprensión de cómo integrar y mantener la seguridad de una red.
    Se trabajara con equipos Fortigate con la versión 5.4.2


    slider_img
    METODOLOGIA

    El curso contará con sesiones teórico-prácticas. Se empleará material audiovisual con la finalidad de facilitar los procesos de adquisición y evaluación del aprendizaje. Durante las clases se buscará la participación activa de los alumnos mediante el desarrollo de ejercicios y discusión en clase. Se trabaja con equipos reales y maquinas virtuales.


    MATERIALES

    - Manual impreso del curso, Guía de Laboratorios.
    - Los Laboratorios se realizaran con equipos reales y máquinas virtuales.


    CONTENIDO DEL CURSO

    Module 1 Introduction to FortiGate

    - Identify major features of FortiGate
    - Differentiate between FortiGuard queries and Packages
    - Choose an operation mode
    - Restrict administration to Access via management networks
    - Create administrator account with specific permissions
    - Reset a lost admin password
    - Run the built-in DNS server on an interface
    - Run the built-in DHCP server on an interface
    - Back up and restore configuration files
    - Install new FortiGate firmware

    Module 2 Logging and Monitoring
    - Describe log types and subtypes
    - Describe log severity levels
    - Describe log format (header and body)
    - Identify log storage locations
    - Configure log setting
    - Configure remote logging
    - Enable logging on firewall policies
    - View, filter, download, and export logs
    - Monitor your network
    - Configure alert email
    - Configure, run, and view reports

    Module 3 Firewall Policies
    - Identify components of firewall policies
    - Match traffic to firewall policies by:
    - Source IP Address, device ID/Type, or User
    . o Interface or zone
    - Configure firewall policies
    . o Configure log blocked traffic
    - Identify policy list views
    - Understand use of policy ID and sequence number
    . o Reorder firewall policies for correct matching
    - Demonstrate how to find matching policies for traffic type from the FortiGate GUI

    Module 4 Network Address Translation (NAT)
    - Choose between firewall policy NAT vs. Central NAT
    - Configure firewall policy source NAT and destination NAT (Virtual IP)
    - Apply source NAT with IP Pool (overload vs one-to-one, fixed port range and port block allocation)
    - Configure destination NAT with virtual IP sor virtual server
    - Configure central NAT
    . o Configure source NAT with central SNAT policy
    . o Configure destination NAT with DNAT & Virtual IPs
    - Understand the sesión table

    Module 5 Firewall Authentication
    - Describe firewall authentication
    - Identify the different methods of firewall authentication available on FortiGate devices
    - Identify supported remote authentication servers
    - Configure users for local password authentication, server-based password authentication, and two-factor authentication
    - Describe active and passive authentication and order of operations
    - Configure remote authentication servers
    - Configure user authentication
    - Configure Captive Portal and disclaimers
    - Monitor firewall users

    Module 6 SSL VPN
    - Describe the differences between SSL VPN and IPsec VPN
    - Describe the differences between SSL VPN modes
    - Configure SSL VPN options such as bookmarks and realms
    - Configure firewall policies and authentication for SSL VPN
    - Strengthen security for SSL VPN Access
    - Two-factor authentication
    - Client enforcement
    - Monitor SSL VPN connected users

    Module 7 Basic IPSec VPN
    - How IPsec VPN works
    - Define the architectural components of IPsec VPN
    - Idenfity the phases of Internet Key Exchange (IKEv1)
    - Compare route-based vs policy-based configuration modes
    - VPN configuration wizard
    - Deploy a site-site VPN between two FortiGates
    - Monitor VPN tunnels

    Module 8 Explicit Proxy
    - What is an explicit web proxy?
    - Configure FortiGate to act as an explicit web proxy
    - Use a PAC file and WPAD to configure explicit proxy settings in web browsers
    - Web cache
    - Reduce WAN bandwith usage and improve responsiveness using web cache
    - IP-based vs sesión-based authentication
    - Explicit web proxy configuration
    - Apply security policies to web proxy traffic base don HTTP headers
    - Authenticate and monitor explicit web proxy users

    Module 9 Antivirus and Conserve Mode
    - Categorize malware types and evasión techniques
    - Detect and block malwares
    o Identify order of scan
    - Update antivirus database through FortiGuard services
    - Types of antivirus databases
    - Sandboxing
    - Differences between FortiGate inspection modes
    - Choose between proxy-based and flow-based antivirus scans
    - Configure antivirus profile
    - How tos can encrypted traffic
    - Search logs antivirus events
    - Memory conserve mode

    Module 10 Web Filtering
    - Identify FortiGate web filtering mechanisms
    - Choose an appropriate web filtering mode
    - Apply web or DNS filter profiless
    - Create static URL or domain filters
    - Forcing safe search
    - FortiGuard category filter
    - FortiGuard quotas
    - Fortinet bar
    - Website rating submissions
    - FortiGuard and static filtering actions
    - Website rating overrides
    - Custom categories
    - HTTP inspection order
    - Web profile overrides
    - Basic HTTPS scanning
    - Apply filter exemptions and rating overrides
    - Monitor logs for web filtering events

    Module 11 Application Control
    - How does application control work
    - When is application control necessary
    - Five point application risk rating
    - Submitting new/revised definitions
    - Configuring an application control profile
    - Order of operations for scans
    - Configure traffic shaping for applications control traffic
    - Configure Cloud Access Security Inspection (CASI)
    - Search logs for application control events
    - Monitor applications from FortiView

    DURACION Y HORARIOS

    INICIO : Segun Programación
    DURACIÓN : 24 HORAS


    INCLUYE

    Certificado en Administración de UTM Fortigate


Necesitas mas Información. Mandanos un email a ventas@xnet.com.pe

Email