Curriculum For This Course
Video tutorials list
-
Introduction
Video Name Time 1. Common Network Security Terms 8:15 2. Confidentiality, Integrity, Availability 13:55 3. Malicious Software 29:26 4. Different Firewall Technologies 29:18 5. Web Application Firewall WAF 9:34 6. Next-Generation Firewall (NGFW) 11:44 7. Fortinet, FortiGate and NSE4 Exam 18:31 -
Lab Setup
Video Name Time 1. Configure EVE-NG on VMWare Workstation 17:58 2. Configure EVE-NG Client Pack for Windows 4:44 3. Upload FortiGate Firewall in EVE-NG 30:06 4. Upload Other Lab Images in EVE-NG 19:11 5. Create and configure Lab Main Topology 51:30 6. Initial Working Lab in EVE-NG 27:21 -
Administration
Video Name Time 1. Fortigate Firewall Dashboard 12:47 2. Fortigate Firewall Monitors 3:20 3. Fortigate Different Interfaces 17:11 -
Different Deployments
Video Name Time 1. VLAN Deployment In Fortigate Firewall 22:41 2. Zone in Fortigate Firewall 9:37 3. One-Armed Sniffer in Fortigate Firewall 19:54 4. Redundant Interfaces in Fortigate 26:37 5. Aggregate Interfaces in Fortigate 18:20 6. Theory of Software Switch in Fortigate 4:06 7. Software Switch in FortiGate Firewall 19:54 8. Virtual Wire Pair in Fortigate Firewall 30:27 -
Administrative Access
Video Name Time 1. Administrative Access in Fortigate 10:53 2. DNS in Fortigate Firewall 40:27 -
Routing
Video Name Time 1. Static and Dynamic Routing Protocols 20:37 2. Configure and Verify Static and Default Route 36:22 3. Theory of Policy Routing in Fortigate Firewall 5:30 4. Configure and Verify Policy Routing 40:11 5. Theory of Equal Cost Multi-Path Routing ECMP 24:05 6. Configure and Verify Equal Cost Multi-Path 38:16 7. Theory of Dynamic Routing Protocol RIP 4:56 8. Configure and Verify RIP 23:03 9. Theory of Dynamic Routing Protocol OSPF 04:25 10. Configure and Verify OSPF 11:15 11. Theory of Dynamic Routing Protocol BGP 4:45 12. Dynamic Routing Protocol BGP Flavors 3:52 13. Configure and Verify BGP 31:38 -
DHCP
Video Name Time 1. Theory of Dynamic Host Configuration Protocol 22:09 2. Configure and Verify DHCP Server In FortiGate 16:27 3. Configure and Verify DHCP Server in Windows Server 17:37 4. Configure and Verify DHCP Relay in Fortigate Firewall 14:54 -
NAT & PAT
Video Name Time 1. Theory of Network Address Translation NAT 27:29 2. Policy Source Interface Overload NAT 8:01 3. Policy Source Dynamic Overload NAT 6:39 4. Policy Source One-to-One NAT Lab 8:49 5. Policy Source Fixed Port Rang NAT 13:52 6. Policy Source Port Block Allocation NAT 3:23 7. Central Source NAT in Fortigate 11:21 8. Destination NAT and Virtual IP 24:15 9. VIP without Central SNAT 9:14 -
Security Policies
Video Name Time 1. Theory of FortiGate Firewall Policies 28:15 2. MAC Address Based Firewall Policy 09:10 3. Local User Based Firewall Policy 8:47 -
Windows Server
Video Name Time 1. Active Directory in Windows Server 12:04 2. DNS in MS Windows Server 2012 7:07 3. Create Users & Groups in AD 5:14 4. Network Time Protocol in Server 2012 6:42 5. Certificate Authority in Server 2012 11:43 -
Security Profiles
Video Name Time 1. Theory of Security Profile in Firewall 16:03 2. Theory of SSL Inspection in Firewall 18:59 3. Configure and Verify SSL Inspection 34:22 4. Install Certificate in Client PCs 3:00 5. Theory of Antivirus Profile FortiGate 6:03 6. Configure and Verify Antivirus Profile 9:02 7. Theory of Web Filter Profile FortiGate 7:35 -
Part 2: Introduction
Video Name Time 1. Lab and Workbooks 2:50 2. Configure Web Filter Profile 23:22 3. Configure Web Rating Override Profile 6:46 4. Configure Web Profile Override 7:47 5. DNS Filter Profile 17:36 6. Theory of Application Control 8:12 7. Configure Application Control 31:36 8. Theory of Intrusion Prevention System 14:28 9. Configure Intrusion Prevention System 21:47 10. Theory of File Filter Profile 3:55 11. Configure File Filter Profile 5:25 -
DoS Policy
Video Name Time 1. Theory of IPV4 DoS Policy 10:46 2. Configure IPV4 DoS Policy 32:34 -
Authentication
Video Name Time 1. Theory of Authentication 8:39 2. Active Authentication with Win AD 24:17 3. Install FSSO and DC Agent 9:39 4. Windows 10 to Join Windows AD 9:07 5. Passive Authentication With Win AD 17:11 6. Administrators with AD 14:23 -
Virtual Private Network
Video Name Time 1. Cryptography & Terminologies 23:59 2. Symmetric and Asymmetric Encryption 18:11 3. Hashing MD5 and SHA 20:05 4. Diffie-Hellman (DH) Group 17:56 5. Internet Protocol Security 22:09 6. IPSec Protocols ESP and AH 25:45 7. Internet Key Exchange (IKE) 36:21 8. SSL and TLS and Handshake 22:16 9. Virtual Private Network VPN 18:37 10. Policy-Based & Route-Based VPN 14:04 11. Site-to-Site Template Based VPN 27:29 12. Site-to-Site Custom Based VPN 25:25 13. Site-to-Site Policy-Based VPN 13:33 14. Theory of Remote-Access VPN 13:34 15. SSL Web Mode Remote-Access 25:27 16. SSL Tunnel Mode Remote-Access 21:07 17. IPSec Tunnel Remote-Access 9:58 -
SD-WAN
Video Name Time 1. Theory of SD-WAN 30:37 2. Configure SD-WAN 44:53 -
VDOMs
Video Name Time 1. Theory of Virtual Domains VDOMs 11:50 2. Configure Virtual Domains VDOMs 38:42 -
High Availability
Video Name Time 1. Theory of High Availability 24:01 2. Active-Passive HA Lab 30:18 3. Active-Active HA Lab 17:21 -
Troubleshooting
Video Name Time 1. Backup & Restore & Firmware Upgrade 32:46 2. CLI and Important Commands 20:46 3. Packet Sniffing 13:56 4. Packet Capture 07:08 5. Troubleshooting Methodologies 7:53 6. Troubleshooting Approaches 9:58 -
Extra
Video Name Time 1. Backup of FortiGate Firewalls 9:31 2. Restore of FortiGate Firewalls 9:32
Add Comment