![Premium Bundle](/design/img/content/popup/premium-training/premium-training_1x.png)
$6.50
Introduction | ||
---|---|---|
1. Common Network Security Terms | 8:15 | |
2. Confidentiality, Integrity, Availability | 13:55 | |
3. Malicious Software | 29:26 | |
4. Different Firewall Technologies | 29:18 | |
5. Web Application Firewall WAF | 9:34 | |
6. Next-Generation Firewall (NGFW) | 11:44 | |
7. Fortinet, FortiGate and NSE4 Exam | 18:31 |
Administration | ||
---|---|---|
1. Fortigate Firewall Dashboard | 12:47 | |
2. Fortigate Firewall Monitors | 3:20 | |
3. Fortigate Different Interfaces | 17:11 |
Administrative Access | ||
---|---|---|
1. Administrative Access in Fortigate | 10:53 | |
2. DNS in Fortigate Firewall | 40:27 |
Security Policies | ||
---|---|---|
1. Theory of FortiGate Firewall Policies | 28:15 | |
2. MAC Address Based Firewall Policy | 09:10 | |
3. Local User Based Firewall Policy | 8:47 |
Windows Server | ||
---|---|---|
1. Active Directory in Windows Server | 12:04 | |
2. DNS in MS Windows Server 2012 | 7:07 | |
3. Create Users & Groups in AD | 5:14 | |
4. Network Time Protocol in Server 2012 | 6:42 | |
5. Certificate Authority in Server 2012 | 11:43 |
Part 2: Introduction | ||
---|---|---|
1. Lab and Workbooks | 2:50 | |
2. Configure Web Filter Profile | 23:22 | |
3. Configure Web Rating Override Profile | 6:46 | |
4. Configure Web Profile Override | 7:47 | |
5. DNS Filter Profile | 17:36 | |
6. Theory of Application Control | 8:12 | |
7. Configure Application Control | 31:36 | |
8. Theory of Intrusion Prevention System | 14:28 | |
9. Configure Intrusion Prevention System | 21:47 | |
10. Theory of File Filter Profile | 3:55 | |
11. Configure File Filter Profile | 5:25 |
DoS Policy | ||
---|---|---|
1. Theory of IPV4 DoS Policy | 10:46 | |
2. Configure IPV4 DoS Policy | 32:34 |
Authentication | ||
---|---|---|
1. Theory of Authentication | 8:39 | |
2. Active Authentication with Win AD | 24:17 | |
3. Install FSSO and DC Agent | 9:39 | |
4. Windows 10 to Join Windows AD | 9:07 | |
5. Passive Authentication With Win AD | 17:11 | |
6. Administrators with AD | 14:23 |
Virtual Private Network | ||
---|---|---|
1. Cryptography & Terminologies | 23:59 | |
2. Symmetric and Asymmetric Encryption | 18:11 | |
3. Hashing MD5 and SHA | 20:05 | |
4. Diffie-Hellman (DH) Group | 17:56 | |
5. Internet Protocol Security | 22:09 | |
6. IPSec Protocols ESP and AH | 25:45 | |
7. Internet Key Exchange (IKE) | 36:21 | |
8. SSL and TLS and Handshake | 22:16 | |
9. Virtual Private Network VPN | 18:37 | |
10. Policy-Based & Route-Based VPN | 14:04 | |
11. Site-to-Site Template Based VPN | 27:29 | |
12. Site-to-Site Custom Based VPN | 25:25 | |
13. Site-to-Site Policy-Based VPN | 13:33 | |
14. Theory of Remote-Access VPN | 13:34 | |
15. SSL Web Mode Remote-Access | 25:27 | |
16. SSL Tunnel Mode Remote-Access | 21:07 | |
17. IPSec Tunnel Remote-Access | 9:58 |
SD-WAN | ||
---|---|---|
1. Theory of SD-WAN | 30:37 | |
2. Configure SD-WAN | 44:53 |
VDOMs | ||
---|---|---|
1. Theory of Virtual Domains VDOMs | 11:50 | |
2. Configure Virtual Domains VDOMs | 38:42 |
High Availability | ||
---|---|---|
1. Theory of High Availability | 24:01 | |
2. Active-Passive HA Lab | 30:18 | |
3. Active-Active HA Lab | 17:21 |
Troubleshooting | ||
---|---|---|
1. Backup & Restore & Firmware Upgrade | 32:46 | |
2. CLI and Important Commands | 20:46 | |
3. Packet Sniffing | 13:56 | |
4. Packet Capture | 07:08 | |
5. Troubleshooting Methodologies | 7:53 | |
6. Troubleshooting Approaches | 9:58 |
Extra | ||
---|---|---|
1. Backup of FortiGate Firewalls | 9:31 | |
2. Restore of FortiGate Firewalls | 9:32 |
Get 100% Latest Exam Questions, Accurate & Verified Answers!
30 Days Free Updates, Instant Download!
Only Registered Members
Can View Online Video Courses
Please fill out your email address below in order to view Online Courses.. Registration is Free and Easy, You Simply need to provide an email address.
Log into your Prepaway Account
Please Log In to view Online Course
Registration is free and easy - just provide your E-mail address.
Click Here to Register