NETWORK SECURITY OPERATIONS

FortiGate Infrastructure

This 3-day course will guide you in using advanced FortiGate networking and security. Topics include features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, site-to-site IPsec VPN, SSO, web proxy, and diagnostics. 

By the end of this course, you’ll gain skills in: 

  • Analyzing a FortiGate's route table. 
  • Routing packets using policy-based and static routes for multi-path and load balanced deployments. 
  • Configuring SD-WAN to load balance traffic between multiple WAN links effectively. 
  • Inspecting traffic transparently, forwarding as a Layer 2 device. 
  • Dividing FortiGate into two or more virtual devices, each operating as an independent FortiGate, by configuring virtual domains (VDOMs). 
  • Establishing an IPsec VPN tunnel between two FortiGate appliances. 
  • Comparing policy-based to route-based IPsec VPN. 
  • And much more. 
Learn More

 

FortiGate Security

A comprehensive 3-day course, aimed at teaching the basics FortiGate features, including security profiles. In interactive labs, you will explore firewall policies, user authentication, SSL VPN, dial-up IPsec VPN, and how to protect your network using security profiles such as IPS, antivirus, web filtering, application control, and more. 

By the end of this course, you’ll gain skills in: 

  • Deploying the appropriate operation mode for your network. 
  • Using the GUI and CLI for administration. 
  • Identifying the characteristics of the Fortinet security fabric. 
  • Controlling network access to configured networks using firewall policies. 
  • Apply port forwarding, source NAT, and destination NAT. 
  • Authenticate users using firewall policies. 
Learn More

 

Implementing and Operating Cisco Security Core Technologies v1.0

The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course is aimed at preparing individuals for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. 

By the end of this course, you’ll gain skills in: 

  • Describing information security concepts and strategies within the network 
  • Categorizing common TCP/IP, network application, and endpoint attacks 
  • Describing how various network security technologies work together to guard against attacks 
  • Implementing access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall 
  • Describing and implement basic email content security features and functions provided by Cisco Email Security Appliance 
Learn More

 

GCSEC : Security in Google Cloud Platform

This course uses lectures, demos, and hands-on labs to teach you about a variety of Google Cloud security controls and techniques. You’ll explore the components of Google Cloud and deploy a secure solution on the platform. You’ll also learn how to mitigate attacks at several points in a Google Cloud-based infrastructure, including distributed denial-of-service attacks, phishing attacks, and threats involving content classification and use.

By the end of this course, you’ll gain skills in: 

  • Understanding the Google approach to security Managing administrative identities using Cloud Identity.
  • Implementing least privilege administrative access using Google Resource Manager, Cloud IAM.
  • Implementing IP traffic controls using VPC firewalls and Google Cloud Armor.
  • Implementing Identity-Aware Proxy.
  • Analyzing changes to the configuration or metadata of resources with Cloud audit logs.
Learn More

© 2021 TRAINOCATE MALAYSIA SDN BHD. ALL RIGHTS RESERVED

CONNECT WITH US