Fortimanager Training By Jittu Jaiswal (English Sessions)
Published 5/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.11 GB | Duration: 6h 54m
Published 5/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.11 GB | Duration: 6h 54m
complete FortiManager (NSE 5)training
What you'll learn
Introduction & Theory of FortiManager
ADOM (Administrative Domain)
Upgrading Fortinet FortiManager Firmware
Provisioning Templates
Policy & Objects Management
Device-Level Settings
Different way of Device Registration
Requirements
FortiGate firewalls training, preferably an NSE4 course.
Basic Knowledge of Simulation Software EVE-NG.
Three to five years of experience with Fortinet network security.
It is recommended that you have an understanding of the topics covered in NSE 4.
Description
In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager.Centralized Administration is a tool that cannot be missing in any modern company. Having multiple devices and having to manage them independently is inefficient and even insecure. Thanks to the functionalities that FortiManager offers us, we can centralize all the management and administration of our Fortinet equipment as well as the deployment of configurations to multiple devices with a few clicks, thus allowing not only to be more efficient and comply with the most high quality standards, it also provides us with tools when it comes to managing our teams among several employees, avoiding configuration conflicts and thus avoiding the loss of information or downtimes in our infrastructure, we can define approval workflows that allow us to see all the changes that were made through revisions and revert them in case of failure, backup centralization, locate objects and policies that are not used to maintain a clean and updated inventory, and much more! And like all my courses, this will not be the exception and will have a laboratory at no additional cost that you can install on your computer so you can practice without the need to invest in equipment using EVE-NG virtual environment.
Overview
Section 1: Introduction
Lecture 1 INTRODUCTION AND INITIAL CONFIGURATION
Section 2: ADMINISTRATION AND MANAGEMENT
Lecture 2 ADMINISTRATION AND MANAGEMENT
Section 3: DEVICE REGISTRATION
Lecture 3 DEVICE REGISTRATION
Section 4: DEVICE-LEVEL CONFIGURATION AND INSTALLATION
Lecture 4 DEVICE-LEVEL CONFIGURATION AND INSTALLATION
Section 5: POLICY AND OBJECTS
Lecture 5 POLICY AND OBJECTS
Section 6: DIAGNOSTICS AND TROUBLESHOOTING & ADDITIONAL CONFIGURATION
Lecture 6 DIAGNOSTICS AND TROUBLESHOOTING & ADDITIONAL CONFIGURATION
network security admin