In this course, you will learn how to deploy, configure, and troubleshoot secure wireless LAN using an integrated wireless solution. Using interactive labs, you will enforce your knowledge of deploying a secure wireless LAN centrally managed from the FortiGate wireless controller.
Developing experts in the field of cybersecurity with Fortinet Network Security Expert certification programs.
- Why get trained: Develop practical cybersecurity skills through Fortinet’s Network Security Expert (NSE) training pathway, covering network defense, Fortinet security technologies and hands-on security operations.
- Why it matters: The NSE certification program validates cybersecurity expertise across multiple levels, helping professionals design, deploy and manage secure networks in enterprise environments.
- Who should attend: Network engineers, cybersecurity professionals, security analysts and IT teams responsible for protecting enterprise networks and managing Fortinet security solutions.
Build Fortinet cybersecurity expertise with Trainocate. HRD Corp Claimable.
-
In this course, you will learn about the basics of SD-WAN deployment scenarios using the Fortinet Secure SD-WAN solution. You will learn how to configure SDWAN on FortiGate and learn how SD-WAN interacts with FortiGate routing and firewall. This fundamental understanding of SD-WAN topics will help you design, deploy, maintain, and enhance SD-WAN deployments and existing SD-WAN deployment performance.
-
In this course, you will learn how to secure your operational technology (OT) infrastructure using Fortinet solutions. You will learn how to design, deploy, administer, and monitor FortiGate, FortiNAC, FortiAnalyzer, and FortiSIEM devices to secure OT infrastructures. These skills will provide you with a solid understanding of how to design, implement, and operate an OT security solution based on Fortinet products.
-
In this course, you will learn how to leverage the powerful and diverse capabilities of FortiNAC-F, using best practices for achieving visibility, control, and response. These fundamentals will provide you with a solid understanding of how to implement network visibility and security automation.
-
In this three-day FT-FWC: FortiWLC Training class, you will learn how to design, implement, and maintain a basic FortiWLC-based wireless network.
The practical labs will give you hands on experience in configuration, management, and monitoring of the wireless network
-
In this course, you will learn about FortiWeb deployment, configuration, and management. You will learn how to set up server objects, define security policies, and implement HA. This course covers protection against advanced threats using data validation, client-side security, and machine learning. You will also explore API security, bot mitigation, and application delivery features such as URL rewriting, single sign-on, caching, and acceleration. Additional topics include DoS prevention, logging, FortiAI integration, compliance standards (PCI DSS, OWASP), and basic troubleshooting.
-
In this two-day FT-FVC: FortiVoice course, you will learn how to configure FortiVoice systems, including using the phones.
In the interactive labs, you will explore FortiVoice profiles, extension set ups, trunk configurations, and call features.
-
In this course, you will learn about FortiSOAR architecture, and how to deploy, configure, manage, operate, and monitor FortiSOAR in a SOC environment. You will learn about various system customization options, HA deployment, security management using role-based access control (RBAC), and various system monitoring tools.
-
In this three-day FT-FSM: FortiSIEM Administrator course, you will learn about FortiSIEM initial configurations, architecture, and the discovery of devices on the network.
You will also learn how to collect performance information and aggregate it with syslog data to enrich the overall view of the health of your environment, how to use the configuration database to greatly facilitate compliance audits, and how to integrate FortiSIEM into your network awareness infrastructure.
Product version: FortiSIEM 7.2
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
-
In this course, you will learn how to use FortiSIEM to search, enrich, and analyze events from customers in a managed security service provider (MSSP) organization. You will learn how to perform real-time and historical searches, and build advanced queries. You will also learn how to perform analysis and remediation of security incidents using traditional and machine learning (ML)assisted methods.
-
In this course, you will learn how to deploy and manage FortiSASE to provide secure internet access and protect access to Software-as-a-Service (SaaS) applications for users working from on-site or remote locations. These topics will help you build a fundamental knowledge of FortiSASE basics, and learn how to enforce security policies using endpoint profiles and content inspection.
-
In this course, you will learn how to protect your organization and improve its security against advanced threats that bypass traditional security controls. You will learn about how FortiSandbox detects advanced threats.
You will also learn about how FortiSandbox dynamically generates local threat intelligence, and how other advanced threat protection (ATP) components leverage this threat intelligence information to protect organizations from advanced threats.
-
In this interactive course, you will learn how to deploy, provision, and manage a FortiSwitch with FortiGate using FortiLink. This course also covers the deployment and troubleshooting of Layer 2 and Layer 3 features, as well as the most common FortiSwitch stack topologies, including those that leverage multichassis link aggregation group (MCLAG) for redundancy and higher performance. You will also learn about FortiSwitch in standalone mode, its unique features, and how to manage a standalone switch directly, or from FortiLAN Cloud.
-
In this course, you will learn how to use the most common FortiGate features.
In interactive labs, you will explore firewall policies, user authentication, high availability, logging and monitoring, site-to-site IPsec VPN, FortiGate in Cloud, FortiSASE, and how to protect your network using security profiles, such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement the most common FortiGate features.
-
In this three-day FT-FML: FortiMail Training class, you will analyze email security challenges that administrators face, and learn where and how to deploy, manage, and troubleshoot FortiMail to protect your network from email-borne threats.
You will also explore the role of FortiMail as a specialized device, and how its features provide both high-performance and in-depth security for business-critical communications.
-
In this two-day FT-FMG: FortiManager Training class, you will learn the fundamentals of using FortiManager for centralized network administration of many FortiGate devices.
In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager.
-
FortiGate Administrator
In this course, you will learn how to use the most common FortiGate features. In interactive labs, you will explore firewall policies, user authentication, high availability, SSL VPN, site-to-site IPsec VPN, Fortinet Security Fabric, and how to protect your network using security profiles, such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide you with a solid understanding of how to implement the most common FortiGate features.
Cybersecurity is not optional. It’s Operational. Don’t wait for a breach. Build the skills. Earn the badge. Lead the defense. Explore our Top Cybersecurity Skills for Malaysia’s Digital Future campaign.
Be the reason your organization survives the next cyberattack.
-
In this 1-day FT-FDD: FortiDDoS Training class, candidates will learn how to form network baseline data, and how to recognize and mitigate individual and distributed denial of service (DDoS) attacks while preserving service and network performance.
In interactive labs, candidates will deploy FortiDDoS to learn about normal network traffic patterns. Then you will simulate attacks, observe the defense, and adjust the automatically estimated behavior.
With a focus on core feature skills, topics also include network behavior analysis and ASIC chips.
-
In this course, you will learn how to use the FortiClient EMS feature, provision FortiClient endpoints, FortiClient EMS Security Fabric integration, explore different editions of FortiClient, and deploy and configure ZTNA agent and endpoint security features. These fundamentals of the product will provide you with a solid understanding of how to deploy, manage and maintain endpoint security using FortiClient EMS products
In interactive labs, you will explore the FortiClient installation and features. You will also explore EMS components, database management, operation modes, how to deploy FortiClient, and more. These administration fundamentals will provide you with a solid understanding of how to implement and manage endpoint security and the Security Fabric.
-
In this course, you will gain the practical skills of a SOC analyst using FortiAnalyzer for centralized logging and analytics. You will learn how to examine and manage events, and automate threat response using event handlers and playbooks. You will also learn how to identify current and potential threats through incident analysis and outbreak reports.
Finally, you will learn how to incorporate FortiAI in your workflow and generate security reports.
-
In this FortiAnalyzer Administrator course, you will learn how to deploy, configure, and secure FortiAnalyzer. You will also learn how to register and manage devices with FortiAnalyzer. Finally, you will explore the fundamentals of the logging and reporting management capabilities included in FortiAnalyzer. These skills will provide you with a solid foundation for becoming a professional FortiAnalyzer administrator.
Product Versions: FortiAnalyzer 7.2
-
In this one-day FT-FAD: FortiADC Training class, candidates will learn how to configure and administrate the most commonly used features of a FortiADC. In interactive labs, candidates will explore Layer 4 and Layer 7 server load balancing, link load balancing, global load balancing, high availability, firewall policies, advanced routing, and more.
These administrative fundamentals will provide candidates with a solid understanding of how to implement an application delivery controller.
-
In this three-day FT-FAC: FortiAuthenticator Training class, you will learn how to use FortiAuthenticator for secure authentication and identity management. You will learn how to configure and deploy FortiAutheticator, use FortiAuthenticator for certificate management and two-factor authentication, authenticate users using LDAP and RADIUS servers, and explore SAML SSO and how FortiAuthenticator can act as both a SAML identity provider and service provider.
Finally, you will examine some helpful troubleshooting techniques.
In interactive labs, you will explore how to authenticate users, with FortiAuthenticator acting as a RADIUS and LDAP server, a certificate authority (CA), and logon event collector that uses—and extends—the Fortinet Single Sign-On (FSSO) framework to transparently authenticate users. You will explore portal services, FortiTokens, and digital certificates.
-
In this class, you will learn how to use FortiEDR to protect your endpoints against advanced attacks with real-time orchestrated incident response functionality. You will also explore FortiEDR features and how they protect your endpoints automatically in real time.





