Configuring Fortigate Unified Threat Management Appliances

Build up your network security knowledge by learning how to use the no. 1 UTM Appliance available
4.0 (34 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
175 students enrolled
Take This Course
  • Lectures 40
  • Length 4.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works


Find online courses made by experts from around the world.


Take your courses with you and learn anywhere, anytime.


Learn and practice real-world skills and achieve your goals.

About This Course

Published 3/2016 English

Course Description

Just launched! 10 Euro Promo Price!

Today we live in a world where network and cyber security are two of the most important subjects. Everyone is talking about them, about how to protect the network and how to protect end-users against malicious attackers.

Network security is one of the big trends with unparalleled growth, because the number and severity of attacks in increasing everyday. Businesses all around the globe are finding out the hard way that if you are not paying attention to how you secure your IT infrastructure, you stand to lose not only huge amounts of money, but also you can lose your reputation.

This course covers one of the best tools you can deploy in your fight against IT threats, namely the Fortigate UTM and how you can use this tool to take control of your network while assuring that you are protected.

You will learn how the Fortigate UTM works, how to configure it and adapt it to your business, how to protect your users with it along with your network and how to prevent incidents from the inside of your network. You also have powerful reporting available within the device.

By the end of this course you will be able to transform your network security with a very powerful device and have the solid skills that you can use in the future to expand your knowledge.

*** Course Updated - 30.12.2016 ***

In the update you will find lessons regarding the FortiOS 5.4 Update, recovery procedure and productivity tools, Wifi deplayment with Fortinet Wifi Access Points, Transparent Mode, Virtual Domains, Single Sign-On, SSL VPN, Site-To-Site VPN, Data Leak Prevention, E-mail Filtering and Intrusion Prevention

What are the requirements?

  • Basic networking knowledge
  • Desire to learn

What am I going to get from this course?

  • Install a Fortigate UTM
  • Understand the functioning of the UTM device
  • Configure basic parameters of the device
  • Create policies for traffic
  • Create objects and work with virtual IPs
  • Learn to configure users on the device
  • Configure logs and additional logging parameters
  • Create VPN connections
  • Create and use web filters for traffic
  • Create antivirus and application filters
  • Get to know the new version of FortiOS, namely 5.4
  • Perform device recovery and use additional tools
  • Deploy Fortinet Wifi Access Points and use the FortiOS Wifi Controller
  • Understand and use the Transparent Mode
  • Understand VDOMs
  • Deploy the Fortinet Single Sign-on solution
  • Configure and deploy SSL VPNs and portals
  • Create Site-to-Site VPN Tunnels
  • Understand and use the Data Leak Prevention function

Who is the target audience?

  • Anyone with a basic understanding of networking concepts. This course in not for you if you are already proficient with other UTM devices

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.


Section 1: Getting started

Your first contact with the world of Fortinet


Get to know the Fortigate 90D device that we will be working with

PDF download included

Section 2: Initial setup and tips

Learn about the USB management capabilities of the device


Learn how to connect to the console


Learn how to reset the admin account password in case you forget it


Learn how to return the device to factory settings


Learn how to change the important Switch to Interface Mode setting


Learn how to update the firmware on the Fortigate unit

Section 3: System settings walkthrough

Go through the dashboard and status settings


Go through the network settings offered by the device and lean what the different parameters do

You also have a PDF which explains Redundant Connections and an external link for Dual WAN scenarios


Understand the settings offered in the Config section of the menu


Learn to change the settings in the Admin section of the device


Learn how to monitor DHCP leases and also how to monitor connections

You also have a PDF which teaches you how to change the default DHCP lease time


Learn what policies are and how you can work with them and also what other options you have in the Policy and Objects section of the menu

You also have a PDF which explains the Policy Monitor


Learn about the security profiles that the Fortigate unit offers


Learn about the VPN capabilities of the device and the different options in which you can create VPNs

You also have a PDF which explains how to use the VPN Monitor


Learn about the way in which you can define users and devices in the Fortigate unit

You also have a PDF which explains the User Monitor


Learn a bit about the integrated Wifi and Switch controller


Learn about the logging options the unit offers

You also have a PDF which explains the FortiView option in great detail

Section 4: Practical Exercises

Let's start doing some practical exercises

You also have a PDF with the network topology we will be using


Configure interfaces on the system to get the desired result


Configure addresses on the system to make identification and policy work much easier


Start creating policies and influence the traffic flow through the device


Configure a Virtual IP to allow traffic towards an intended target system


Create a web filter to block certain webpages


Create an antivirus filter in order to block viruses from entering your network


Create an application filter to block or allow traffic of a given app


Create a dial-in VPN in order to let remote users connect to our local network


View logs and create a report

Section 5: Conclusion

This lecture is the conclusion to all our work together so far and more. I say more because I have included some tips on how you can improve your knowledge and some which I consider your key reference when dealing with Fortigate devices.

All in all this is our last lesson, but don't stop learning here. Use the resources I have given and feel free to ask for help from me or the large Fortinet community located at

Section 6: Course Update

In this lesson we'll discuss about the 5.4 version of FortiOS which packed with many new features and improvements


Learn how to recover a system that has trouble booting and also how to use some tools which are great in your admin arsenal


Learn how to deploy Fortinet Wifi Access Points and also how to use the Wireless Controller which is integrated with FortiOS


Learn how to use the Transparent Mode offered by the Fortigate units in order to gain advanced threat protection in difficult to modify network environments


Learn how to use the Virtual Domain feature present in the Fortigate units


Learn how to integrate your Fortigate unit with an Active Directory infrastructure and how to enable and offer Single Sign-On capabilities to your users


Learn how to create SSL VPNs and portals for your users


Learn how to configure site-to-site VPNs between your branches


Implement Data Leak Prevention measures in order to avoid your digital data getting stolen or leaked


Get to know the E-mail and Spam filtering capabilities of your Fortigate unit and also the Intrusion Prevention features offered by the UTM

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Mr. Daniel Botescu, IT Professional

I am an IT professional with more than 12 years of experience in multiple segments of Information Technology. I hold an BS in Computer Science and an MSC in Information Security apart from multiple industry leading certifications like VMWare VCP, Microsoft MCSA, Citrix CCA to name just a few.

My skills span from virtualized infrastructures to IT operations, from networking to IP video surveillance. I also believe in continued education and continue to improve my skill set everyday, also one of the reasons of starting as an instructor here on Udemy.

Teaching has also been an integral part of my professional life, having transferred project knowledge to personnel from client companies, organized workshops and demos or participating in live events and conferences.

Ready to start learning?
Take This Course