Configuring Fortigate Unified Threat Management Appliances
4.2 (98 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
464 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Configuring Fortigate Unified Threat Management Appliances to your Wishlist.

Add to Wishlist

Configuring Fortigate Unified Threat Management Appliances

Build up your network security knowledge by learning how to use the no. 1 UTM Appliance available
4.2 (98 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
464 students enrolled
Last updated 12/2016
Current price: $10 Original price: $155 Discount: 94% off
5 hours left at this price!
30-Day Money-Back Guarantee
  • 4.5 hours on-demand video
  • 22 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Install a Fortigate UTM
  • Understand the functioning of the UTM device
  • Configure basic parameters of the device
  • Create policies for traffic
  • Create objects and work with virtual IPs
  • Learn to configure users on the device
  • Configure logs and additional logging parameters
  • Create VPN connections
  • Create and use web filters for traffic
  • Create antivirus and application filters
  • Get to know the new version of FortiOS, namely 5.4
  • Perform device recovery and use additional tools
  • Deploy Fortinet Wifi Access Points and use the FortiOS Wifi Controller
  • Understand and use the Transparent Mode
  • Understand VDOMs
  • Deploy the Fortinet Single Sign-on solution
  • Configure and deploy SSL VPNs and portals
  • Create Site-to-Site VPN Tunnels
  • Understand and use the Data Leak Prevention function
View Curriculum
  • Basic networking knowledge
  • Desire to learn

*** Course updated with new information and new activities! See below! ***

Today we live in a world where network and cyber security are two of the most important subjects. Everyone is talking about them, about how to protect the network and how to protect end-users against malicious attackers.

Network security is one of the big trends with unparalleled growth, because the number and severity of attacks in increasing everyday. Businesses all around the globe are finding out the hard way that if you are not paying attention to how you secure your IT infrastructure, you stand to lose not only huge amounts of money, but also you can lose your reputation.

This course covers one of the best tools you can deploy in your fight against IT threats, namely the Fortigate UTM and how you can use this tool to take control of your network while assuring that you are protected.

You will learn how the Fortigate UTM works, how to configure it and adapt it to your business, how to protect your users with it along with your network and how to prevent incidents from the inside of your network. You also have powerful reporting available within the device.

By the end of this course you will be able to transform your network security with a very powerful device and have the solid skills that you can use in the future to expand your knowledge.

*** Course Updated - 30.12.2016 ***

In the update you will find lessons regarding the FortiOS 5.4 Update, recovery procedure and productivity tools, Wifi deplayment with Fortinet Wifi Access Points, Transparent Mode, Virtual Domains, Single Sign-On, SSL VPN, Site-To-Site VPN, Data Leak Prevention, E-mail Filtering and Intrusion Prevention

Who is the target audience?
  • Anyone with a basic understanding of networking concepts. This course in not for you if you are already proficient with other UTM devices
Compare to Other Network Security Courses
Curriculum For This Course
40 Lectures
Getting started
2 Lectures 10:37

Your first contact with the world of Fortinet

Preview 07:38

Get to know the Fortigate 90D device that we will be working with

PDF download included

Preview 02:59
Initial setup and tips
6 Lectures 24:41

Learn about the USB management capabilities of the device

USB management

Learn how to connect to the console

Console connection

Learn how to reset the admin account password in case you forget it

Reset admin password

Learn how to return the device to factory settings

Factory reset

Learn how to change the important Switch to Interface Mode setting

Switch to Interface Mode

Learn how to update the firmware on the Fortigate unit

Update firmware
System settings walkthrough
11 Lectures 01:01:54

Go through the dashboard and status settings

Dashboard and Status

Go through the network settings offered by the device and lean what the different parameters do

You also have a PDF which explains Redundant Connections and an external link for Dual WAN scenarios


Understand the settings offered in the Config section of the menu


Learn to change the settings in the Admin section of the device


Learn how to monitor DHCP leases and also how to monitor connections

You also have a PDF which teaches you how to change the default DHCP lease time


Learn what policies are and how you can work with them and also what other options you have in the Policy and Objects section of the menu

You also have a PDF which explains the Policy Monitor

Policy and Objects

Learn about the security profiles that the Fortigate unit offers

Security profiles

Learn about the VPN capabilities of the device and the different options in which you can create VPNs

You also have a PDF which explains how to use the VPN Monitor


Learn about the way in which you can define users and devices in the Fortigate unit

You also have a PDF which explains the User Monitor

User and Device

Learn a bit about the integrated Wifi and Switch controller

Wifi controller

Learn about the logging options the unit offers

You also have a PDF which explains the FortiView option in great detail

Practical Exercises
10 Lectures 46:36

Let's start doing some practical exercises

You also have a PDF with the network topology we will be using

Intro and Network Diagram

Configure interfaces on the system to get the desired result

Configure interfaces

Configure addresses on the system to make identification and policy work much easier

Configure addresses

Start creating policies and influence the traffic flow through the device

Configure policies

Configure a Virtual IP to allow traffic towards an intended target system

Configure Virtual IPs

Create a web filter to block certain webpages

Configure Web filtering

Create an antivirus filter in order to block viruses from entering your network

Configure Antivirus filtering

Create an application filter to block or allow traffic of a given app

Configure Application filtering

Create a dial-in VPN in order to let remote users connect to our local network

Dial-in VPN

View logs and create a report

Logs and reports
1 Lecture 01:08

This lecture is the conclusion to all our work together so far and more. I say more because I have included some tips on how you can improve your knowledge and some which I consider your key reference when dealing with Fortigate devices.

All in all this is our last lesson, but don't stop learning here. Use the resources I have given and feel free to ask for help from me or the large Fortinet community located at

Conclusion for the course
Course Update
10 Lectures 02:02:57

In this lesson we'll discuss about the 5.4 version of FortiOS which packed with many new features and improvements

FortiOS 5.4 Update

Learn how to recover a system that has trouble booting and also how to use some tools which are great in your admin arsenal

Device recovery and Tools

Learn how to deploy Fortinet Wifi Access Points and also how to use the Wireless Controller which is integrated with FortiOS

Fortinet Wifi Access Points and Wifi Controller

Learn how to use the Transparent Mode offered by the Fortigate units in order to gain advanced threat protection in difficult to modify network environments

Transparent Mode

Learn how to use the Virtual Domain feature present in the Fortigate units

Fortigate VDOMs

Learn how to integrate your Fortigate unit with an Active Directory infrastructure and how to enable and offer Single Sign-On capabilities to your users

Fortigate Single Sign-On

Learn how to create SSL VPNs and portals for your users


Learn how to configure site-to-site VPNs between your branches

Site-To-Site VPN

Implement Data Leak Prevention measures in order to avoid your digital data getting stolen or leaked

Data Leak Prevention

Get to know the E-mail and Spam filtering capabilities of your Fortigate unit and also the Intrusion Prevention features offered by the UTM

E-mail Filtering and Intrusion Prevention
About the Instructor
Mr. Daniel Botescu
4.3 Average rating
112 Reviews
560 Students
4 Courses
IT Professional

I am an IT professional with more than 12 years of experience in multiple segments of Information Technology. I hold an BS in Computer Science and an MSC in Information Security apart from multiple industry leading certifications like Project Management Professional, VMWare VCP, Microsoft MCSA, Citrix CCA to name just a few.

My skills span from virtual infrastructures to IT operations, from networking to IP video surveillance. I also believe in continued education and continue to improve my skill set everyday, also one of the reasons of starting as an instructor here on Udemy.

Teaching has also been an integral part of my professional life, having transferred project knowledge to personnel from client companies, organized workshops and demos or participating in live events and conferences.

If you don't learn something new one day, you lost that day!