NSE4_FGT-7.2: Fortinet NSE 4 - FortiOS 7.2
Your Fortinet NSE4_FGT-7.2 exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the NSE4_FGT-7.2 certification test. Ace your Fortinet NSE4_FGT-7.2 at the first attempt and obtain the Fortinet NSE 4 - FortiOS 7.2 credential with ease.
Curriculum for NSE4_FGT-7.2 Video Course
Introduction
Video Name | Time | |
---|---|---|
1. Common Network Security Terms | 8:15 | |
2. Confidentiality, Integrity, Availability | 13:55 | |
3. Malicious Software | 29:26 | |
4. Different Firewall Technologies | 29:18 | |
5. Web Application Firewall WAF | 9:34 | |
6. Next-Generation Firewall (NGFW) | 11:44 | |
7. Fortinet, FortiGate and NSE4 Exam | 18:31 |
Video Name | Time | |
---|---|---|
1. Configure EVE-NG on VMWare Workstation | 17:58 | |
2. Configure EVE-NG Client Pack for Windows | 4:44 | |
3. Upload FortiGate Firewall in EVE-NG | 30:06 | |
4. Upload Other Lab Images in EVE-NG | 19:11 | |
5. Create and configure Lab Main Topology | 51:30 | |
6. Initial Working Lab in EVE-NG | 27:21 |
Video Name | Time | |
---|---|---|
1. Fortigate Firewall Dashboard | 12:47 | |
2. Fortigate Firewall Monitors | 3:20 | |
3. Fortigate Different Interfaces | 17:11 |
Video Name | Time | |
---|---|---|
1. VLAN Deployment In Fortigate Firewall | 22:41 | |
2. Zone in Fortigate Firewall | 9:37 | |
3. One-Armed Sniffer in Fortigate Firewall | 19:54 | |
4. Redundant Interfaces in Fortigate | 26:37 | |
5. Aggregate Interfaces in Fortigate | 18:20 | |
6. Theory of Software Switch in Fortigate | 4:06 | |
7. Software Switch in FortiGate Firewall | 19:54 | |
8. Virtual Wire Pair in Fortigate Firewall | 30:27 |
Video Name | Time | |
---|---|---|
1. Administrative Access in Fortigate | 10:53 | |
2. DNS in Fortigate Firewall | 40:27 |
Video Name | Time | |
---|---|---|
1. Static and Dynamic Routing Protocols | 20:37 | |
2. Configure and Verify Static and Default Route | 36:22 | |
3. Theory of Policy Routing in Fortigate Firewall | 5:30 | |
4. Configure and Verify Policy Routing | 40:11 | |
5. Theory of Equal Cost Multi-Path Routing ECMP | 24:05 | |
6. Configure and Verify Equal Cost Multi-Path | 38:16 | |
7. Theory of Dynamic Routing Protocol RIP | 4:56 | |
8. Configure and Verify RIP | 23:03 | |
9. Theory of Dynamic Routing Protocol OSPF | 04:25 | |
10. Configure and Verify OSPF | 11:15 | |
11. Theory of Dynamic Routing Protocol BGP | 4:45 | |
12. Dynamic Routing Protocol BGP Flavors | 3:52 | |
13. Configure and Verify BGP | 31:38 |
Video Name | Time | |
---|---|---|
1. Theory of Dynamic Host Configuration Protocol | 22:09 | |
2. Configure and Verify DHCP Server In FortiGate | 16:27 | |
3. Configure and Verify DHCP Server in Windows Server | 17:37 | |
4. Configure and Verify DHCP Relay in Fortigate Firewall | 14:54 |
Video Name | Time | |
---|---|---|
1. Theory of Network Address Translation NAT | 27:29 | |
2. Policy Source Interface Overload NAT | 8:01 | |
3. Policy Source Dynamic Overload NAT | 6:39 | |
4. Policy Source One-to-One NAT Lab | 8:49 | |
5. Policy Source Fixed Port Rang NAT | 13:52 | |
6. Policy Source Port Block Allocation NAT | 3:23 | |
7. Central Source NAT in Fortigate | 11:21 | |
8. Destination NAT and Virtual IP | 24:15 | |
9. VIP without Central SNAT | 9:14 |
Video Name | Time | |
---|---|---|
1. Theory of FortiGate Firewall Policies | 28:15 | |
2. MAC Address Based Firewall Policy | 09:10 | |
3. Local User Based Firewall Policy | 8:47 |
Video Name | Time | |
---|---|---|
1. Active Directory in Windows Server | 12:04 | |
2. DNS in MS Windows Server 2012 | 7:07 | |
3. Create Users & Groups in AD | 5:14 | |
4. Network Time Protocol in Server 2012 | 6:42 | |
5. Certificate Authority in Server 2012 | 11:43 |
Video Name | Time | |
---|---|---|
1. Theory of Security Profile in Firewall | 16:03 | |
2. Theory of SSL Inspection in Firewall | 18:59 | |
3. Configure and Verify SSL Inspection | 34:22 | |
4. Install Certificate in Client PCs | 3:00 | |
5. Theory of Antivirus Profile FortiGate | 6:03 | |
6. Configure and Verify Antivirus Profile | 9:02 | |
7. Theory of Web Filter Profile FortiGate | 7:35 |
Video Name | Time | |
---|---|---|
1. Lab and Workbooks | 2:50 | |
2. Configure Web Filter Profile | 23:22 | |
3. Configure Web Rating Override Profile | 6:46 | |
4. Configure Web Profile Override | 7:47 | |
5. DNS Filter Profile | 17:36 | |
6. Theory of Application Control | 8:12 | |
7. Configure Application Control | 31:36 | |
8. Theory of Intrusion Prevention System | 14:28 | |
9. Configure Intrusion Prevention System | 21:47 | |
10. Theory of File Filter Profile | 3:55 | |
11. Configure File Filter Profile | 5:25 |
Video Name | Time | |
---|---|---|
1. Theory of IPV4 DoS Policy | 10:46 | |
2. Configure IPV4 DoS Policy | 32:34 |
Video Name | Time | |
---|---|---|
1. Theory of Authentication | 8:39 | |
2. Active Authentication with Win AD | 24:17 | |
3. Install FSSO and DC Agent | 9:39 | |
4. Windows 10 to Join Windows AD | 9:07 | |
5. Passive Authentication With Win AD | 17:11 | |
6. Administrators with AD | 14:23 |
Video Name | Time | |
---|---|---|
1. Cryptography & Terminologies | 23:59 | |
2. Symmetric and Asymmetric Encryption | 18:11 | |
3. Hashing MD5 and SHA | 20:05 | |
4. Diffie-Hellman (DH) Group | 17:56 | |
5. Internet Protocol Security | 22:09 | |
6. IPSec Protocols ESP and AH | 25:45 | |
7. Internet Key Exchange (IKE) | 36:21 | |
8. SSL and TLS and Handshake | 22:16 | |
9. Virtual Private Network VPN | 18:37 | |
10. Policy-Based & Route-Based VPN | 14:04 | |
11. Site-to-Site Template Based VPN | 27:29 | |
12. Site-to-Site Custom Based VPN | 25:25 | |
13. Site-to-Site Policy-Based VPN | 13:33 | |
14. Theory of Remote-Access VPN | 13:34 | |
15. SSL Web Mode Remote-Access | 25:27 | |
16. SSL Tunnel Mode Remote-Access | 21:07 | |
17. IPSec Tunnel Remote-Access | 9:58 |
Video Name | Time | |
---|---|---|
1. Theory of SD-WAN | 30:37 | |
2. Configure SD-WAN | 44:53 |
Video Name | Time | |
---|---|---|
1. Theory of Virtual Domains VDOMs | 11:50 | |
2. Configure Virtual Domains VDOMs | 38:42 |
Video Name | Time | |
---|---|---|
1. Theory of High Availability | 24:01 | |
2. Active-Passive HA Lab | 30:18 | |
3. Active-Active HA Lab | 17:21 |
Video Name | Time | |
---|---|---|
1. Backup & Restore & Firmware Upgrade | 32:46 | |
2. CLI and Important Commands | 20:46 | |
3. Packet Sniffing | 13:56 | |
4. Packet Capture | 07:08 | |
5. Troubleshooting Methodologies | 7:53 | |
6. Troubleshooting Approaches | 9:58 |
Video Name | Time | |
---|---|---|
1. Backup of FortiGate Firewalls | 9:31 | |
2. Restore of FortiGate Firewalls | 9:32 |
Student Feedback
Similar Courses
Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.
Try Free Demo
Try Free Demo
Get 10% Discount on Your Purchase When You Sign Up for Email
Enter Your Email Address to Receive Your 10%
OFF Discount Code Plus... Our Exclusive Weekly Deals