Fortinet Certified Associate Cybersecurity (FCA) °ê»Ú»{¥iÃҮѽҵ{



¥»¤¤¤ß²{¤w¤ä´© Âà¼Æ§Ö ¥I´Ú¡C



±À¤¶ªA°È¡G½Ò°ó¿ý¼vÀH®ÉÚ»
(¦b®aÆ[¬Ý = 0%¡A¦b®ÕÆ[¬Ý = 100%)

100% ¦b®ÕÆ[¬Ý¤é´Á¤Î®É¶¡¡G
¦Û¥Ñ¿ï¾Ü¡AÂI¿ï¥H¤U¦a°ÏÆ[¬Ý¿ì¤½®É¶¡¤Î¦ì¸m

¤£­­¡G$6,280 (¦aÂI¨S¦³­­¨î)³ø¦W
©ô¨¤¡G95§é $5,966 ³ø¦W phone
¹q¸Ü¡G2332-6544
Æ[¶í¡G9§é $5,652 ³ø¦W phone
¹q¸Ü¡G3563-8425
¥_¨¤¡G9§é $5,652 ³ø¦W phone
¹q¸Ü¡G3580-1893
¨F¥Ð¡G85§é $5,338 ³ø¦W phone
¹q¸Ü¡G2151-9360
¤Ùªù¡G85§é $5,338 ³ø¦W phone
¹q¸Ü¡G3523-1560

½Ò®É¡G 30 ¤p®É

¨É¥Î®É´Á¡G 10 ¬P´Á¡C¶i«×¥Ñ±z±±¨î¡A¥i§Ö¥iºC¡C

½Ò°ó¿ý¼v¾É®v¡GLarry
¦b®Õ§K¶O¸ÕÚ»¡G­º 3 ¤p®É¡A½Ð­P¹q¥H¤W¦aÂI»P¥»¤¤¤ß¾­û¹w¬ù¡C

¥»½Òµ{´£¨Ñ¦b®Õ§K¶O­«Ú»¤Î¾É®v¸ÑµªªA°È¡C




Fortinet ¬O¤@®a¥þ²y»â¥ýªººô¸ô¦w¥þ¤½¥q¡A©ó 2000 ¦~¦¨¥ß¡CFortinet ±Mª`©ó´£¨Ñ¼sªxªººô¸ô¦w¥þ¸Ñ¨M¤è®×¡A¥]¬A¨¾¤õÀð (Firewall)¡B¤J«I¨¾¿m¨t²Î (IPS)¡B¨¾¬r³n¥ó¡BµêÀÀ¨p¤Hºô¸ô (VPN)¡B¥H¤Îºô¸ô¬y¶qºÞ²z¤u¨ã¡C

Fortinetªº²£«~©MªA°È¦®¦b«OÅ@¥ø·~©M²Õ´§K¨ü¦UÃþºô¸ô«Â¯Ù¡A¦p´c·N³n¥ó¡B°Ç¯Á³n¥ó¡B³¨³½§ðÀ»©M¤À´²¦¡ªýÂ_ªA°È§ðÀ» (DDoS)¡C

Fortinet ªº¬Õ§Q¼Ò¦¡¬O³q¹L¾P°â¨äµw¥ó³]³Æ¡B³n¥ó­q¥ÎªA°È©M±M·~§Þ³N¤ä´©¡C¨ä®Ö¤ß²£«~ FortiGate ¨¾¤õÀð¥H°ª©Ê¯à©M¥þ­±ªº¦w¥þ¥\¯à¨£ºÙ¡A¥O Fortinet ¦b¥þ²yºô¸ô¦w¥þ¥«³õ¤¤¦û¾Ú¤F­«­n¦a¦ì¡C

¦¹¥~¡AFortinet ÁÙ´£¨Ñ FortiGuard Labs ªº«Â¯Ù±¡³ø©M¦w¥þªA°È¡A¬°«È¤á´£¨Ñ§Y®Éªº«Â¯Ù¨¾¿m©M¦w¥þ§ó·s¡C

®Ú¾Ú IDC ¥«³õ¬ã¨s³ø§i¡AFortinet ¦b¥þ²yºô¸ô¦w¥þ¥«³õ¤¤¾Ö¦³ÅãµÛªº¥«³õ¥÷ÃB¡A¤×¨ä¬O¦b²Î¤@«Â¯ÙºÞ²z (UTM) ©M¥ø·~¨¾¤õÀð»â°ì¡C

Top 5 Companies, Worldwide Security Appliance Total Market Revenue and Market Share

ÁöµM¨ãÅ饫³õ¥÷ÃB¼Æ¾Ú¥i¯à·|ÀH®É¶¡ÅÜ°Ê¡A¦ý Fortinet ¦b³o¨Ç»â°ì³q±`¦ì¦C«e­T¡A»P¨ä¥L»â¥ýªººô¸ô¦w¥þ¤½¥qÄvª§¡A¦p Cisco¡BCheck Point ©M Palo Alto Networks¡C

Fortinet ³z¹L¤£Â_³Ð·s©MÂX®i¨ä²£«~²Õ¦X¡A½T«O¨ä¦b¤£Â_Åܤƪººô¸ô¦w¥þ»â°ì¤¤«O«ù»â¥ý¦a¦ì¡C

Fortinet ¦b¥þ²y¾Ö¦³¦h­Ó¬ãµo¤¤¤ß©M¿ì¨Æ³B¡A¹µ¥Î¤F¶W¹L 13,000 ¦W­û¤u¡A¬Oºô¸ô¦w¥þ¦æ·~ªº¤T¤j»â¾ÉªÌ¤§¤@¡A¸Ô¨£¥H¤U Gartner - Magic Quadrant for Network Firewalls:

§@¬°¤@®a­P¤O©óºô¸ô¦w¥þªº¤½¥q¡AFortinet ª`­«±À°Êºô¸ô¦w¥þªº³Ð·s©Mµo®i¡A»P·~¤º¨ä¥L¤½¥q©M²Õ´¦X§@¡A¦@¦PÀ³¹ï¤£Â_¥X²{ªººô¸ô«Â¯Ù¡C

Fortinet (NASDAQ: FTNT) ªº¥«­È¬ù¬° 583 »õ¬ü¤¸ (¶W¹L4540»õ´ä¤¸)¡A¬O¥þ²yºô¸ô¦w¥þ¦æ·~ªº»â¥ý¥ø·~¤§¤@¡C®Ú¾Ú¸Ó¤½¥qªº¦~«×°]³ø¼Æ¾ÚÅã¥Ü¡A¨ä¥þ¦~À禬¬° 53 »õ¬ü¤¸¡A¸û¤W¦~¦P´Á¼Wªø 20%¡F¤ò§Q¬ù¬° 40 »õ¬ü¤¸¡C

Á`Åé¦Ó¨¥¡AFortinet ¦bºô¸ô¦w¥þ¦æ·~¾Ö¦³Ã­°·ªº°]°Èª¬ªp©M±j¤jªº¥«³õ¦a¦ì¡A¨Ã«ùÄò³q¹L§Þ³N³Ð·s©M·~°È©Ý®i¨Ó±À°Ê¨ä¦b¥«³õ¤¤ªºÄvª§¤O¡C

Fortinet ªº®Ö¤ß§Þ³N¡GFortiOS (¥»½Òµ{ªº¥D­n¤º®e)

FortiGate Next Generation Firewall (NGFW) ²£«~±Ä¥Î¤F±M¥Îªº¦w¥þ³B²z´¹¤ù (ASIC)¡A¨Ã¶°¦¨¤F¦Û¦³ªº FortiGuard ¹êÅç«Çªº«Â¯Ù±¡³øªA°È¡A´£¨Ñ·~¬É»â¥ýªº¦w¥þ«OÅ@¥\¯à©M¥]¬A¥[±K¬y¶q¦b¤ºªº¶W°ª©Ê¯à¡C

³o¨Ç±M¥Îªº¦w¥þ³B²z´¹¤ù¥Ñ Fortinet ¿Ë¦Û³]­p¨Ã¥æ¥Ñ TSMC (¥x¿n¹q) ¥H¦¨¼ôí©w¤Î½è¯ÀÀu¨}ªº 7 ¯Ç¦Ì¨îµ{¥Í²£¡C¥H NP7 ¬°¨Ò¡AFortinet ªº³æ¤@¦w¥þ³B²z´¹¤ù¥þ¹LÂo®Ä¯à¥i°ª¹F 198 Gbps¡I

FortiGate ©Ò´£¨ÑªºÀ³¥Î¡B¨Ï¥ÎªÌ©Mºô¸ôµøı¤Æ¤j¤j­°§C¤F³]©w¤ÎºÊ¹îºô¸ô¦w¥þªº½ÆÂøµ{«×¡A¦P®É¬°§Aªº³]©w´£¨Ñ¦w¥þµû¯Å¤Î«Øij (Security Advise)¡AÅý§A¯à°÷¿í±qºô¸ô¦w¥þªº³Ì¨Î³]©w (Security Best Practice)¡C

ºô¸ô¦w¥þ¤uµ{®v¦Ò¼{ªº¬O¦p¦ó¨Ï¥Î FortiGate ¨¾¤õÀ𬰨ä¥ø·~´£¨Ñ¥þ­±ªº«Â¯Ù¨¾Å@¡A³o¥]¬A¤J«I¨¾¿m¡BWeb ¹LÂo¡B¤Ï´c·N³nÅé©MÀ³¥Îµ{¦¡±±¨î¡C

¨Ì¾ÚµÛ¦W¬ã¨s¾÷ºc Gartner ªº±ÀÂ_¡A80% ªº¥ø·~¬y¶q (Traffic Flow) ¬O³B©ó³Q¥[±Kªºª¬ºA¡A¦Ó 50% °w¹ï¥ø·~ªº§ðÀ»¬OÁôÂæb¥[±K¬y¶q¤¤¡C¦]¦¹¡A²{¥N¨¾¤õÀð°w¹ï¤w¥[±Kªº¬y¶q³B²z¡B§ðÀ»°»´ú¡B¤J«I¨¾¿m¡B¬Æ¦Ü¬OªýÂ_¥[±K¬y¶qªº¯à¤O¤Î©Ê¯à¡A¦b¤µ®É¤µ¤éªº¥ø·~Åã±o¯S§O­«­n¡I

FortiOS §@¬°°ß¤@ªº FortiGate ¨¾¤õÀð§@·~¨t²Î¡A´N¥R¤Àµo´§¤F Fortinet ¦w¥þ³B²z´¹¤ùªº©Ê¯à¡A¥H³æ¤@´¹¤ù¨C¬í°ª¹F 17Gbps ªº©Ê¯à¨Ó³B²z¤Î«OÅ@¤w¥[±Kªº¬y¶q¡C³¡¥÷°ª¶¥«¬¸¹ªº FortiGate ¨¾¤õÀð§ó¦w¸Ë¦hÁû NP7 ¦w¥þ³B²z´¹¤ù¥H¹F¨ì§ó°ªªº¥[±K¬y¶q³B²z©Ê¯à¡C

FortiOS §@·~¨t²Î¬O Fortinet Security Fabric ªº®Ö¤ß


FortiOS

¦U¾÷ºc©Î²Õ´¦b±À¶i¼Æ¦ì¤Æ³Ð·s (Digital Innovation) ªº¹Lµ{¤¤¡A§¡»Ý­n½T«O¨ä¦w¥þ©Ê¯à¸ò±o¤W·í¤µ½ÆÂø¦ÓÀþ®§¸UÅܪº«Â¯Ù¡C

®Ú¾Ú Gartner¡BIDC¡BForester Research ¤Î Cisco Annual Internet Report ©ó 2018 ¦Ü 2023 ³o¤­¦~´Á¶¡¡A¥ø·~¨Ï¥Î²×ºÝ¥Î¤á³]³Æ¥Ñ¬ù 30 »õ¼Wªø¦Ü 50 »õ¡A¥i·Q¦Óª¾ºô¸ôÃä½tªº¦w¥þ§Î¶Õ¬O¬Û·íÄY®mªº¡C

µù¡G ºô¸ôÃä½t (Edge of the Network) ³q±`¬O«üºô¸ô¬[ºc¤¤±µªñ¥Î¤áºÝªº¨º¤@¼h¡A³oùز[»\¤F²×ºÝ¥Î¤á³]³Æ (¦p¤â¾÷¡B¹q¸£)¡B»·ºÝ¤À¤ä¾÷ºc (Branch & SOHO) ªººô¸ô³]³Æ¡A¥H¤Î»Pª«Ápºô (IoT) ¬ÛÃöªº¸Ë¸mµ¥¡A©óªñ¦~¥X²{Ãz¬µ¦¡¼Wªø¡C

ÀHµÛ¤u§@¼Ò¦¡ªºÂàÅÜ¡A³o¨Çºô¸ôÃä½t³]³Æ¦b¼Æ¶q¤W¡A¥H¤Î¥¦­Ì©Ò¥Í²£©M³B²z¼Æ¾Úªº«æ³t¼Wªø¡Aºô¸ôÃä¬É¤w¤£¦A¹³¥H©¹ªº¶°¤¤¦¡¬[ºc¨º¼Ë²M´·¡A¦Ó¬O§ó¥[¤À´²¡A¾É­P¤Fºô¸ôÃä¬Éªº¸H¤ù¤Æ¡C¬G¦¹³o­n¨Dºô¸ô¦w¥þµ¦²¤¥²¶·§ó¥[¾AÀ³³oºØ¥h¤¤¤ß¤Æªº¬[ºc¡A±q¦Ó½T«O©Ò¦³ºô¸ôÃä½tªº¦w¥þ©Ê¡C

¦h¦~¨Ó¬°¤F¸Ñ¨M³æ¤@°ÝÃD¦Ó²K¥[¦U¦¡¦U¼Ë¤£¬Û¤zªº¦w¥þ²£«~¡A¨Ã¥¼¦Ò¼{¨ì¾ãÅé¦w¥þ©Ê­ì«h¡A¾É­P¥X²{¦UºØºÞ²z¤Wªº¬D¾Ô¡C¦Ó§Ö³t¼Wªøªººô¸ôÃä½t«h¥[¼@¤F³o¨Ç¬D¾Ô¡C

¥H©¹¡A³o¨Ç¤£¦Pªº¸Ñ¨M¤è®×¬OµLªk¬Û¤¬¨ó§@©Î¤À¨É¸ê°Tªº¡A¾É­PµLªk¤@­P¦a¸¨¹ê¦w¥þ©Ê­ì«h©MºÝ¨ìºÝ¥i¨£©Ê¡C¦Óºû«ù©MºÊ±±²³¦hªº²V¦X¡BµwÅé¡B³nÅé©M ¡§X-as-a-Service¡¨ (¡§¤@¤Á¡¨ §YªA°È) ¸Ñ¨M¤è®×¤]¨Ï¦w¥þ¹Î¶¤¤£³ô­«­t¡C

Fortinet ªº FortiOS §@·~¨t²Î¬O Fortinet Security Fabric ¦w¥þ®Ø¬[ªº°ò¥Û¡A§â³\¦h§Þ³N©M¥Î¨Ò¾ã¦X¦¨¤F²Î¤@«Â¯Ù¨¾Å@¸Ñ¨M¤è®× (Unified Threat Management¡AUTM)¡C

·í§A³z¹L¥»½Òµ{¾Ç·| FortiOS UTM ¸Ñ¨M¤è®×¡A§A±N·|¬°§Aªº¾÷ºc©Î²Õ´±a¨Ó¥H¤Uªº¦n³B¡G

  • ÆF¬¡©Ê©M¾AÀ³©Ê¡G§Q¥ÎÆF¬¡ªº¸Ñ¨M¤è®×¨Ó³B²z²{¥N³]¬I¤¤¦UºØ½ÆÂøªº¦w¥þ³]©w¡C
  • ¶°¤¤¾ã¦X©MºÞ²z¡G§A¥i¥H±N©Ò¦³¥\¯à¾ã¦X¦b¤@­ÓºÞ²z±±¨î¥x¤¤¶i¦æ±±¨î¡C
  • °ª¦¨¥»®Ä¯q¡G´î¤Ö¤F§A¬°«OÅ@ºô¸ô¦Ó§ë¤Jªº³]³Æ¼Æ¶q¡AÅãµÛ¦a¸`¬Ù¦¨¥»¡C
  • ´£°ª¹ïºô¸ô¦w¥þ«Â¯Ùªº»{ÃÑ¡G¨Ï§Aªº¹Î¶¤¯à°÷§ó¦n¦aºÞ²z°ª¯Å«ùÄò©Ê«Â¯Ù©M¨ä¥L²{¥N¦MÀI¡C
  • §ó§Ö¸¨¹êªº¦w¥þ¸Ñ¨M¤è®×¡G²¤Æ¼Æ¾Ú³B²z¤è¦¡¡A¨Ã¦P®É¨Ï¥Î§ó¤Öªº¸ê·½¡C

¬°¤F´£¤É§A¦bºô¸ô¦w¥þ¤è­±ªº§Þ¯à¤ÎÀ³¦Ò Fortinet FCA »{ÃÒªº¯à¤O¡A¥»½Òµ{±N¸ÔºÉ±Ð±Â FortiOS ªº¥\¯à¤Î FortiGate ¨¾¤õÀ𪺳]©w¡A¨Ò¦p¡G

  • FortiGate ¨¾¤õÀð¨t¦C¤Î¥Ø¼Ð¥«³õ·§­z
  • ³]©w¤£¦PÃþ«¬ªº¤¶­±¥d (Interface)¡Bºô¸ô¦ì§}Âà´«§Þ³N (NAT) ©M¸ô¥Ñ (Routing)
  • ¨¾¤õÀ𵦲¤ (Firewall Policy)
  • ºô¸ô¨Ï¥ÎªÌ¨­¥÷ÅçÃÒ (User Authentication)
  • Àˬd SSL/TLS ¬y¶q
  • ªý¾×´c·N³nÅé
  • ºô­¶¹LÂo (Web Filtering)
  • ³]©w FortiGate ¤J«I¨¾¿m¨t²Î (IPS)
  • ¶³ºÝÀ³¥Îµ{¦¡±±¨î (Cloud Application Control)
  • «Ø¥ß IPsec µêÀÀ¨p¤Hºô¸ô (VPN)
  • ³]©w FortiGate SSL VPN
  • FortiGate NGFW ¨t²Î¤É¯Å¡BºûÅ@»PºÊ±±
  • ³]©w Fortinet ¦w¥þ¬[ºc (Security Fabric)


FCA

§¹¦¨¥»½Òµ{«á¡A§A¤£¦ý¥i¥H¦Ò¨ú FCA »{ÃÒ¡A§AÁÙ¥i¥H§â¾Ç·|ªººô¸ô¦w¥þª¾ÃѤΧ޳N¤Á¹ê¦a¨Ï¥Î©ó¥H¤Uªº FortiGate ¨¾¤õÀð¨t¦C²£«~¡A¨Ã§ë©ñ©ó§Aªº¥ø·~Àô¹Ò¡I

Entry Level - FortiGate 40F, 50G, 60F, 70F, 80F, 90G series

Mid Range - FortiGate 100F, 120G, 200F, 400F, 600F, 900G series

Datacenter - FortiGate 1000F, 1800F, 2600F, 3000F, 3200F, 3500F, 3700F, 4200F, 4400F, 4800F, 6001F, 6300F, 6500F, 7081F, 7121F

½Òµ{¦WºÙ¡G Fortinet Certified Associate Cybersecurity (FCA) °ê»Ú»{¥iÃҮѽҵ{
- ²ºÙ¡GFortinet FCA Training Course
½Òµ{®É¼Æ¡G ¦X¦@ 30 ¤p®É (¦@ 10 °ó)
¾A¦X¤H¤h¡G ¹ï¹q¸£ºô¸ô¦³°ò¦»{ÃѪº¥ô¦ó¤H¤h¡C
±Â½Ò»y¨¥¡G ¥H¼sªF¸Ü¬°¥D¡A»²¥H­^»y
½Òµ{µ§°O¡G ¥»¤¤¤ß¾É®v¿Ë¦Û½s¼g­^¤å¬°¥Dµ§°O¡A¦Ó³¡¥÷­^¤å¦rªþ¦³¤¤¤å¹ï·Ó¡C

1. Larry Chan ¿Ë¦Û±Ð±Â¡G Larry µ½©ó±±¨î¾Ç²ß¸`«µ¡A²`¤J²L¥X¡A¥O¾Ç­û¦b»´ÃP®ðª^¤U¡A´x´¤¹q¸£§Þ¥©¡C
2. Larry Chan ¿Ë¦Û½s¼gµ§°O¡G Larry ¿Ë¦Û½s¼gµ§°O¡Aµ´¹ï¾A¦X FCA ¦Ò¸Õ¤Î¹ê»Ú¤u§@¤§¥Î¡C
3. ´£¨Ñ¼ÒÀÀ¦Ò¸ÕÃD¥Ø¡G ¥»¤¤¤ß¬°¾Ç­û´£¨Ñ FCA ªº¼ÒÀÀ¦Ò¸ÕÃD¥Ø¡A¨C±ø¦Ò¸ÕÃD¥Ø§¡ªþ¦³¼Ð·Çµª®×¡C¦Ó¸ûÃø²z¸ÑªºÃD¥Ø¡A§¡·|ªþ¦³ Larry ªº¸ÑÄÀ¡C
4. ²z½×»P¹ê²ß¨Ã­«¡G ¥»¤¤¤ßªº FCA ½Òµ{¤j³¡¥÷®É¶¡¥H¹ê²ß¥Ü½d§Î¦¡±Ð±Â¡A¥O¾Ç­û¯u¥¿¤F¸Ñ¤Î´x´¤FortiGate¨¾¤õÀðºÞ²zªº­«­n§Þ¥©¡C
5. ¤@¤H¤@¾÷¤W½Ò¡G ¥»½Òµ{¥H¤@¤H¤@¾÷¼Ò¦¡¤W½Ò¡C
6. §K¶O­«Åª¡G ¶Ç²Î½Ò°ó¾Ç­û¥i©ó½Òµ{µ²§ô«á¤T­Ó¤ë¤º§K¶O­«¬Ý½Ò°ó¿ý¼v¡C

¥u­n§A©ó¤U¦C¬ì¥Ø¨ú±o¦X®æ¦¨ÁZ¡A«K¥iÀò Fortinet ¹{µo Fortinet Certified Associate Cybersecurity °ê»Ú»{¥iÃҮѡG

¦Ò¸Õ½s¸¹ ¬ì¥Ø¦WºÙ
FortiGate Operator FortiGate Operator

¥»¬ì¥Ø¦Ò¸Õ¶O¥Î¥þ§K¡AFortinet FCA ¬O©ó®a¤¤À³¦Òªº«D¤½¶}¦Ò¸Õ¬ì¥Ø¡A¦Ó³ø¦Ò«e¦Ò¥Í»Ý¶i¦æ¤@¨Ç¥Ñ Fortinet «ü©wªººô¤Wµ{§Ç¤Î¤âÄò¡C

¥»¤¤¤ß¾É®v±N©ó½Ò°ó¤º´£¨Ñ³q¹L¸Óµ{§Ç¤Î¤âÄòªº¥¿½T«ü¥Ü¡A¥O§A¶¶§Q³ø¦Ò§K¶O¦Ò¸Õ¡C

¦Ò¸ÕÃD¥Ø¥Ñ¦Ò¸Õ¤¤¤ß¶Ç°e¨ì§A­nÀ³¦Òªº¹q¸£¡A¦Ò¸Õ®É¥H¹q¸£§@µª¡C©Ò¦³¦Ò¸ÕÃD¥Ø§¡¬°­^¤å¡A¦Ó¤j¦h¼Æªº¦Ò¸ÕÃD¥Ø¬°³æ¶µ¿ï¾ÜÃD (·N§Y O) ©Î¦h¶µ¿ï¾ÜÃD (·N§Y ¤f)¡A¥H¤Î¹ê¾ÔÃD¡C§@µª§¹¦¨«á·|¥ß§Y¥X²{§Aªº¤À¼Æ¡Aµ²ªG§Y¦Ò§Yª¾¡I

¦Ò¸Õ¤£¦X®æ«K¥i©ó 15 ¤é«á­«·s³ø¦Ò¡A¤£­­¦¸¼Æ¡C±ýª¾¹D§@µª®É¶¡¡BÃD¥ØÁ`¼Æ¡B¦X®æ¤À¼Æµ¥¸Ô²Ó¦Ò¸Õ¸ê®Æ¡A¥iÂsÄý¥»¤¤¤ßºô­¶ "¦U¬ì¦Ò¸Õ¤À¼Æ¸ê®Æ"¡C


½Òµ{¦WºÙ¡GFortinet Certified Associate Cybersecurity (FCA) °ê»Ú»{¥iÃҮѽҵ{
- ²ºÙ¡GFortinet FCA Training Course

1. FortiOS
1.1 ²V¦X¦¡ºôª¬¬[ºc¨¾¤õÀð
1.1.1 ºÞ²z IT ½ÆÂø©Ê
1.1.2 ºô¸ô¦w¥þ§Þ¯à¸¨®t
1.1.3 ¶i¶¥«Â¯Ù¿³°_
1.1.4 AI/ML ªº¨¤¦â»P«Â¯Ù±¡¸ê (Threat Intelligence)
1.2 ²V¦X¦¡ºôª¬¬[ºc¨¾¤õÀð¤¤À³ª`·N¨Æ¶µ
1.2.1 ¶°¤¤²Î¤@ªººÞ²z
1.2.2 ASIC «¬³]³Æ
1.2.3 ¶³­ì¥Í¨¾¤õÀð (Cloud Native Firewall)
1.2.4 µêÀÀ¨¾¤õÀð
1.2.5 ¨¾¤õÀð§YªA°È (FWaaS)
1.2.6 ³æ¤@§@·~¨t²Î
1.3 A Brief summary of steps getting a FortiGate up and running
1.4 Setting up FortiGate for management access
1.5 Completing the FortiGate Setup wizard
1.6 Planning and configuring the MGMT, WAN, and LAN interfaces
1.6.1 Management access
1.6.2 WAN interface
1.6.3 LAN interface
1.6.4 Configuring the default route
1.6.5 Configuring the hostname
1.6.6 Ensuring internet and FortiGuard connectivity
1.7 Registering a FortiGate device
1.8 Configuring a firewall policy
1.9 Backing up the configuration
1.10 Troubleshooting your installation (Optional Knowledge)

2. Using the GUI
2.1 Connecting using a web browser
2.2 Tables
2.2.1 Filters
2.2.2 Editing objects
2.2.3 Copying rows
2.2.4 Entering Values
2.2.5 Numbers
2.3 GUI-based global search
2.3.1 Loading artifacts from a CDN
2.3.2 Accessing additional support resources
2.3.3 Command palette
2.4 Recovering missing graphical components

3. Using the CLI
3.1 Connecting to the CLI
3.1.1 Console connection
3.1.2 SSH access
3.2 CLI basics
3.2.1 Help
3.2.2 Shortcuts and key commands
3.2.3 Command tree
3.2.4 Command abbreviation
3.2.5 Adding and removing options from lists
3.2.6 Environment variables
3.2.7 Special characters
3.2.8 Using grep to filter command output
3.2.9 Language support and regular expressions
3.2.10 Screen paging
3.2.11 Changing the baud rate
3.2.12 Editing the configuration file
3.3 Command syntax
3.3.1 Notation
3.3.2 Optional values and ranges
3.3.3 next
3.3.4 end
3.4 Subcommands
3.4.1 Table subcommands
3.5 Permissions

4. Configuration and Management Tools
4.1 FortiExplorer Go and FortiExplorer
4.1.1 FortiExplorer Go
4.2 Getting started with FortiExplorer
4.3 Connecting FortiExplorer to a FortiGate with WiFi
4.4 Configure FortiGate with FortiExplorer using BLE
4.5 Running a security rating
4.6 Migrating a configuration with FortiConverter

5. Product Registration with FortiCare
5.1 FortiCare and FortiGate Cloud login
5.2 FortiCare Register button
5.3 Transfer a device to another FortiCloud account
5.4 Deregistering a FortiGate

6. FortiGate models
6.1 Differences between models
6.2 Low encryption models
6.2.1 Reasons for Using Low-Encryption Models
6.2.2 Practical Limitations of Low-Encryption Models
6.3 LEDs
6.3.1 More about Port LEDs
6.3.2 Alarm levels
6.4 Proxy-related features not supported on FortiGate 2 GB RAM models
6.5 Upgrading from previous firmware versions

7. Dashboards and Monitors
7.1 Using dashboards
7.2 Viewing device dashboards in the Security Fabric
7.3 Creating a fabric system and license dashboard
7.3.1 Example
7.4 Dashboards
7.4.1 Resetting the default dashboard template
7.4.2 Status dashboard
7.4.3 Updating system information
7.4.4 Viewing Fabric devices
7.4.5 Viewing administrators
7.4.6 Viewing logs sent for remote logging source
7.4.7 Resource widgets
7.4.8 Viewing session information for a compromised host
7.4.9 Network dashboard
7.4.10 DHCP monitor
7.4.11 IPsec monitor
7.4.12 IPsec monitor
7.4.13 SSL-VPN monitor
7.5 Assets & Identities
7.5.1 Assets
7.5.2 Assets and filtering
7.5.3 Adding MAC-based addresses to devices
7.5.4 Firewall Users monitor
7.5.5 WiFi dashboard
7.5.6 FortiAP Status monitor
7.5.7 Clients by FortiAP monitor
7.5.8 Health status

8. FortiView Monitors
8.1 Optimal and Comprehensive Template
8.2 Core FortiView monitors
8.3 Adding FortiView monitors
8.4 Using the FortiView interface
8.4.1 Real-time and historical charts
8.4.2 Data source
8.4.3 Drilldown information
8.5 Enabling FortiView from devices
8.6 FortiView sources
8.7 FortiView Sessions
8.8 FortiView Top Source and Top Destination Firewall Objects monitors
8.9 Viewing top websites and sources by category
8.10 Cloud application view
8.11 Configuring the Cloud Applications monitor
8.12 Monitoring network traffic without SSL deep inspection

9. Deploying FortiGate-VM
9.1 FortiGate-VM models and licensing
9.2 Deployment package contents
9.3 Permanent trial mode for FortiGate-VM

10. Firewall Policy
10.1 Firewall Policy Parameters
10.2 Configurations in the GUI
10.3 Configurations in the CLI
10.3.1 Firewall anti-replay option per policy
10.3.2 Deny matching with a policy with a virtual IP applied
10.3.3 Hardware acceleration
10.3.4 TCP Maximum Segment Size (MSS)
10.3.5 Adjusting session time-to-live (TTL)
10.3.6 Policy views
10.3.7 Policy match
10.4 Services
10.4.1 Predefined services
10.4.2 Custom services
10.4.3 Service groups

11. Local-in policy
11.1 Configuring the local-in policy
11.2 Virtual patching on the local-in management interface
11.3 Implicit deny rule
11.4 TTL policies
11.5 Internet service as source addresses
11.6 Logging local traffic per local-in policy

12. DoS Policy
12.1 DoS anomalies
12.2 DoS policies

13. Access control lists

14. Interface Policies

15. Source NAT
15.1 Static SNAT
15.2 Dynamic SNAT
15.2.1 IP pool types
15.2.2 One-to-one
15.2.3 Fixed port range
15.2.4 Port block allocation
15.2.5 NAT64 in FortiGate firewall
15.2.6 IP pools and VIPs as local IP addresses
15.3 Central SNAT
15.3.1 To enable central SNAT from the GUI
15.3.2 To configure central SNAT using the CLI
15.3.3 Fine-tuning source port behavior
15.4 Configuring an IPv6 SNAT policy

16. Destination NAT
16.1 Configuring VIPs
16.2 Viewing VIP overlap in security rating reports
16.3 IP pools and VIPs as local IP addresses
16.4 Virtual IP with services

17. Virtual Server Load Balancing
17.1 SSL/TLS offloading
17.2 Virtual server requirements
17.2.1 Virtual server types
17.2.2 Load balancing methods
17.2.3 Health check monitoring
17.2.4 Session persistence
17.2.5 Real servers
17.2.6 Sample of HTTP load balancing to three real web servers
17.2.7 Virtual server load balance multiplexing

18. Security Profile Inspection Modes
18.1 Flow mode inspection (default mode)
18.2 Proxy mode inspection
18.3 Inspection mode feature comparison
18.3.1 Feature comparison between Antivirus inspection modes
18.3.2 Feature comparison between Web Filter inspection modes
18.3.3 Feature comparison between Email Filter inspection modes
18.3.4 Feature comparison between DLP inspection modes

19. Antivirus
19.1 Antivirus introduction
19.1.1 Protocol comparison between antivirus inspection modes
19.1.2 Other antivirus differences between inspection modes
19.2 Antivirus techniques
19.2.1 Content disarm and reconstruction
19.2.2 Virus outbreak prevention
19.2.3 External malware block list
19.2.4 EMS threat feed
19.2.5 AI-based malware detection
19.3 Configuring an antivirus profile
19.4 Proxy mode stream-based scanning
19.5 TCP windows
19.6 Flow mode stream-based scanning
19.7 Databases
19.8 FortiSandbox database

20. Web Filter
20.1 Web filter techniques
20.2 Configuring a web filter profile
20.3 FortiGuard filter
20.4 Blocking a web category
20.5 Allowing users to override blocked categories
20.6 Issuing a warning on a web category
20.7 Authenticating a web category
20.8 Customizing the replacement message page
20.9 Category usage quota
20.10 Restrict YouTube and Vimeo access
20.11 Block invalid URLs
20.12 URL filter
20.13 Block malicious URLs discovered by FortiSandbox
20.14 Web content filter
20.15 Credential phishing prevention

21. Video Filter
21.1 Configuring a video filter profile
21.2 YouTube API key
21.3 Filtering based on FortiGuard categories
21.4 Verifying that the video is blocked
21.5 Troubleshooting and debugging
21.6 Filtering based on YouTube channel
21.6.1 Identifying the YouTube channel ID
21.7 Filtering based on title
21.8 Filtering based on description

22. DNS filter
22.1 DNS filter behavior in proxy mode
22.2 Configuring a DNS filter profile
22.3 FortiGuard category-based DNS domain filtering
22.4 Botnet C&C domain blocking
22.5 Botnet C&C IPDB blocking
22.6 DNS safe search
22.7 DNS over QUIC and DNS over HTTP3 for transparent and local-in DNS modes

23. Inline CASB
23.1 Privilege control
23.2 Safe search
23.3 Tenant control
23.4 UTM bypass
23.5 Microsoft CoPilot Commercial Data Protection

24. Intrusion prevention
24.1 Signature-based defense
24.1.1 IPS signatures
24.1.2 Protocol decoders
24.1.3 IPS engine
24.1.4 IPS sensors
24.1.5 IPS filters
24.1.6 Custom and predefined signature entries
24.1.7 Overriding the default action
24.1.8 Policies
24.2 IPS configuration options
24.2.1 Malicious URL database for drive-by exploits detection
24.2.2 IPS signature rate count threshold
24.2.3 Botnet C&C
24.2.4 Extended IPS database
24.2.5 IPS engine-count
24.2.6 OT threat definitions
24.2.7 Fail-open
24.2.8 IPS buffer size
24.2.9 Session count accuracy
24.2.10 Protocol decoders
24.3 SCTP filtering capabilities
24.4 IPS signature filter options
24.4.1 Hold time
24.4.2 Viewing on hold information in the GUI
24.4.3 CVE pattern
24.4.4 IPS sensor attributes
24.5 IPS with botnet C&C IP blocking
24.6 IPS sensor for IEC 61850 MMS protocol
24.6.1 MMS (Manufacturing Message Specification) usage scenario
24.6.2 How FortiGate helps in securing MMS/ICCP communications
24.6.3 IPS signatures for the operational technology security service

25. VPN
25.1 Site-to-site VPN
25.1.1 Create a Phase 1 Interface
25.1.2 Phase 2 configuration
25.1.3 Adding routes for Route-Based VPN
25.1.4 Configuring Security Policy to allow traffic to pass through VPN tunnel
25.2 VPN IPsec troubleshooting
25.2.1 Understanding VPN related logs
25.3 IPsec related diagnose commands
25.4 VPN and ASIC offload

26. Remote Access VPN
26.1 FortiClient as dialup client
26.2 L2TP over IPsec
26.3 FortiGate as dialup client

27. Virtual Domains
27.1 VDOM overview
27.1.1 Multi-VDOM mode
27.1.2 Global settings
27.1.3 Global and per-VDOM resources
27.1.4 Management VDOM
27.1.5 VDOM types
27.1.6 Administrator roles and views
27.1.7 Inter-VDOM routing
27.1.8 Best practices
27.2 Enable multi-VDOM mode
27.2.1 To enable VDOMs in the GUI:
27.3 Management VDOM
27.4 Global and per-VDOM resources
27.5 Creating Traffic Type VDOM
27.6 Create per-VDOM administrators
27.7 Backing up and restoring configurations in multi-VDOM mode


¦^¨ì³»ºÝ keyboard_arrow_up