Modal title

Modal body text goes here.

The Fortinet Certified Trainer (FCT) assessment is a trainer evaluation process in which each candidate has to prove their training delivery skills. The FCT assessment is a two-day assessment that evaluates the FCT candidate’s ability to maintain Fortinet’s quality standards in technical knowledge, skills and instructional abilities.

Who can apply?

The FCT assessment candidate should be a Fortinet employee or a candidate sponsored by an ATC who has submitted proof of reference, along with an online application form. An FCT candidate who wants to apply for an FCT assessment must meet the following knowledge and experience eligibility requirements:

  • Extensive technical knowledge and skills in network security and cybersecurity
  • Five years of relevant experience in network security and cybersecurity
  • Certification in the required NSE training courses
  • Five years of experience in training delivery in IT security
  • Demonstrable training facilitation and delivery skills

If you meet all of these requirements you can apply for the FCT assessment!

Please contact fct@fortinet.com for queries and suggestions.

Skip to main content
Training Institute
  • Library
  • Schedule
  • Certifications
  • ATC
  • Academic Partner Program
  • Fast Track Workshops
  • Log in
  • Training
  • Library

FortiProxy

Download Course Description
Course Description

In this course, you will learn how to use FortiProxy features, including policy types, content analysis, and security profiles. You will also explore FortiProxy policies, deployment, user authentication, high availability, monitoring, and how to protect your web traffic using content inspection, such as IPS, antivirus, web filtering, application control, and logging.

Who Should Attend

Networking and security professionals involved in the management, configuration, administration, and monitoring of FortiProxy devices used to secure their organization's user web traffic.

Prerequisites
  • Knowledge of network protocols
  • Understanding of routers, switches, firewalls, and content inspection
  • Basic understanding of proxy concepts
Agenda
  1. Secure Web Gateway
  2. FortiProxy Deployment
  3. High Availability
  4. User Authentication
  5. Content Inspection
  6. Content Analysis
  7. Policy and Objects
  8. Security Fabric Integration
  9. Monitoring and Reporting
Objectives

After completing this course, you will be able to:

  • Deploy the appropriate FortiProxy configuration for your network
  • Use the GUI and CLI for administration
  • Control user web and application access using proxy policies
  • Authenticate users for web access
  • Inspect SSL/TLS-secured traffic
  • Collect and interpret log entries
  • Deploy FortiProxy devices as an HA cluster for fault tolerance and scalability
  • Configure security profiles to neutralize threats and misuse, including the following profiles:
    • Antivirus
    • Web filtering
    • Application control
    • Content inspection
    • Data leak prevention
  • Diagnose and correct common problems
System Requirements

If you take the online format of this class, you must use a computer that has the following:

  • A high-speed Internet connection
  • An up-to-date web browser
  • A PDF viewer
  • Speakers or headphones
  • One of the following:
    • HTML 5 support or
    • An up-to-date Java Runtime Environment (JRE) with Java plugin enabled on your web browser

You should use a wired Ethernet connection, not a WiFi connection. Firewalls, including Windows Firewall or FortiClient, must allow connections to the online labs.

Enroll Now

Access the latest self-paced training version

Purchasing Process

More information on how to purchase instructor-led courses, on-demand labs, exam vouchers, and study material.

Find an Instructor-Led Class

Browse our schedule for upcoming classes delivered by Fortinet.

Product Versions
  • FortiProxy 7.0.1
  • FortiAnalyzer 7.0.2
  • FortiGate 7.0.2
  • FortiManager 7.0.2
  • FortiIsolator 2.3.4
  • FortiAuthenticator 6.4.1
Course Duration
  • Lecture time (estimated): 8 hours
  • Lab time (estimated): 4 hours
  • Total course duration (estimated): 12 hours / 2 days
Formats
  • Instructor-led (classroom and online)
  • Self-paced online
ISC2
  • CPE training hours: 8
  • CPE lab hours: 4
  • CISSP domains: Security Operations
Part Number (SKU)

See Purchasing Process for more information

Certification

This course does not have a certification exam.

  • Dashboard
  • Library
  • Schedule
You are not logged in. (Log in)
Data retention summary