Section I - General Introduction
Section I: General Introduction
Chapter 1. Introduction to UTM (Unified Threat Management)
Unified Threat Management (UTM) Foundations
Chapter 2. FortiGate Hardware Overview
FortiGate Custom Hardware Accelerations Overview
The ‘Black Art’ of FortiGate Sizing
Centralized Management Platform Overview
Chapter 3. FortiOS Introduction
Section II: UTM Technologies Explained
Chapter 4. Connectivity and Networking Technologies
Chapter 5. Base Network Security
Chapter 6. Application Security
Chapter 7. Extended UTM Functionality
Chapter 8. Analyzing your Security Information with FortiAnalyzer
FortiAnalyzer Generated Alerts
Additional FortiAnalyzer Features
Chapter 9. Managing Your Security Configurations with FortiManager
Device Level Management & Configuration
Managing Site-to-Site Distributed IPSec VPNs
Section III: Implementing a Security (UTM) Project
Chapter 10. Designing a Security Solution
Establishing a Network Security Architecture
Gathering Information for Sizing and Configuring a UTM Solution
Considerations for Planning a UTM Deployment
Chapter 11. Security with Distributed Enterprise and Retail
Example Distributed Enterprise and Retail Environment Topologies
Chapter 12. Security on Financial Services
Market Data Multicast Distribution
Protocol-Independent Multicast-Source-Specific Multicast (PIM-SSM)
Appendix A. Troubleshooting the Project
Engaging Fortinet Professional Services
Engaging Fortinet Technical Support
Appendix B. Troubleshooting Technically
Basic Troubleshooting Overview
3.129.39.252