After completing these courses, you will be able to:
- Describe capabilities of FortiGate UTM
 - Neutralize threats / misuse: viruses, phishing, spam, torrents, and inappropriate web sites
 - Control network access based on device type
 - Authenticate users via firewall policies
 - Offer an SSL VPN for secure access to your private network
 - Establish an IPsec VPN tunnel between two FortiGate appliances
 - Compare policy- vs. tunnel-based IPSec VPN
 - Apply port forwarding, source NAT, and destination NAT
 - Interpret log entries
 - Generate reports
 - Use the web UI and CLI for administration
 - Deploy the right operation mode
 - Simplify protocol handling with application control
 

