Zero Trust Access (ZeroTrust Access)
Schedule
- T86680
- 2 days
- 07/10/2025 - 07/11/2025*
- 7:00 AM
- (GMT -06:00) Mountain Daylight Time
- Presented via WebEx
- VC
Virtual Classroom
Attend any of our instructor-led classes virtually regardless of your physical location.
- VC
- PC
Private Class
Privately train a group of your employees at your facility, virtually, or any of our locations.
- PC
- LCLive Classroom
Live Classroom
Learn and interact with your instructor and peers in-person in our classrooms. - VCVirtual Classroom
Virtual Classroom
Attend any of our instructor-led classes virtually regardless of your physical location. - PCPrivate Class
Private Class
Privately train a group of your employees at your facility, virtually, or any of our locations. - GTRGuaranteed to Run
Guaranteed to Run
GTR classes are guaranteed to run as promised and delivered.
*event may not be applicable to special offers or promotions.
Course Summary
Show All
Description
Prerequisites
You must have an understanding of the topics covered in the following courses, or have equivalent experience:
- NSE 4 FortiGate Security
- NSE 4 FortiGate Infrastructure
- NSE 5 FortiClient EMS
- NSE 5 FortiAnalyzer
- NSE 6 FortiAuthenticator
- NSE 6 FortiNAC
Who Should Attend
Networking and security professionals involved in the design, implementation, and operation of ZTA solutions using Fortinet products should attend this course.
Outline
- ZTA Overview
- ZTA Components
- Securing Network Access With FortiNAC
- Configure ZTNA for Secure Application Access
- Expanding Secure Access With Endpoint Posture and Compliance Checks
- Monitoring ZTA Enforcement and Responding to Incidents
- Objectives
- After completing this course, you should be able to:
- Understand ZTA architecture and the problems it solves
- Identify and review technology components required for ZTA enforcement
- Identify zero trust network access (ZTNA) as a component of ZTA
- Configure captive portal and agents for securely onboarding devices to the corporate, guest, and BYOD networks
- Configure security policies for onboarding and compliance, and provide dynamic access based on configured criteria
- Configure FortiGate ZTNA with tagging rules for dynamic groups and securing application access
- Configure endpoint posture and compliance checks, and monitor the status of connected endpoints
- Explain the role of a centralized logging platform (FortiAnalyzer)
- Explore remediation options to automate incident response for both on-net and off-net devices