WELCOME TO

EXCLUSIVE NETWORKS

Staying ahead of change to build channel market success

WHY EXCLUSIVE?

Global IT opportunities, consumption models and cyber threats are constantly evolving.
We’re here to lead the pack.

Insights

Discover what’s driving the global market for disruptive cybersecurity, networking and infrastructure technologies.

The Exclusive Story

Value-added distribution isn’t what it used to be. As a market leader we have recognised this from the offset. We’ve never stopped redefining value; pushing the market; innovating for our partners.

We’ve always believed that a strong business needs new technologies and new services. They need an edge.

It’s not the strongest species that survives but those who adapt to change

Charles Darwin

So disrupt or be disrupted.

FIND OUT MORE

Latest News

  • fav FOCUSED VAD PLAYER - Bahi Hour, technical director, Exclusive Networks, on how the company is evolving its distribution model. What is your company’s core business and how does it define itself? We identify ourselves as a super value-added distributor (VAD) for cyber security solutions, networking and Infrastructure technologies. As a distributor, Exclusive Networks accelerates market entry and growth for
  • fav Exclusive Group announces 2015 financial results - Exclusive Group has announced an underlying organic growth of 31 percent and total pro forma annualised revenues of EUR 1.04 billion for 2015. According to the company, the results prove the success of its value-centric approach, relentless focus on cybersecurity and data centre transformation opportunities, and astute acquisition strategy. The performance underlines the Group’s momentum
  • fav Exclusive Group Breaks the Billion with Biggest Acquisition: Transition Systems Asia - Purchase of Singapore based VAD extends global footprint in APAC; Delivers combined revenues of >1bn€ LONDON, UK & SINGAPORE – January 12th 2016 – Exclusive Group, the global value-added services and technologies (VAST) group, today announced the acquisition of Singapore HQ’d cybersecurity and infrastructure VAD, Transition Systems.  The acquisition, the largest in its history, adds

Upcoming Events

Sep
4
Sun
Fortinet System I & II @ Exclusive Networks Training Center
Sep 4 @ 9:00 am – Sep 8 @ 5:00 pm
Fortinet System I & II @ Exclusive Networks Training Center | Riyadh | Riyadh Province | Saudi Arabia

FortiGate I

Course Description

In this 2-day class, you will learn how to use basic FortiGate UTM. In interactive labs, you will explore firewall policies, basic VPNs, virus detection, web filtering, application control, user authentication, and more.

These administrative fundamentals will provide you with a solid understanding of how to integrate basic network security.

Formats

Instructor-led classroom
Instructor-led online*
Self-paced online
* Private class only. Please contact your Fortinet Sales Representative.

Product Versions

FortiGate 5.2

Agenda

Introduction to Fortinet UTM
Logging and Monitoring
Firewall Policies
Firewall Authentication
SSL VPN
Basic IPsec VPN
Antivirus
Explicit Proxy
Web Filtering
Application Control
Objectives
After completing these courses, you will be able to:

Describe capabilities of FortiGate UTM
Neutralize threats / misuse: viruses, torrents, and inappropriate web sites
Control network access based on device type
Authenticate users via firewall policies
Offer an SSL VPN for secure access to your private network
Establish an IPsec VPN tunnel between two FortiGate appliances
Compare policy- vs. tunnel-based IPsec VPN
Apply port forwarding, source NAT, and destination NAT
Interpret log entries
Generate reports
Use the GUI and CLI for administration
Deploy the right operation mode
Deploy an explicit proxy with firewall policies, authentication, and caching
Simplify protocol handling with application control
Who Should Attend

Anyone who is responsible for day-to-day management of a FortiGate appliance.

You must master this course before attending FortiGate II.

Prerequisites

None except TCP/IP network experience and a basic understanding of firewall concepts.

System Requirements

If you take the online version of this class, you must have a computer with:

High-speed Internet connection
Up-to-date web browser
PDF viewer
Speakers / headphones
Either:
HTML 5 support or
Up-to-date Java runtime environment (JRE) with Java plugin enabled in your web browser
Wired Ethernet connection (not Wi-Fi) recommended. Firewalls including Windows Firewall or FortiClient must allow connections with the online labs.

Certification

This course is part of preparation for the NSE 4 certification exam.

FortiGate II

Course Description

In this 3-day class, you will learn advanced FortiGate networking and security. Topics include features commonly in complex or larger enterprise/MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, advanced IPsec VPN, IPS, SSO, data leak prevention, diagnostics, and fine-tuning performance.

Formats

Instructor-led classroom
Instructor-led online*
Self-paced online
* Private class only. Please contact your Fortinet Sales Representative.

Product Version

FortiGate 5.2

Agenda

Routing
Virtual Networking
Transparent Mode
High Availability
Advanced IPsec VPN
IPS
FSSO
Certificate Operations
DLP
Diagnostics
Hardware Acceleration
IPv6
Objectives

After completing these modules, you will be able to:

Deploy FortiGate devices as an HA cluster for fault-tolerance & high performance
Inspect traffic transparently, forwarding as a Layer 2 device
Manage FortiGate device’s route table
Route packets using policy-based and static routes for multi-path and load-balance deployments
Connect virtual domains (VDOMs) without packets leaving FortiGate
Implement a meshed / partially redundant VPN
Diagnose failed IKE exchanges
Fight hacking & denial of service (DoS)
Diagnose IPS engine performance issues
Offer Fortinet Single Sign On (FSSO) access to network services, integrated with Microsoft Active Directory
Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies
Understand encryption functions and certificates
Defend against data leaks by identifying files with sensitive data, and blocking them from leaving your private network
Diagnose and correct common problems
Optimize performance by configuring to leverage ASIC acceleration chips, such as CP or NPs, instead of only the CPU resources
Implement IPv6 and hybrid IPv4-IPv6 networks
Who Should Attend
Networking and security professionals involved in the design, implementation, and administration of a security infrastructure using FortiGate appliances.

This course assumes knowledge of basic yet FortiGate-specific fundamentals. As a result, if you know about firewalls, but are new to Fortinet, we do not recommend that you skip FortiGate I.

Prerequisites

Knowledge of OSI layers
Good knowledge of firewalling concepts in an IPv4 network
Familiarity with all topics presented in the prerequisite FortiGate I course

System Requirements

If you take the online version of this class, you must have a computer with:

High-speed Internet connection
Up-to-date web browser
PDF viewer
Speakers / headphones
Either:
HTML 5 support or
Up-to-date Java runtime environment (JRE) with Java plugin enabled in your web browser
Wired Ethernet connection (not Wi-Fi) recommended. Firewalls including Windows Firewall or FortiClient must allow connections with the online labs.

Certification

This is part of the courses that prepare you for the NSE 4 certification exam.

Sep
25
Sun
F5 Big-IP Application Security Manager (ASM) V12 @ Exclusive Networks Training Center
Sep 25 @ 9:00 am – Sep 28 @ 5:00 pm
F5 Big-IP Application Security Manager (ASM) V12 @ Exclusive Networks Training Center | Dubai | Dubai | United Arab Emirates

F5 Big-IP Application Security Manager (ASM) V12

The BIG-IP Application Security Manager course gives participants a functional understanding of how to deploy, tune, and operate BIG-IP Application Security Manager (ASM) to protect their web applications from HTTP-based attacks.

The course includes lecture, hands-on labs, and discussion about different ASM components for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day.

The BIG-IP Application Security Manager course provides participants with the expertise needed to detect, mitigate, and prevent HTTP-based attacks on web applications. The four-day lab intensive course starts at the simplest level for quickly configuring and implementing an application security policy and progresses through more complex configurations. The course includes detailed analysis and hands-on exercises for protecting web applications from brute force, web scraping, layer 7 DDoS, and other current attack vectors.

After course completion, participants will be able to differentiate between negative and positive security models, and configure the most appropriate protection for their own web applications

Topics covered in this course include:

Setting up the BIG-IP system
Traffic processing with BIG-IP Local Traffic Manager (LTM)
Web application concepts
Web application vulnerabilities
Security policy deployment
Attack signatures
Positive security building
Cookies and other headers
Reporting
User roles and administration
Advanced parameter handling
Application templates
Real Traffic Policy Builder
Vulnerability scanners
Login enforcement and session tracking
Anomaly detection
ASM and iRules
AJAX and JSON support
XML and web services support
Course length: 4 days

Audience

This course is intended for security and network administrators who will be responsible for the installation and day-to-day maintenance of the Application Security Manager.

Prerequisites

Students should be familiar with the F5 BIG-IP Product Suite and, in particular, how to setup and configure a BIG-IP LTM system, including virtual servers, pools, profiles, VLANs and self-IPs.

There are no required F5 prerequisites for this course, but completing one of the following before attending would be very helpful for students unfamiliar with BIG-IP:

Administering BIG-IP V11 instructor-led course
F5 Certified BIG-IP Administrator
In addition, the following web-based courses will be very helpful for any student with limited BIG-IP administration and configuration:

Getting Started with BIG-IP web-based training
Getting Started with BIG-IP Application Security Manager (ASM) web-based training

Students should understand:

TMOS administration
Network concepts and configuration
Programming concepts
Security concepts and terminology
Web application delivery

Fortinet System I & II @ Exclusive Networks Training Center
Sep 25 @ 9:00 am – Sep 29 @ 5:00 pm
Fortinet System I & II @ Exclusive Networks Training Center | Dubai | Dubai | United Arab Emirates

FortiGate I

Course Description

In this 2-day class, you will learn how to use basic FortiGate UTM. In interactive labs, you will explore firewall policies, basic VPNs, virus detection, web filtering, application control, user authentication, and more.

These administrative fundamentals will provide you with a solid understanding of how to integrate basic network security.

Formats

Instructor-led classroom
Instructor-led online*
Self-paced online
* Private class only. Please contact your Fortinet Sales Representative.

Product Versions

FortiGate 5.2

Agenda

Introduction to Fortinet UTM
Logging and Monitoring
Firewall Policies
Firewall Authentication
SSL VPN
Basic IPsec VPN
Antivirus
Explicit Proxy
Web Filtering
Application Control
Objectives
After completing these courses, you will be able to:

Describe capabilities of FortiGate UTM
Neutralize threats / misuse: viruses, torrents, and inappropriate web sites
Control network access based on device type
Authenticate users via firewall policies
Offer an SSL VPN for secure access to your private network
Establish an IPsec VPN tunnel between two FortiGate appliances
Compare policy- vs. tunnel-based IPsec VPN
Apply port forwarding, source NAT, and destination NAT
Interpret log entries
Generate reports
Use the GUI and CLI for administration
Deploy the right operation mode
Deploy an explicit proxy with firewall policies, authentication, and caching
Simplify protocol handling with application control
Who Should Attend

Anyone who is responsible for day-to-day management of a FortiGate appliance.

You must master this course before attending FortiGate II.

Prerequisites

None except TCP/IP network experience and a basic understanding of firewall concepts.

System Requirements

If you take the online version of this class, you must have a computer with:

High-speed Internet connection
Up-to-date web browser
PDF viewer
Speakers / headphones
Either:
HTML 5 support or
Up-to-date Java runtime environment (JRE) with Java plugin enabled in your web browser
Wired Ethernet connection (not Wi-Fi) recommended. Firewalls including Windows Firewall or FortiClient must allow connections with the online labs.

Certification

This course is part of preparation for the NSE 4 certification exam.

FortiGate II

Course Description

In this 3-day class, you will learn advanced FortiGate networking and security. Topics include features commonly in complex or larger enterprise/MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, advanced IPsec VPN, IPS, SSO, data leak prevention, diagnostics, and fine-tuning performance.

Formats

Instructor-led classroom
Instructor-led online*
Self-paced online
* Private class only. Please contact your Fortinet Sales Representative.

Product Version

FortiGate 5.2

Agenda

Routing
Virtual Networking
Transparent Mode
High Availability
Advanced IPsec VPN
IPS
FSSO
Certificate Operations
DLP
Diagnostics
Hardware Acceleration
IPv6
Objectives

After completing these modules, you will be able to:

Deploy FortiGate devices as an HA cluster for fault-tolerance & high performance
Inspect traffic transparently, forwarding as a Layer 2 device
Manage FortiGate device’s route table
Route packets using policy-based and static routes for multi-path and load-balance deployments
Connect virtual domains (VDOMs) without packets leaving FortiGate
Implement a meshed / partially redundant VPN
Diagnose failed IKE exchanges
Fight hacking & denial of service (DoS)
Diagnose IPS engine performance issues
Offer Fortinet Single Sign On (FSSO) access to network services, integrated with Microsoft Active Directory
Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies
Understand encryption functions and certificates
Defend against data leaks by identifying files with sensitive data, and blocking them from leaving your private network
Diagnose and correct common problems
Optimize performance by configuring to leverage ASIC acceleration chips, such as CP or NPs, instead of only the CPU resources
Implement IPv6 and hybrid IPv4-IPv6 networks
Who Should Attend
Networking and security professionals involved in the design, implementation, and administration of a security infrastructure using FortiGate appliances.

This course assumes knowledge of basic yet FortiGate-specific fundamentals. As a result, if you know about firewalls, but are new to Fortinet, we do not recommend that you skip FortiGate I.

Prerequisites

Knowledge of OSI layers
Good knowledge of firewalling concepts in an IPv4 network
Familiarity with all topics presented in the prerequisite FortiGate I course

System Requirements

If you take the online version of this class, you must have a computer with:

High-speed Internet connection
Up-to-date web browser
PDF viewer
Speakers / headphones
Either:
HTML 5 support or
Up-to-date Java runtime environment (JRE) with Java plugin enabled in your web browser
Wired Ethernet connection (not Wi-Fi) recommended. Firewalls including Windows Firewall or FortiClient must allow connections with the online labs.

Certification

This is part of the courses that prepare you for the NSE 4 certification exam.

Oct
9
Sun
F5 Administering Big-IP & Configuring Big-IP Local Traffic Manager (LTM) V12 @ Exclusive Networks Training Center
Oct 9 @ 9:00 am – Oct 13 @ 5:00 pm
F5 Administering Big-IP & Configuring Big-IP Local Traffic Manager (LTM) V12 @ Exclusive Networks Training Center | Dubai | Dubai | United Arab Emirates

F5 Administering Big-IP & Configuring Big-IP Local Traffic Manager (LTM) V12

This course gives a functional understanding of the BIG-IP system, as it is commonly deployed in an application delivery network. Also aimed at network administrators responsible for installation, and set up of BIG-IP LTM systems.
The Administering component introduces students to the BIG-IP system, its configuration objects, how it processes traffic, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations and discussions with emphasis on real work applications.
The Configuring component provides an in-depth understanding of advance features. This course covers installation, configuration, and management of BIG-IP LTM systems.

Students should understand:

  • Network concepts and configuration

Configuring BIG-IP LTM v11: Local Traffic Manager

This course gives network professionals a functional understanding of BIG-IP Local Traffic Manager (LTM) v11, introducing students to both commonly used and advanced LTM features. Incorporating lecture, extensive hands-on labs, and classroom discussion, the course helps students build the well-rounded skill set needed to manage BIG-IP LTM systems as part of a flexible and high performance application delivery network.

Topics covered in this course include:

  • Set up the BIG-IP LTM System
  • Load Balancing, including priority group activation and connection limits
  • Persistence concepts, including universal persistence and match across services
  • Monitors, including scripted monitors and managing multiple monitors
  • Profiles, including compression, caching, and F5 acceleration technologies
  • Deploying iApps
  • Highly Availability, including Sync-Failover and Sync-Only device groups, traffic groups, and N+1 concepts
  • Forwarding and network virtual servers, path load balancing, and auto last hop
  • Configuring local traffic policies
  • Implementing SNATs
  • IPv6 and route domains
  • Configuring iRules

By the end of this course, the student should be able to use both the graphical user interface and command line to configure and manage BIG-IP LTM systems in an application delivery network. In addition, students should be able to monitor the BIG-IP system to achieve operational efficiency, and establish and maintain high availability infrastructure for critical business applications.

Course length: 3 days

Audience

This course is intended for network operators, network administrators, network engineers, network architects, security administrators, and security architects responsible for installation, setup, configuration, and administration of the BIG-IP LTM system.

Prerequisites

Students should be familiar with the BIG-IP LTM system and, in particular, how to setup and configure a BIG-IP LTM system, including virtual servers, pools, profiles, VLANs and self-IPs.

By the end of this course, the students should be able to setup an initial configuration and build many common and advanced configurations of BIG-IP LTM systems using either the Graphical User Interface or Command line utilities. In addition, the students should be able to monitor and manage common tasks concerning traffic processed by a BIG-IP LTM system.

Oct
17
Mon
F5 Big-IP Application Security Manager (ASM) V12 @ Exclusive Networks Training Center
Oct 17 @ 9:00 am – Oct 20 @ 5:00 pm
F5 Big-IP Application Security Manager (ASM) V12 @ Exclusive Networks Training Center | Dubai | Dubai | United Arab Emirates

F5 Big-IP Application Security Manager (ASM) V12

The BIG-IP Application Security Manager course gives participants a functional understanding of how to deploy, tune, and operate BIG-IP Application Security Manager (ASM) to protect their web applications from HTTP-based attacks.

The course includes lecture, hands-on labs, and discussion about different ASM components for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day.

The BIG-IP Application Security Manager course provides participants with the expertise needed to detect, mitigate, and prevent HTTP-based attacks on web applications. The four-day lab intensive course starts at the simplest level for quickly configuring and implementing an application security policy and progresses through more complex configurations. The course includes detailed analysis and hands-on exercises for protecting web applications from brute force, web scraping, layer 7 DDoS, and other current attack vectors.

After course completion, participants will be able to differentiate between negative and positive security models, and configure the most appropriate protection for their own web applications

Topics covered in this course include:

Setting up the BIG-IP system
Traffic processing with BIG-IP Local Traffic Manager (LTM)
Web application concepts
Web application vulnerabilities
Security policy deployment
Attack signatures
Positive security building
Cookies and other headers
Reporting
User roles and administration
Advanced parameter handling
Application templates
Real Traffic Policy Builder
Vulnerability scanners
Login enforcement and session tracking
Anomaly detection
ASM and iRules
AJAX and JSON support
XML and web services support
Course length: 4 days

Audience

This course is intended for security and network administrators who will be responsible for the installation and day-to-day maintenance of the Application Security Manager.

Prerequisites

Students should be familiar with the F5 BIG-IP Product Suite and, in particular, how to setup and configure a BIG-IP LTM system, including virtual servers, pools, profiles, VLANs and self-IPs.

There are no required F5 prerequisites for this course, but completing one of the following before attending would be very helpful for students unfamiliar with BIG-IP:

Administering BIG-IP V11 instructor-led course
F5 Certified BIG-IP Administrator
In addition, the following web-based courses will be very helpful for any student with limited BIG-IP administration and configuration:

Getting Started with BIG-IP web-based training
Getting Started with BIG-IP Application Security Manager (ASM) web-based training

Students should understand:

TMOS administration
Network concepts and configuration
Programming concepts
Security concepts and terminology
Web application delivery

Home
Menu Title
×