What You Will Learn!

  • Install R81.X management and a security gateway in a distributed environment
  • Configure objects, rules, and settings to define a security policy.
  • Work with multiple concurrent administrators and define permission profiles
  • Configure Check Point Identity Awareness
  • Configure Check Point NAT
  • Configure Check Point VPN
  • Perform periodic administrator tasks as specified in administrator job descriptions
  • Be prepared to defend against network threats
  • Evaluate existing security policies and optimize the rule base
  • Manage user access to corporate LANs
  • Configure Check Point IPS and URL filtering

Description

The following course Check Point Certified Security Administrator (CCSA) Course includes lectures on study concepts and Features work and the walk-through of the configuration in the lab/production environment. From the very beginning following step-by-step approach you will be able to grasp advanced concepts and step on the next level. The course is structured in an easy to follow manner starting from the very basic to advanced topics. The topics that are covered are: Installing Check Point in a lab environment, understanding general principles of Firewalling.

You will Learn :

how to perform periodic administrator tasks, Describe the basic functions of the Gaia operating system, Recognize SmartConsole features, functions, and tools, Understand how SmartConsole is used by administrators to give user access, Learn how Check Point security solutions and products work and how they protect networks, Understand licensing and contract requirements for Check Point security products, Describe the essential elements of a Security Policy, Understand the Check Point policy layer concept, Understand how to enable the Application Control and URL Filtering software.

Blades to block access to various applications, Describe how to configure manual and automatic NAT, Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements, Describe different Check Point Threat Prevention solutions for network attacks, Articulate how the Intrusion Prevention System is configured, maintained and tuned, Understand the Infinity Threat Prevention system.

I have applied the streamlined, step-by-step method to excel as a Check Point professional in less time than you ever thought possible. I'm going to walk you through the main challenges, so you can step on the next level.

Introductory product information is provided in video guided instruction and labs, and the more advanced, technical training is instructor-led classroom based.


Who Should Attend!

  • System Administrators
  • Information Security Analysts
  • Support Analysts
  • Network Engineers
  • Firewall Enthusiasts
  • Security Engineers

TAKE THIS COURSE

Tags

Subscribers

0

Lectures

34

TAKE THIS COURSE