CheckPoint Training

CheckPoint Training is well-structured to help attendees learn how to configure and manage a Check Point deployment, and prepares Learners for the CCSA certification exam.

CheckPoint Training Curriculum

Checkpoint Certified Security Administrator
Introduction To Checkpoint Technologies

What’s new in checkpoint R77.10
Checkpoint’s Architecture
Implementing 3 tier Architecture of checkpoint
Deployment Platforms
Checkpoint supported platforms
Installing Checkpoint on Windows o/s
Installing Checkpoint on Linux o/s
Installing Checkpoint on SPLAT
Installing Checkpoint on GAiA
Configuring checkpoint in standard setup
Configuring checkpoint in distributed setup
Introduction To Security Policy

Understanding Checkpoint Licensing
VerifySIC establishment between the Security Management Server and the Gateway using Smart Dashboard
Creating a basic Rulebase
Implicit rules vs Explicit rules
Configuring hide NAT
Configuring Static NAT
User Management & Authentication

Configure user & group accounts in checkpoint
Configure policies for authentication
Local Authentication Methods
Configuring user authentication
Configuring Session authentication
Configuring Client Authentication
External Authentication

Creating LDAP & TACACS+ objects
Integrating active directory server with checkpoint gateway
Configuring Tacacs+ server
Integrating Tacacs+ server with checkpoint gateway
Identity Awareness

Introduction to Identity Awareness
Configuring Identity Awareness
Using Identity awareness to provide access to network resource
Checkpoint VPN Introduction

Understanding VPN terminology
Configuring Remote access vpn
Implementing site-to-site vpn with head office & Branch office
Monitoring

Using smartview tracker for Analyzing logs
Using smartview Monitor for monitoring traffic
Using queries in smartview tracker
Filtering logs in smartview tracker

Checkpoint Security Expert
Advance Firewall

Debugging firewall Modules
Upgrade & troubleshoot Management server
Performing Backup of Management server
Backup using snapshot
Backup using cpbackup
Backup using upgrade tools
Command Line Administration

Understanding standard mode & Expert mode shells
Running Checkpoint commands
Accessing Firewall Directory
UTM Features

Configuring Antivirus blade in checkpoint gateway
Verifying Antivirus modules
Implementing content filtering
Configuring cvp & ufp policies
Configuring URL filtering
Testing URL filtering
Advance UTM Features

Java & ActiveX based attacks
Implementing Java & activeX blocking
Configuring Application control
Using smart event intro for analyzing application traffic
IDS/IPS

Configuring IPS blade
Updating IPS signatures
Configuring IPS policies
Customizing IPS profiles
Implementing location based restrictions
Verifying IPS
QOS

Understanding Checkpoint QOS architecture
Enabling QOS blade
Bandwidth Monitoring using QOS
Segregate Bandwidth to different networks
Writing QOS policies in rulebase
CLUSTERING

Building clusterXL for loadbalancing
Adding gateways into cluster
Verify Load balancing
Building clusterXL for High Availabilty
Deploying HA on an Enterprise network
Verifying HA using smartview monitor
Management sever Clustering
Management server recovery.

  • PRIVATE
  • 10 Days
  • 0 Units
  • 0 Hrs

Select Your Currency

WOOCS 1.1.8
Drop Us A Query
[contact-form-7 id="5639" title="Drop Us A Query"]
© 2016, ALL RIGHTS RESERVED.
Create an Account