Course List

  • Home -
  • Course List

Checkpoint CCSA r80.10

Provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.

course

Learn How To

  • Install R80 management and a security gateway in a distributed environment
  • Configure objects, rules, and settings to define a security policy
  • Work with multiple concurrent administrators and define permission profiles
  • Configure a Virtual Private Network and work with Check Point clustering
  • Perform periodic administrator tasks as specified in administrator job descriptions

Prerequisites

  • Basic knowledge of networking
  • 6 months to 1 year of experience with Check Point products recommended

How You Will Benefit

  • Be prepared to defend against network threats
  • Evaluate existing security policies and optimize the rule base
  • Manage user access to corporate LANs
  • Monitor suspicious network activities and analyze attacks
  • Troubleshoot network connections
  • Implement Check Point backup techniques

What’s New in R80?

With the barrage of connected devices, new technologies like cloud computing, and a continuous wave of sophisticated threats, managing security is becoming increasingly complex - security needs to adjust to new operational realities. The key to managing this complexity is through security consolidation - bringing all security protections and functions under one umbrella. With R80, security consolidation is fully realized.

  • A single platform manages the entire IT infrastructure - from the data center to private/public cloud deployments - ensuring security consistency across the organization.
  • Policy management is unified so you can create and monitor these policies harmoniously, and efficiently.
  • Routine tasks can be automated and delegated, so security teams can focus on key security tasks, as repetitive tasks are embedded into day-to-day operations.
  • Security is aligned to IT processes and technologies for adaptive and effective security orchestration.
  • Threat management is integrated, speeding incidence response. Security teams have full visibility into security status and can react faster to prevent the next attack.

CCSA илүү дэлгэрэнгүй харна уу.

 

COURSE TOPICS 
• Introduction to Check Point Technology
• Security Policy Management
• Policy Layers
• Check Point Security Solutions and Licensing
• Traffic Visibility
• Basic Concepts of VPN
• Managing User Access
• Working with ClusterXL
• Administrator Task Implementation

LAB EXERCISES
• Working with Gaia Portal
• Modifying an Existing Security Policy
• Configuring Hide and Static NAT
• Managing Administrator Access
• Installing and Managing a Remote Security Gateway
• Managing Backups
• Defining Access Control Policy Layers
• Defining and Sharing Security Policy Layers
• Working with Licenses and Contracts
• Working with Check Point Logs
• Maintaining Check Point Logs
• Configuring a Site-to-Site VPN
• Providing User Access
• Working with Cluster XL
• Verifying Network Comp