Provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.
Learn How To
Prerequisites
How You Will Benefit
What’s New in R80?
With the barrage of connected devices, new technologies like cloud computing, and a continuous wave of sophisticated threats, managing security is becoming increasingly complex - security needs to adjust to new operational realities. The key to managing this complexity is through security consolidation - bringing all security protections and functions under one umbrella. With R80, security consolidation is fully realized.
CCSA илүү дэлгэрэнгүй харна уу.
COURSE TOPICS
• Introduction to Check Point Technology
• Security Policy Management
• Policy Layers
• Check Point Security Solutions and Licensing
• Traffic Visibility
• Basic Concepts of VPN
• Managing User Access
• Working with ClusterXL
• Administrator Task Implementation
LAB EXERCISES
• Working with Gaia Portal
• Modifying an Existing Security Policy
• Configuring Hide and Static NAT
• Managing Administrator Access
• Installing and Managing a Remote Security Gateway
• Managing Backups
• Defining Access Control Policy Layers
• Defining and Sharing Security Policy Layers
• Working with Licenses and Contracts
• Working with Check Point Logs
• Maintaining Check Point Logs
• Configuring a Site-to-Site VPN
• Providing User Access
• Working with Cluster XL
• Verifying Network Comp
Comments