Course List

  • Home -
  • Course List

Checkpoint CCSE r80.10

Provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.

course

Advanced three-day course teaches how to build, modify, deploy and troubleshoot Check Point Security Systems on the GAiA operating system. Hands-on lab exercises teach how to debug firewall processes, optimize VPN performance and upgrade Management Servers.

Learn How To

  • Backup your Security Gateway and Management Server
  • Build, test and troubleshoot a clustered Security Gateway
  • Upgrade and troubleshoot a Management Server
  • Configure and maintain security acceletration solutions
  • Manage, test and optimize corporate VPN tunnels

Prerequisites

  • Security Administration Course or CCSA certification (R70 or later)
  • Windows Server, UNIX and networking skills and TCP/IP experience
  • Certificate management and system adminstration

How You Will Benefit

  • Build, test and troublehoot numerous deployment scenarios
  • Apply insider tips troubleshooting Check Point Security Systems
  • Practice advanced upgrading techniques
  • Migrate to a clustering security solution
  • Create events for compliance reporting
  • Manage internal and external access to corporate resources

CCSE талаар илүү дэлгэрэнгүй харна уу.

COURSE TOPICS
• System Management
• Automation and Orchestration
• Redundancy
• Acceleration
• SmartEvent
• Mobile and Remote Access
• Threat Prevention


LAB EXERCISES
• Upgrading a Security Management Server to R80.10
• Applying Check Point Hotfixes
• Configuring a New Security Gateway Cluster
• Core CLI Elements of Firewall Administration
• Configuring Manual Network Address Translation
• Managing Objects Using the Check Point API
• Enabling Check Point VRRP
• Deploying a Secondary Security Management Server
• Viewing the Chain Modules
• Working with SecureXL
• Working with CoreXL
• Evaluating Threats with SmartEvent
• Managing Mobile Access
• Understanding IPS Protections
• Deploying IPS Geo Protection
• Reviewing Threat Prevention Settings and Protections
• Deploying Threat Emulation and Threat Extraction