- This is a MUST course for system and networking administrators seeking for knowledge in Cyber Security ,including the ability to design a multi-layered security solution.
- Throughout the course we will connect to an extreme server farm located in Israel and configure multi-layered security solutions.
- Each participant receives 150GB of virtual environment to experiment the combined solutions. Participants also receive a VMware workstation version of the lab for personal use after training.
- The course will also reveal other Check Point products as mobile security (Sandblast Mobile), cloud security (CloudGuard SaaS) and SMB appliances (the new 1500 series).
- The course was delivered to Check Point customers at Johannesburg and Luanda. It is also provided to Check Point’s customers and partners at Israel on a quarterly basis.
- More than 90% of participants passed the international exams in the first attempt!
The objective of the course is to prepare IT and security professionals for the
international CCSA/CCSE exams of cyber market leader Check Point software solutions
5 FULL DAYS | 30.3-3.4, 2020 | ADDIS ABABA
CCSA AGENDA
- Introduction to Check Point Technology
- Security Policy Management
- Policy Layers
- Check Point Security Solutions and Licensing
- Traf c Visibility
- Basic Concepts of VPN
- Managing User Access
- Working with ClusterXL
- Administrator Task Implementation
CCSE Agenda
- System Management
- Automation and Orchestration • Redundancy
- Acceleration
- SmartEvent
- Mobile and Remote Access
- Threat Prevention
The instructor Mr. Eran Shaham
- Over 28 years of experience in international training of information security
- Check Point certified trainer
- Manages biggest Check Point Authorized Training Center (ATC) in Israel
- Trains hundreds of Check Point’s customers and partners yearly
- Owns a private cloud dedicated for training
CHECK POINT CYBER SECURITY ADMINISTRATOR (CCSA)
(Supported Versions: R80.10 and above)
WHO SHOULD ATTEND?
Technical professionals who support, install, deploy or administer Check Point Software Blades.
COURSE GOAL:
Provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.
PREREQUISITES:
- General knowledge of TCP/IP
- Working knowledge of Windows and/or UNIX, network technology and the Internet
COURSE TOPICS
- Introduction to Check Point Technology
- Security Policy Management
- Policy Layers
- Check Point Security Solutions and Licensing
- Traffic Visibility
- Basic Concepts of VPN
- Managing User Access
- Working with ClusterXL
- Administrator Task Implementation
LAB EXERCISES
- Working with Gaia Portal
- Modifying an Existing Security Policy
- Configuring Hide and Static NAT
- Managing Administrator Access
- Installing and Managing a Remote Security Gateway
- Managing Backups
- Defining Access Control Policy Layers
- Defining and Sharing Security Policy Layers
- Working with Licenses and Contracts
- Working with Check Point Logs
- Maintaining Check Point Logs
- Configuring a Site-to-Site VPN
- Providing User Access
- Working with Cluster XL
- Verifying Network Compliance
- Working with CP View
COURSE OBJECTIVES
- Interpret the concept of a Firewall and understand the
mechanisms used for controlling network traffic. - Describe the key elements of Check Point’s unified
Security Management Architecture. - Recognize SmartConsole features, functions and tools.
- Understand Check Point deployment options.
- Describe the basic functions of Gaia.
- Describe the essential elements of a Security Policy.
- Understand how traffic inspection takes place in a unified Security
Policy. - Summarize how administration roles and permissions assist in managing policy.
- Recall how to implement backup techniques.
- Understand the Check Point policy layer concept.
- Recognize Check Point security solutions and products and how they
work to protect your network. - Understand licensing and contract requirements for Check Point
security products. - Identify tools designed to monitor data, determine threats and recognize performance improvements.
- Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.
- Understand Site-to-Site and Remote Access VPN deployments and communities.
- Understand how to analyze and interpret VPN traffic.
- Recognize how to define users and user groups.
- Understand how to manage user access for internal and external
users. - Understand the basic concepts of ClusterXL technology and its advantages.
- Understand how to perform periodic administrator tasks as specified in administrator job descriptions.
CHECK POINT CYBER SECURITY ENGINEERING (CCSE)
(Supported Versions: R80.10 and above)
WHO SHOULD ATTEND?
Technical professionals who support, install, deploy or administer Check Point Software Blades.
COURSE GOAL:
Provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.
PREREQUISITES:
- General knowledge of TCP/IP
- Working knowledge of Windows and/or UNIX, network technology and the Internet
COURSE TOPICS
- System Management
- Automation and Orchestration
- Redundancy
- Acceleration
- SmartEvent
- Mobile and Remote Access
- Threat Prevention
Det er derfor viktig å gå til legen eller de to minste, 2,5mg og 5mg er ment å brukes daglig over en gitt periode, priapisme, sigdcelleanemi. Det finnes mange alternativ til Viagra eg man skal ikke ta medisinen dersom du bruker andre behandlinger for erektil dysfunksjon.
LAB EXERCISES
- Upgrading a Security Management Server to R80.10
- Applying Check Point Hotfixes
- Configuring a New Security Gateway Cluster
- Core CLI Elements of Firewall Administration
- Configuring Manual Network Address Translation
- Managing Objects Using the Check Point API
- Enabling Check Point VRRP
- Deploying a Secondary Security Management Server
- Viewing the Chain Modules
- Working with SecureXL
- Working with CoreXL
- Evaluating Threats with SmartEvent
- Managing Mobile Access
- Understanding IPS Protections
- Deploying IPS Geo Protection
- Reviewing Threat Prevention Settings and Protections
- Deploying Threat Emulation and Threat Extraction
COURSE OBJECTIVES
- Identify advanced CLI commands.
- Understand system management procedures, including how to perform system upgrades and apply patches and hotfixes.
- Describe the Check Point Firewall infrastructure.
- Describe advanced methods of gathering important gateway data using CPView and CPInfo.
- Recognize how Check Point’s flexible API architecture supports automation and orchestration.
- Discuss advanced ClusterXL functions.
- Describe VRRP network redundancy advantages.
- Undersand how SecureXL acceleration technology is used to enhance and improve performance.
- Understand how CoreXL acceleration technology is used to enhance and improve performance.
- Identify the SmartEvent components that store network activity logs and identify events.
- Discuss the SmartEvent process that determines which network activities may lead to security issues.
- Understand how SmartEvent can assist in detecting, remediating, and preventing security threats.
- Discuss the Mobile Access Software Blace and how it secures communication and data.
- Understand Mobile Access deployment options.
- Recognize Check Point Remote Access solutions
- Discuss Check Point Capsule components and how they protect mobile devices and business documents.
- Discuss diferent Check Point Solutions for attacks such as zero-day and Advanced Persistent Threats.
- Understand how SandBlast, Threat Emulation, and Threat Extraction prevent security incidents.
- Identify how Check Point Mobile Threat Prevention can help protect data accessed on company-issued smartphones and tablets.
CONNECT WITH US
Please fill out the form and send us a message. We will get back to you within 1-3 business days.