The objective of the course is to prepare IT and security professionals for the
international CCSA/CCSE exams of cyber market leader Check Point software solutions

5 FULL DAYS | 30.3-3.4, 2020 | ADDIS ABABA

  • This is a MUST course for system and networking administrators seeking for knowledge in Cyber Security ,including the ability to design a multi-layered security solution.
  • Throughout the course we will connect to an extreme server farm located in Israel and configure multi-layered security solutions.
  • Each participant receives 150GB of virtual environment to experiment the combined solutions. Participants also receive a VMware workstation version of the lab for personal use after training.
  • The course will also reveal other Check Point products as mobile security (Sandblast Mobile), cloud security (CloudGuard SaaS) and SMB appliances (the new 1500 series).
  • The course was delivered to Check Point customers at Johannesburg and Luanda. It is also provided to Check Point’s customers and partners at Israel on a quarterly basis.
  • More than 90% of participants passed the international exams in the first attempt!

CCSA AGENDA

  • Introduction to Check Point Technology
  • Security Policy Management
  • Policy Layers
  • Check Point Security Solutions and Licensing
  • Traf c Visibility
  • Basic Concepts of VPN
  • Managing User Access
  • Working with ClusterXL
  • Administrator Task Implementation

CCSE Agenda

  • System Management
  • Automation and Orchestration • Redundancy
  • Acceleration
  • SmartEvent
  • Mobile and Remote Access
  • Threat Prevention

The instructor Mr. Eran Shaham

  • Over 28 years of experience in international training of information security
  • Check Point certified trainer
  • Manages biggest Check Point Authorized Training Center (ATC) in Israel
  • Trains hundreds of Check Point’s customers and partners yearly
  • Owns a private cloud dedicated for training

CHECK POINT CYBER SECURITY ADMINISTRATOR (CCSA)

(Supported Versions: R80.10 and above)

WHO SHOULD ATTEND?

Technical professionals who support, install, deploy or administer Check Point Software Blades.

COURSE GOAL:

Provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.

PREREQUISITES:

  • General knowledge of TCP/IP
  • Working knowledge of Windows and/or UNIX, network technology and the Internet

COURSE TOPICS

  • Introduction to Check Point Technology
  • Security Policy Management
  • Policy Layers
  • Check Point Security Solutions and Licensing
  • Traffic Visibility
  • Basic Concepts of VPN
  • Managing User Access
  • Working with ClusterXL
  • Administrator Task Implementation

LAB EXERCISES

  • Working with Gaia Portal
  • Modifying an Existing Security Policy
  • Configuring Hide and Static NAT
  • Managing Administrator Access
  • Installing and Managing a Remote Security Gateway
  • Managing Backups
  • Defining Access Control Policy Layers
  • Defining and Sharing Security Policy Layers
  • Working with Licenses and Contracts
  • Working with Check Point Logs
  • Maintaining Check Point Logs
  • Configuring a Site-to-Site VPN
  • Providing User Access
  • Working with Cluster XL
  • Verifying Network Compliance
  • Working with CP View

COURSE OBJECTIVES

  • Interpret the concept of a Firewall and understand the
    mechanisms used for controlling network traffic.
  • Describe the key elements of Check Point’s unified
    Security Management Architecture.
  • Recognize SmartConsole features, functions and tools.
  • Understand Check Point deployment options.
  • Describe the basic functions of Gaia.
  • Describe the essential elements of a Security Policy.
  • Understand how traffic inspection takes place in a unified Security
    Policy.
  • Summarize how administration roles and permissions assist in managing policy.
  • Recall how to implement backup techniques.
  • Understand the Check Point policy layer concept.
  • Recognize Check Point security solutions and products and how they
    work to protect your network.
  • Understand licensing and contract requirements for Check Point
    security products.
  • Identify tools designed to monitor data, determine threats and recognize performance improvements.
  • Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.
  • Understand Site-to-Site and Remote Access VPN deployments and communities.
  • Understand how to analyze and interpret VPN traffic.
  • Recognize how to define users and user groups.
  • Understand how to manage user access for internal and external
    users.
  • Understand the basic concepts of ClusterXL technology and its advantages.
  • Understand how to perform periodic administrator tasks as specified in administrator job descriptions.

CHECK POINT CYBER SECURITY ENGINEERING (CCSE)

(Supported Versions: R80.10 and above)

WHO SHOULD ATTEND?

Technical professionals who support, install, deploy or administer Check Point Software Blades.

COURSE GOAL:

Provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.

PREREQUISITES:

  • General knowledge of TCP/IP
  • Working knowledge of Windows and/or UNIX, network technology and the Internet

COURSE TOPICS

  • System Management
  • Automation and Orchestration
  • Redundancy
  • Acceleration
  • SmartEvent
  • Mobile and Remote Access
  • Threat Prevention

Det er derfor viktig å gå til legen eller de to minste, 2,5mg og 5mg er ment å brukes daglig over en gitt periode, priapisme, sigdcelleanemi. Det finnes mange alternativ til Viagra eg man skal ikke ta medisinen dersom du bruker andre behandlinger for erektil dysfunksjon.

LAB EXERCISES

  • Upgrading a Security Management Server to R80.10
  • Applying Check Point Hotfixes
  • Configuring a New Security Gateway Cluster
  • Core CLI Elements of Firewall Administration
  • Configuring Manual Network Address Translation
  • Managing Objects Using the Check Point API
  • Enabling Check Point VRRP
  • Deploying a Secondary Security Management Server
  • Viewing the Chain Modules
  • Working with SecureXL
  • Working with CoreXL
  • Evaluating Threats with SmartEvent
  • Managing Mobile Access
  • Understanding IPS Protections
  • Deploying IPS Geo Protection
  • Reviewing Threat Prevention Settings and Protections
  • Deploying Threat Emulation and Threat Extraction

COURSE OBJECTIVES

  • Identify advanced CLI commands.
  • Understand system management procedures, including how to perform system upgrades and apply patches and hotfixes.
  • Describe the Check Point Firewall infrastructure.
  • Describe advanced methods of gathering important gateway data using CPView and CPInfo.
  • Recognize how Check Point’s flexible API architecture supports automation and orchestration.
  • Discuss advanced ClusterXL functions.
  • Describe VRRP network redundancy advantages.
  • Undersand how SecureXL acceleration technology is used to enhance and improve performance.
  • Understand how CoreXL acceleration technology is used to enhance and improve performance.
  • Identify the SmartEvent components that store network activity logs and identify events.
  • Discuss the SmartEvent process that determines which network activities may lead to security issues.
  • Understand how SmartEvent can assist in detecting, remediating, and preventing security threats.
  • Discuss the Mobile Access Software Blace and how it secures communication and data.
  • Understand Mobile Access deployment options.
  • Recognize Check Point Remote Access solutions
  • Discuss Check Point Capsule components and how they protect mobile devices and business documents.
  • Discuss diferent Check Point Solutions for attacks such as zero-day and Advanced Persistent Threats.
  • Understand how SandBlast, Threat Emulation, and Threat Extraction prevent security incidents.
  • Identify how Check Point Mobile Threat Prevention can help protect data accessed on company-issued smartphones and tablets.

CONNECT WITH US

Please fill out the form and send us a message. We will get back to you within 1-3 business days.

    AM