Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/proterei/public_html/admin/lib/config.php on line 9
PROTERE Technologies
+91 93306 96060
      +91 33 65406080
for any help: info@protere.in

Description:

Check Point Security Administrator course covers all the objectives of CCSA ( 156-215.77) and it will help you to Master the skills to deploy and manage Check Point 3D Security systems. This 40 Hrs course covers everything you need to start-up, configure and manage daily operations of Check Point 3D Security systems.Along with full preparation for the exam.

Learn how to:

  • Secure communications across the internet
  • Defend against network threats
  • Configure security policies
  • Protect email and messaging content
  • Manage user access to corporate LANs

Prerequisites:

  • Basic knowledge of networking
  • Windows Server and/or UNIX skills
  • Internet and TCP/IP experience

How You Will Benefit:

  • Perform seamless product upgrades
  • Back-up and restore networks
  • Monitor suspicious network activities and analyze attacks
  • Troubleshoot network connections
  • Implement Identity Awareness for more granular access levels
  • Configure permanent tunnels for remote access to corporate resources

Objectives:

Domain 1—Introduction to Check Point Technology

  • Describe Check Point’s unified approach to network management and the key elements of this architecture
  • Design a distributed environment using the network detailed in the course topology
  • Install the Security Gateway version R75 in a distributed environment using the network detailed in the course topology

Domain 2—Deployment Platforms

  • Given network specifications, perform a backup and restore the current Gateway installation from the command line
  • Identify critical files needed to purge or backup, import and export users and groups and add or delete administrators from the command line
  • Deploy Gateways using sysconfig and cpconfig from the Gateway command line

Domain 3—Introduction to the Security Policy

  • Given the network topology, create and configure network, host and gateway objects.
  • Verify SIC establishment between the Security Manage-ment Server and the Gateway using SmartDashboard.
  • Create a basic Rule Base in SmartDashboard that includes permissions for administrative users, external services, and LAN outbound use.
  • Configure NAT rules on Web and Gateway servers.
  • Evaluate existing policies and optimize the rules based on current corporate requirements.
  • Maintain the Security Management Server with scheduled backups and policy versions to ensure seamless upgrades with minimal downtime.

Domain 4—Monitoring Traffic and Connections

  • Use Queries in SmartView Tracker to monitor IPS and common network traffic and troubleshoot events using packet data
  • Using packet data on a given corporate network, generate reports, troubleshoot system and security issues, and ensure network functionality
  • Using SmartView Monitor, configure alerts and traffic counters, view a Gateway’s status, monitor suspicious activity rules, analyze tunnel activity and monitor remote user access based on corporate requirements.

Chapter 5—Using SmartUpdate

  • Monitor remote Gateways using SmartUpdate to evaluate the need for upgrades, new installations, and license modifications
  • Use SmartUpdate to apply upgrade packages to single or multiple VPN-1 Gateways
  • Upgrade and attach product licenses using SmartUpdate

Chapter 6—User Management and Authentication

  • Centrally manage users to ensure only authenticated users securely access the corporate network either locally or remotely
  • Manage users to access the corporate LAN by using external databases

Chapter 7—Identity Awareness

  • Use Identity Awareness to provide granular level access to network resources
  • Acquire user information used by the Security Gateway to control access
  • Define Access Roles for use in an Identity Awareness rule
  • Implement Identity Awareness in the Firewall Rule Base

Chapter 8—Introduction to Check Point VPNs

  • Configure a pre-shared secret site-to-site VPN with partner sites
  • Configure permanent tunnels for remote access to corporate resources
  • Configure VPN tunnel sharing, given the difference between host-based, subunit-based and gateway-based tunnels

Trainer Details:

Instructor: Senior Security Consultant and trainer.