
Check Point Certified Security Administrator
The three-day course covers everything you
need to start, configure and manage the daily operations of Check Point
Security Gateway and Management Software Blades R81.10 systems on the GAiA
operating system.
This module presents Check Point products and what's new in version R81.
In this module, you will discover the presentation of the Gaia system, the elements of the three-tier architecture, the modular architecture of the “Software Blades” and the Check Point Infinity. You will also learn, in this module, the architecture in distributed mode and in standalone mode, the management server and the SIC protocol.
This module covers getting started with SmartConsole R81, security policy and rule management. It also covers Unified Policies, Packet Inspection and Inline Policies (sub-rules).
This module focuses on IPv4 and IPv6 address translation rules, One To One NAT and Many To One NAT/PAT. The module also covers Manual NAT and ARP and routing issues.
In this module, you will learn about the log management policy and how to track connections with Logs & Monitor (formerly SmartView Tracker). The module will also cover the SmartView Monitor, features and alert thresholds.
This module introduces you to the license structure, license management in SmartUpdate and SmartConsole, license types, and contract and service management. It also introduces license status monitoring, Policy Package definition, Policy Package management, and Layer definition and types. The module also covers inspecting packets in an Ordered Layer and Policy Layers Sharing.
This module focuses on "Permission Profiles", how to limit the scope of action of administrators, management of concurrent users and management of sessions.
In this module, you will learn about creating rules, managing certificates, and Server Name Indications (SNI).
In this module, you will discover the limits of a classic firewall by IP and by port, access control, "AppWiki", URL Filtering and “User Check”
In this module the following topics will be covered: need to retrieve user identity, Identity Awareness R81 authentication methods, “Access Role” type objects, Threat Prevention policy and its “Software Blades”, rule management, security profiles, autonomous Threat Prevention.
Similar Courses
Comments
Check Point Certified Security Administrator