Check Point Certified Security Administrator

Check Point Certified Security Administrator


The three-day course covers everything you need to start, configure and manage the daily operations of Check Point Security Gateway and Management Software Blades R81.10 systems on the GAiA operating system.

This module presents Check Point products and what's new in version R81.
In this module, you will discover the presentation of the Gaia system, the elements of the three-tier architecture, the modular architecture of the “Software Blades” and the Check Point Infinity. You will also learn, in this module, the architecture in distributed mode and in standalone mode, the management server and the SIC protocol.
This module covers getting started with SmartConsole R81, security policy and rule management. It also covers Unified Policies, Packet Inspection and Inline Policies (sub-rules).
This module focuses on IPv4 and IPv6 address translation rules, One To One NAT and Many To One NAT/PAT. The module also covers Manual NAT and ARP and routing issues.
In this module, you will learn about the log management policy and how to track connections with Logs & Monitor (formerly SmartView Tracker). The module will also cover the SmartView Monitor, features and alert thresholds.
This module introduces you to the license structure, license management in SmartUpdate and SmartConsole, license types, and contract and service management. It also introduces license status monitoring, Policy Package definition, Policy Package management, and Layer definition and types. The module also covers inspecting packets in an Ordered Layer and Policy Layers Sharing.
This module focuses on "Permission Profiles", how to limit the scope of action of administrators, management of concurrent users and management of sessions.
In this module, you will learn about creating rules, managing certificates, and Server Name Indications (SNI).
In this module, you will discover the limits of a classic firewall by IP and by port, access control, "AppWiki", URL Filtering and “User Check”
In this module the following topics will be covered: need to retrieve user identity, Identity Awareness R81 authentication methods, “Access Role” type objects, Threat Prevention policy and its “Software Blades”, rule management, security profiles, autonomous Threat Prevention.
0
Comments
Check Point Certified Security Administrator
Check Point Certified Security Administrator
Check Point Certified Security Administrator
  • Modules 13
  • Skill None
  • Language
  • Certificate Yes

Similar Courses

These courses can help you

Subscribe to the newsletter

Get all the latest news

Shape Thumb
Shape Thumb
Shape Thumb