Check Point Security Administrator R80 (CCSA)

Description

Check Point Security Administration R80 provides an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.

Contenu du cours

  • Introduction to Check Point Technology

  • Security Policy Management

  • Policy Layers

  • Check Point Security Solutions and Licensing

  • Traffic Visibility

  • Basic Concepts of VPN

  • Managing User Access

  • Working with ClusterXL

  • Administrator Task Implementation

 
Lab Exercises

  • Defining roles and users in Gaia Portal 

  • Installing and navigating SmartConsole 

  • Configuring objects, rules, and settings to define a Security Policy 

  • Publishing database changes 

  • Installing and managing a remote Security Gateway 

  • Performing Hide and Static Network Address Translation 

  • Configuring Application Control and URL filtering Access Control policy layers. 

  • Working with multiple concurrent Administrators and testing permissions profiles. 

  • Working with Check Point licenses 

  • Viewing and maintaining logs 

  • Configuring a Virtual Private Network 

  • Providing User Access 

  • Working with Check Point clustering 

  • Producing Check Point reports

Durée 

3 jours soit 21 heures

Prix public

2.235 € HT

Dates

sur demande

Public concerné

This course is designed for technical professionals, who support, install, deploy or administer Check Point Software Blades.

Objectifs pédagogiques

  • Describe the key elements of Check Point’s unified, secure management architecture. 

  • Interpret the concept of a firewall and understand the mechanisms used for controlling network traffic.

  • Recognize SmartConsole features and functions. 

  • Understand Check Point deployment options. 

  • Describe the basic functions of the Gaia OS. 

  • Describe the elements of a unified security policy. 

  • Understand how traffic inspection takes place in a unified security policy. 

  • Summarize how administration roles and permissions assist in managing policy. 

  • Implement Check Point backup techniques. 

  • Recognize Check Point Security Solutions and Products and how they work to protect your network. 

  • Understand licensing and contract requirements for Check Point security products. 

  • Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements. 

  • Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users and traffic flow patterns or security activities. 

  • Understand Site-to-Site and Remote Access VPN deployments and VPN communities. 

  • Understand how to analyze and interpret VPN tunnel traffic. 

  • Recognize how to define users and user groups. 

  • Manage user access for internal and external users. 

  • Understand the basic concepts of ClusterXL technology and its advantages. 

  • Understand how to perform periodic administrator tasks as specified in administrator job descriptions.

Pré requis

  • General knowledge of TCP/IP

  • Working knowledge of Windows and/or UNIX, network technology and the Internet

Méthode et Moyens Pédagogiques

Ce cours allie théorie, démonstrations, discussions interactives mais aussi exercices pratiques.
Un support de cours est remis à chaque participant.
Les exercices se basent sur des labs disponible à distance.

 

Sur le même thème

SARL DIG-IT

Simplifiez vous l'IT

 

Tél : +33 (0)6 09 52 48 96

Mail : sandra@formation-IT.org

Centre de Formation enregistré

sous la DA n° 93.06.07876.06

SIRET 822 060 372 00015 - APE 7022Z 

  • Twitter Classic
  • LinkedIn Social Icon
  • Facebook Social Icon