Check Point Security Administration Training

Introduction to Check Point Security

Get an overview of Check Point security solutions and their role in network security. Understand the basic concepts, architecture, and components of Check Point products.

Check Point Security Architecture

Explore the architecture of Check Point security solutions, including hardware and software components, deployment options, and system configurations. Learn how to set up and manage Check Point security appliances.

Firewall Policies and Rule Configuration

Learn how to create and manage firewall policies and rules. This section covers policy configuration, rule creation, and best practices for securing network traffic.

Threat Prevention and IPS

Understand the threat prevention mechanisms and Intrusion Prevention System (IPS) features provided by Check Point. Learn how to configure and manage threat prevention policies to protect against network attacks.

Network Address Translation (NAT)

Study Network Address Translation (NAT) concepts and configurations. Learn how to set up NAT policies, manage NAT rules, and troubleshoot common NAT issues.

VPN Configuration and Management

Learn how to configure and manage Virtual Private Networks (VPNs) using Check Point. This includes site-to-site and remote-access VPNs, encryption protocols, and VPN troubleshooting.

User and Identity Management

Explore user and identity management features in Check Point. Learn about user authentication, identity awareness, and how to configure user access controls and policies.

Logging and Monitoring

Understand how to monitor and analyze logs using Check Point's logging and monitoring tools. Learn how to configure log settings, view log data, and generate reports for network security analysis.

High Availability and Failover

Study high availability and failover configurations to ensure continuous network protection. Learn about setting up redundancy, failover mechanisms, and managing high availability in Check Point environments.

Backup and Restore Procedures

Learn how to perform backup and restore operations for Check Point security systems. Understand backup strategies, restore procedures, and best practices for maintaining system integrity.

Case Studies and Hands-On Labs

Engage in case studies and hands-on labs to apply Check Point security administration concepts. Practice configuring policies, managing security features, and troubleshooting real-world scenarios.

Exam Preparation and Study Tips

Prepare for the Check Point Security Administration certification exam with study tips, practice tests, and review materials. Understand the exam format, question types, and strategies for success.

Check Point Security Administration syllabus

1. Introduction to Check Point Technologies

  • What’s New in Check Point R77.10
  • Check Point’s Architecture
  • Implementing 3-Tier Architecture of Check Point

2. Deployment Platforms

  • Check Point Supported Platforms
  • Installing Check Point on Windows OS
  • Installing Check Point on Linux OS
  • Installing Check Point on SPLAT
  • Installing Check Point on GAiA
  • Configuring Check Point in Standard Setup
  • Configuring Check Point in Distributed Setup

3. Introduction to Security Policy

  • Understanding Check Point Licensing
  • Verify SIC Establishment Between the Security Management Server and the Gateway Using SmartDashboard
  • Creating a Basic Rulebase
  • Implicit Rules vs. Explicit Rules
  • Configuring Hide NAT
  • Configuring Static NAT

4. User Management & Authentication

  • Configure User & Group Accounts in Check Point
  • Configure Policies for Authentication
  • Local Authentication Methods
  • Configuring User Authentication
  • Configuring Session Authentication
  • Configuring Client Authentication

5. External Authentication

  • Creating LDAP & TACACS+ Objects
  • Integrating Active Directory Server with Check Point Gateway
  • Configuring TACACS+ Server
  • Integrating TACACS+ Server with Check Point Gateway

6. Identity Awareness

  • Introduction to Identity Awareness
  • Configuring Identity Awareness
  • Using Identity Awareness to Provide Access to Network Resources

7. Check Point VPN Introduction

  • Understanding VPN Terminology
  • Configuring Remote Access VPN
  • Implementing Site-to-Site VPN with Head Office & Branch Office

8. Monitoring

  • Using SmartView Tracker for Analyzing Logs
  • Using SmartView Monitor for Monitoring Traffic
  • Using Queries in SmartView Tracker
  • Filtering Logs in SmartView Tracker

Training

Basic Level Training

Duration : 1 Month

Advanced Level Training

Duration : 1 Month

Project Level Training

Duration : 1 Month

Total Training Period

Duration : 3 Months

Course Mode :

Available Online / Offline

Course Fees :

Please contact the office for details

Placement Benefit Services

Provide 100% job-oriented training
Develop multiple skill sets
Assist in project completion
Build ATS-friendly resumes
Add relevant experience to profiles
Build and enhance online profiles
Supply manpower to consultants
Supply manpower to companies
Prepare candidates for interviews
Add candidates to job groups
Send candidates to interviews
Provide job references
Assign candidates to contract jobs
Select candidates for internal projects

Note

100% Job Assurance Only
Daily online batches for employees
New course batches start every Monday