Check Point Security Administration Training
Introduction to Check Point Security
Get an overview of Check Point security solutions and their role in network security. Understand the basic concepts, architecture, and components of Check Point products.
Check Point Security Architecture
Explore the architecture of Check Point security solutions, including hardware and software components, deployment options, and system configurations. Learn how to set up and manage Check Point security appliances.
Firewall Policies and Rule Configuration
Learn how to create and manage firewall policies and rules. This section covers policy configuration, rule creation, and best practices for securing network traffic.
Threat Prevention and IPS
Understand the threat prevention mechanisms and Intrusion Prevention System (IPS) features provided by Check Point. Learn how to configure and manage threat prevention policies to protect against network attacks.
Network Address Translation (NAT)
Study Network Address Translation (NAT) concepts and configurations. Learn how to set up NAT policies, manage NAT rules, and troubleshoot common NAT issues.
VPN Configuration and Management
Learn how to configure and manage Virtual Private Networks (VPNs) using Check Point. This includes site-to-site and remote-access VPNs, encryption protocols, and VPN troubleshooting.
User and Identity Management
Explore user and identity management features in Check Point. Learn about user authentication, identity awareness, and how to configure user access controls and policies.
Logging and Monitoring
Understand how to monitor and analyze logs using Check Point's logging and monitoring tools. Learn how to configure log settings, view log data, and generate reports for network security analysis.
High Availability and Failover
Study high availability and failover configurations to ensure continuous network protection. Learn about setting up redundancy, failover mechanisms, and managing high availability in Check Point environments.
Backup and Restore Procedures
Learn how to perform backup and restore operations for Check Point security systems. Understand backup strategies, restore procedures, and best practices for maintaining system integrity.
Case Studies and Hands-On Labs
Engage in case studies and hands-on labs to apply Check Point security administration concepts. Practice configuring policies, managing security features, and troubleshooting real-world scenarios.
Exam Preparation and Study Tips
Prepare for the Check Point Security Administration certification exam with study tips, practice tests, and review materials. Understand the exam format, question types, and strategies for success.
Check Point Security Administration syllabus
1. Introduction to Check Point Technologies
- What’s New in Check Point R77.10
- Check Point’s Architecture
- Implementing 3-Tier Architecture of Check Point
2. Deployment Platforms
- Check Point Supported Platforms
- Installing Check Point on Windows OS
- Installing Check Point on Linux OS
- Installing Check Point on SPLAT
- Installing Check Point on GAiA
- Configuring Check Point in Standard Setup
- Configuring Check Point in Distributed Setup
3. Introduction to Security Policy
- Understanding Check Point Licensing
- Verify SIC Establishment Between the Security Management Server and the Gateway Using SmartDashboard
- Creating a Basic Rulebase
- Implicit Rules vs. Explicit Rules
- Configuring Hide NAT
- Configuring Static NAT
4. User Management & Authentication
- Configure User & Group Accounts in Check Point
- Configure Policies for Authentication
- Local Authentication Methods
- Configuring User Authentication
- Configuring Session Authentication
- Configuring Client Authentication
5. External Authentication
- Creating LDAP & TACACS+ Objects
- Integrating Active Directory Server with Check Point Gateway
- Configuring TACACS+ Server
- Integrating TACACS+ Server with Check Point Gateway
6. Identity Awareness
- Introduction to Identity Awareness
- Configuring Identity Awareness
- Using Identity Awareness to Provide Access to Network Resources
7. Check Point VPN Introduction
- Understanding VPN Terminology
- Configuring Remote Access VPN
- Implementing Site-to-Site VPN with Head Office & Branch Office
8. Monitoring
- Using SmartView Tracker for Analyzing Logs
- Using SmartView Monitor for Monitoring Traffic
- Using Queries in SmartView Tracker
- Filtering Logs in SmartView Tracker
Training
Basic Level Training
Duration : 1 Month
Advanced Level Training
Duration : 1 Month
Project Level Training
Duration : 1 Month
Total Training Period
Duration : 3 Months
Course Mode :
Available Online / Offline
Course Fees :
Please contact the office for details