Check Point Training
Introduction to Check Point Security
Get an overview of Check Point security solutions, including their architecture, components, and deployment options. Understand the basic principles and benefits of Check Point products in network security.
Check Point Security Architecture
Explore the architecture of Check Point security solutions. Learn about the hardware and software components, their integration, and how to deploy and configure Check Point appliances.
Firewall Policies and Rule Configuration
Learn to create and manage firewall policies and rules. This section covers policy setup, rule configuration, and best practices for ensuring robust network security.
Threat Prevention and Intrusion Prevention System (IPS)
Understand the threat prevention and IPS features of Check Point. Learn how to configure and manage policies to protect against network threats and attacks.
Network Address Translation (NAT)
Study Network Address Translation (NAT) concepts and configurations. Learn to set up NAT rules, manage policies, and troubleshoot common NAT issues.
Virtual Private Network (VPN) Configuration
Learn about configuring and managing VPNs with Check Point. This includes site-to-site and remote-access VPNs, encryption methods, and VPN troubleshooting techniques.
User and Identity Management
Explore user and identity management features within Check Point. Understand user authentication, identity awareness, and configuring access controls and policies.
Logging and Monitoring
Discover how to use Check Point’s logging and monitoring tools. Learn to configure log settings, analyze log data, and generate reports for effective network security management.
High Availability and Failover
Learn about setting up high availability and failover mechanisms to ensure uninterrupted network protection. Study redundancy configurations and failover management in Check Point environments.
Backup and Restore Procedures
Understand the procedures for backing up and restoring Check Point security systems. Learn backup strategies, restore processes, and best practices for system integrity.
Case Studies and Hands-On Labs
Engage in practical case studies and hands-on labs to apply Check Point training concepts. Practice configuration, management, and troubleshooting in simulated scenarios.
Exam Preparation and Study Tips
Prepare for Check Point certification exams with study tips, practice exams, and review materials. Familiarize yourself with the exam format, question types, and strategies for successful certification.
Check Point Training syllabus
1. Introduction to Check Point Technologies
- What’s New in Check Point R77.10
- Check Point’s Architecture
- Implementing 3-Tier Architecture of Check Point
2. Deployment Platforms
- Check Point Supported Platforms
- Installing Check Point on Windows OS
- Installing Check Point on Linux OS
- Installing Check Point on SPLAT
- Installing Check Point on GAiA
- Configuring Check Point in Standard Setup
- Configuring Check Point in Distributed Setup
3. Introduction to Security Policy
- Understanding Check Point Licensing
- Verify SIC Establishment Between the Security Management Server and the Gateway Using Smart Dashboard
- Creating a Basic Rulebase
- Implicit Rules vs. Explicit Rules
- Configuring Hide NAT
- Configuring Static NAT
4. User Management & Authentication
- Configure User & Group Accounts in Check Point
- Configure Policies for Authentication
- Local Authentication Methods
- Configuring User Authentication
- Configuring Session Authentication
- Configuring Client Authentication
5. External Authentication
- Creating LDAP & TACACS+ Objects
- Integrating Active Directory Server with Check Point Gateway
- Configuring TACACS+ Server
- Integrating TACACS+ Server with Check Point Gateway
6. Identity Awareness
- Introduction to Identity Awareness
- Configuring Identity Awareness
- Using Identity Awareness to Provide Access to Network Resources
7. Check Point VPN Introduction
- Understanding VPN Terminology
- Configuring Remote Access VPN
- Implementing Site-to-Site VPN with Head Office & Branch Office
8. Monitoring
- Using SmartView Tracker for Analyzing Logs
- Using SmartView Monitor for Monitoring Traffic
- Using Queries in SmartView Tracker
- Filtering Logs in SmartView Tracker
Training
Basic Level Training
Duration : 1 Month
Advanced Level Training
Duration : 1 Month
Project Level Training
Duration : 1 Month
Total Training Period
Duration : 3 Months
Course Mode :
Available Online / Offline
Course Fees :
Please contact the office for details