Check Point Training

Introduction to Check Point Security

Get an overview of Check Point security solutions, including their architecture, components, and deployment options. Understand the basic principles and benefits of Check Point products in network security.

Check Point Security Architecture

Explore the architecture of Check Point security solutions. Learn about the hardware and software components, their integration, and how to deploy and configure Check Point appliances.

Firewall Policies and Rule Configuration

Learn to create and manage firewall policies and rules. This section covers policy setup, rule configuration, and best practices for ensuring robust network security.

Threat Prevention and Intrusion Prevention System (IPS)

Understand the threat prevention and IPS features of Check Point. Learn how to configure and manage policies to protect against network threats and attacks.

Network Address Translation (NAT)

Study Network Address Translation (NAT) concepts and configurations. Learn to set up NAT rules, manage policies, and troubleshoot common NAT issues.

Virtual Private Network (VPN) Configuration

Learn about configuring and managing VPNs with Check Point. This includes site-to-site and remote-access VPNs, encryption methods, and VPN troubleshooting techniques.

User and Identity Management

Explore user and identity management features within Check Point. Understand user authentication, identity awareness, and configuring access controls and policies.

Logging and Monitoring

Discover how to use Check Point’s logging and monitoring tools. Learn to configure log settings, analyze log data, and generate reports for effective network security management.

High Availability and Failover

Learn about setting up high availability and failover mechanisms to ensure uninterrupted network protection. Study redundancy configurations and failover management in Check Point environments.

Backup and Restore Procedures

Understand the procedures for backing up and restoring Check Point security systems. Learn backup strategies, restore processes, and best practices for system integrity.

Case Studies and Hands-On Labs

Engage in practical case studies and hands-on labs to apply Check Point training concepts. Practice configuration, management, and troubleshooting in simulated scenarios.

Exam Preparation and Study Tips

Prepare for Check Point certification exams with study tips, practice exams, and review materials. Familiarize yourself with the exam format, question types, and strategies for successful certification.

Check Point Training syllabus

1. Introduction to Check Point Technologies

  • What’s New in Check Point R77.10
  • Check Point’s Architecture
  • Implementing 3-Tier Architecture of Check Point

2. Deployment Platforms

  • Check Point Supported Platforms
  • Installing Check Point on Windows OS
  • Installing Check Point on Linux OS
  • Installing Check Point on SPLAT
  • Installing Check Point on GAiA
  • Configuring Check Point in Standard Setup
  • Configuring Check Point in Distributed Setup

3. Introduction to Security Policy

  • Understanding Check Point Licensing
  • Verify SIC Establishment Between the Security Management Server and the Gateway Using Smart Dashboard
  • Creating a Basic Rulebase
  • Implicit Rules vs. Explicit Rules
  • Configuring Hide NAT
  • Configuring Static NAT

4. User Management & Authentication

  • Configure User & Group Accounts in Check Point
  • Configure Policies for Authentication
  • Local Authentication Methods
  • Configuring User Authentication
  • Configuring Session Authentication
  • Configuring Client Authentication

5. External Authentication

  • Creating LDAP & TACACS+ Objects
  • Integrating Active Directory Server with Check Point Gateway
  • Configuring TACACS+ Server
  • Integrating TACACS+ Server with Check Point Gateway

6. Identity Awareness

  • Introduction to Identity Awareness
  • Configuring Identity Awareness
  • Using Identity Awareness to Provide Access to Network Resources

7. Check Point VPN Introduction

  • Understanding VPN Terminology
  • Configuring Remote Access VPN
  • Implementing Site-to-Site VPN with Head Office & Branch Office

8. Monitoring

  • Using SmartView Tracker for Analyzing Logs
  • Using SmartView Monitor for Monitoring Traffic
  • Using Queries in SmartView Tracker
  • Filtering Logs in SmartView Tracker

Training

Basic Level Training

Duration : 1 Month

Advanced Level Training

Duration : 1 Month

Project Level Training

Duration : 1 Month

Total Training Period

Duration : 3 Months

Course Mode :

Available Online / Offline

Course Fees :

Please contact the office for details

Placement Benefit Services

Provide 100% job-oriented training
Develop multiple skill sets
Assist in project completion
Build ATS-friendly resumes
Add relevant experience to profiles
Build and enhance online profiles
Supply manpower to consultants
Supply manpower to companies
Prepare candidates for interviews
Add candidates to job groups
Send candidates to interviews
Provide job references
Assign candidates to contract jobs
Select candidates for internal projects

Note

100% Job Assurance Only
Daily online batches for employees
New course batches start every Monday