With the barrage of connected devices, new technologies like cloud computing, and a continuous wave of sophisticated threats, managing security is becoming increasingly complex – security needs to adjust to new operational realities. The key to managing this complexity is through security consolidation – bringing all security protections and functions under one umbrella. With R80.10, security consolidation is fully realized. This 3 day course provides an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades

Target Audience

This course is intended primarily for:

System Administrators
Support Analysts
Security Managers
Network Engineers
Anyone seeking CCSA certification
Technical persons who support, install, deploy or administer Check Point Software Blades

Prerequisites

The knowledge and skills a learner must have before attending this course are as follows:

Check Point User Center Account email address must be confirmed
General Knowledge of TCP/IP
6 months to 1 year experience with Check Point products recommended
Working knowledge of Windows and/or UNIX, Network technology and the internet

How will this Course help You

Upon completing this course, the learner will be able to meet these overall objectives:

Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic
Describe the key elements of Check Point’s unified Security Management Architecture
Recognize SmartConsole features, functions and tools
Understand Check Point deployment options
Describe the basic functions of Gaia
Describe the essential elements of a Security Policy
Understand how traffic inspection takes place in a unified Security Policy
Summarize how administration roles and permissions assist in managing policy
Recall how to implement backup techniques
Understand the Check Point policy layer concept
Recognize Check Point security solutions and products and how they work to protect your network
Understand licensing and contract requirements for Check Point security products
Identify tools designed to monitor data, determine threats and recognize performance improvements
Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities
Understand Site-to-Site and Remote Access VPN deployments and communities
Understand how to analyze and interpret VPN traffic
Recognize how to define users and user groups
Understand how to manage user access for internal and external users
Understand the basic concepts of ClusterXL technology and its advantages
Understand how to perform periodic administrator tasks as specified in administrator job descriptions

Location

Addis Ababa, Ethiopia

Prerequesites

None

Register to our waiting list and get notified when the course starts.