Caricamento...
CCSA

Check Point Certified Admin

e-learn

Prezzo

€ 1,599.00
(Iva esclusa)

Scheda tecnica

Scarica

Giorni

3 gg

Il corso Check Point Security Administration (CCSA) fornisce le competenze e le conoscenze dei concetti fondamentali necessari per configurare Check Point Security Gateway e il Management Software Blades.

Durante questo corso, si configureranno le security Policy e si imparerà a gestire e monitorare una rete sicura. Inoltre, si configurerà il Security Gateway per implementare una rete privata virtuale (VPN), per utenti remoti sia interni che esterni. Il percorso è fortemente orientato alla pratica laboratoriale e nel contempo, prepara alla prestigiosa certificazione Check Point Certified Admin (CCSA). La didattica è sviluppata attorno ai seguenti argomenti chiave: Security Policy, Monitor Network Traffic, User Access, Deploy VPN, ClusterXL Solutions e altro ancora.

Corso di preparazione al conseguimento della

  • Certificazione Check Point CCSA
  • Esame 156-215.80
  • Check Point Cyber Security Administrator (CCSA)

Il corso è un corso ufficiale Check Point ed è erogato in collaborazione con Vega Training


I partecipanti dovranno avere una conoscenza basilare scolastica della lingua Inglese.

Introduction to Check Point Architecture

  • Identify the basic functions of the Web UI.
  • Create and confirm admin users for the network.
  • Configure network messages.
  • Confirm existing network configuration settings.
  • Install and tour the GUI.
  • Describe the key elements of Check Point’s unified,3- tiered architecture.
  • Interpret the concept of a firewall and understand the mechanisms used for controlling network traffic.
  • Recognize SmartConsole features, functions and tools.
  • Understand Check Point deployment options.

Security Policy Management

  • Create multiple administrators and apply different roles/permissions for concurrent administration.
  • Create and configure network, host and gateway objects.
  • Evaluate and manipulate rules in a unified Access Control security policy.
  • Apply policy layers and analyze how they affect traffic inspection.
  • Prepare and schedule backups for the gateway.
  • Describe the essential elements of a unified security policy.
  • Understand how traffic inspection takes place in a unified security policy.
  • Summarize how administration roles and permissions assist in managing policy.
  • Recall how to implement Check Point backup techniques.

Check Point Security Solutions

  • Evaluate and manage different Check Point security solutions deployed for network access control.
  • Evaluate and manage Check Point security solutions for threat protection.
  • Examine how the Compliance blade monitors your Check Point security infrastructure.
  • Validate existing licenses for products installed on your network.
  • Recognize Check Point security solutions & products and the way they protect your network.
  • Understand licensing and contract requirements for Check Point security solutions.

Traffic Visibility

  • Generate network traffic and use traffic visibility tools to monitor the data.
  • Compare and contrast various tools available for viewing traffic.
  • Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements.
  • Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users and traffic flow patterns or security activities.

Basic Concepts of VPN

  • Configure and deploy a site- to- site VPN.
  • Test the VPN connection and analyze the tunnel traffic
  • Understand VPN deployments and Check Point Communities.
  • Understand how to analyze and interpret VPN tunnel traffic.

Managing User’s Access

  • Create and define user access for a guest wireless user.
  • Test Identity Awareness connection.
  • Recognize how to define users and user groups for your environment.
  • Understand how to manage user access for internal users and guests.

Working with Cluster XL

  • Install and configure ClusterXL with a High Availability configuration.
  • Describe the basic concept of ClusterXL technology and its advantages.

Administrator Task Implementation

  • Review rule- base performance for policy control.
  • Understand how to perform periodic administrator tasks as specified in Administrator job descriptions.

SmartEvent Reports

  • Generate reports that effectively summarize network activity.
  • Recognize how to effectively create, customize and generate network activity reports.

LABORATORI

  • Working with Gaia Portal
  • Modifying an Existing Security Policy
  • Configuring Hide and Static NAT
  • Managing Administrator Access
  • Installing and Managing a Remote Security Gateway
  • Managing Backups
  • Defining Access Control Policy Layers
  • Defining and Sharing Security Policy Layers
  • Working with Licenses and Contracts
  • Working with Check Point Logs
  • Maintaining Check Point Logs
  • Configuring a Site-to-Site VPN
  • Providing User Access
  • Working with Cluster XL
  • Verifying Network Compliance
  • Working with CP View

Il corsista può accedere alle attrezzature e ai sistemi reali Check Point in modalità remota h24. Ogni partecipante dispone di un accesso per implementare le varie configurazioni avendo così un riscontro pratico e immediato della teoria affrontata.


Sede Data P