Il corso Check Point Security Administration (CCSA) fornisce le competenze e le conoscenze dei concetti fondamentali necessari per configurare Check Point Security Gateway e il Management Software Blades.
Durante questo corso, si configureranno le security Policy e si imparerà a gestire e monitorare una rete sicura. Inoltre, si configurerà il Security Gateway per implementare una rete privata virtuale (VPN), per utenti remoti sia interni che esterni. Il percorso è fortemente orientato alla pratica laboratoriale e nel contempo, prepara alla prestigiosa certificazione Check Point Certified Admin (CCSA). La didattica è sviluppata attorno ai seguenti argomenti chiave: Security Policy, Monitor Network Traffic, User Access, Deploy VPN, ClusterXL Solutions e altro ancora.
Corso di preparazione al conseguimento della
- Certificazione Check Point CCSA
- Esame 156-215.80
- Check Point Cyber Security Administrator (CCSA)
Il corso è un corso ufficiale Check Point ed è erogato in collaborazione con Vega Training
I partecipanti dovranno avere una conoscenza basilare scolastica della lingua Inglese.
Introduction to Check Point Architecture
- Identify the basic functions of the Web UI.
- Create and confirm admin users for the network.
- Configure network messages.
- Confirm existing network configuration settings.
- Install and tour the GUI.
- Describe the key elements of Check Point’s unified,3- tiered architecture.
- Interpret the concept of a firewall and understand the mechanisms used for controlling network traffic.
- Recognize SmartConsole features, functions and tools.
- Understand Check Point deployment options.
Security Policy Management
- Create multiple administrators and apply different roles/permissions for concurrent administration.
- Create and configure network, host and gateway objects.
- Evaluate and manipulate rules in a unified Access Control security policy.
- Apply policy layers and analyze how they affect traffic inspection.
- Prepare and schedule backups for the gateway.
- Describe the essential elements of a unified security policy.
- Understand how traffic inspection takes place in a unified security policy.
- Summarize how administration roles and permissions assist in managing policy.
- Recall how to implement Check Point backup techniques.
Check Point Security Solutions
- Evaluate and manage different Check Point security solutions deployed for network access control.
- Evaluate and manage Check Point security solutions for threat protection.
- Examine how the Compliance blade monitors your Check Point security infrastructure.
- Validate existing licenses for products installed on your network.
- Recognize Check Point security solutions & products and the way they protect your network.
- Understand licensing and contract requirements for Check Point security solutions.
Traffic Visibility
- Generate network traffic and use traffic visibility tools to monitor the data.
- Compare and contrast various tools available for viewing traffic.
- Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements.
- Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users and traffic flow patterns or security activities.
Basic Concepts of VPN
- Configure and deploy a site- to- site VPN.
- Test the VPN connection and analyze the tunnel traffic
- Understand VPN deployments and Check Point Communities.
- Understand how to analyze and interpret VPN tunnel traffic.
Managing User’s Access
- Create and define user access for a guest wireless user.
- Test Identity Awareness connection.
- Recognize how to define users and user groups for your environment.
- Understand how to manage user access for internal users and guests.
Working with Cluster XL
- Install and configure ClusterXL with a High Availability configuration.
- Describe the basic concept of ClusterXL technology and its advantages.
Administrator Task Implementation
- Review rule- base performance for policy control.
- Understand how to perform periodic administrator tasks as specified in Administrator job descriptions.
SmartEvent Reports
- Generate reports that effectively summarize network activity.
- Recognize how to effectively create, customize and generate network activity reports.
LABORATORI
- Working with Gaia Portal
- Modifying an Existing Security Policy
- Configuring Hide and Static NAT
- Managing Administrator Access
- Installing and Managing a Remote Security Gateway
- Managing Backups
- Defining Access Control Policy Layers
- Defining and Sharing Security Policy Layers
- Working with Licenses and Contracts
- Working with Check Point Logs
- Maintaining Check Point Logs
- Configuring a Site-to-Site VPN
- Providing User Access
- Working with Cluster XL
- Verifying Network Compliance
- Working with CP View
Il corsista può accedere alle attrezzature e ai sistemi reali Check Point in modalità remota h24. Ogni partecipante dispone di un accesso per implementare le varie configurazioni avendo così un riscontro pratico e immediato della teoria affrontata.