Course Overview
Learn basic concepts and develop skills necessary to administer IT security fundamental tasks.
Course Objectives
- Introduction to Check Point Technology
- Security Policy Management
- Policy Layers
- Check Point Security Solutions and Licensing
- Traffic Visibility
- Basic Concepts of VPN
- Managing User Access
- Working with ClusterXL
- Administrator Task Implementation
Who Should Attend?
This course is recommended for technical professionals who support, install, deploy or administer Check Point products.
- Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
- Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
- Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
- Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
- Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
- Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.
Agenda
- 1. Know how to perform periodic administrator tasks
- 2. Describe the basic functions of the Gaia operating system
- 3. Recognize SmartConsole features, functions, and tools
- 4. Understand how SmartConsole is used by administrators to give user access
- 5. Learn how Check Point security solutions and products work and how they protect networks
- 6. Understand licensing and contract requirements for Check Point security products
- 7. Describe the essential elements of a Security Policy
- 8. Understand the Check Point policy layer concept
- 9. Understand how to enable the Application Control and URL Filtering software
- 10. Blades to block access to various applications
- 11. Describe how to configure manual and automatic NAT
- 12. Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements
- 13. Describe different Check Point Threat Prevention solutions for network attacks
- 14. Articulate how the Intrusion Prevention System is configured, maintained and tuned
- 15. Understand the Infinity Threat Prevention system
- 16. Knowledge about Check Point's IoT Protect