Maxtrain.com - info@maxtrain.com - 513-322-8888 - 866-595-6863
Check Point Cyber Security Administrator
Ohio TechCred Approved Credential: Check Point Cyber Security Administrator
Description
Check Point Cyber Security Administrator Training Introduction
The Check Point Cyber Security Administrator training program equips technical professionals with the knowledge and skills necessary to administer and secure networks using Check Point’s industry-leading cybersecurity solutions. This comprehensive course covers fundamental concepts and essential tasks to ensure network security.
This advanced training program is meticulously designed to align with current industry standards and practices, ensuring that participants are well-versed in the latest cybersecurity techniques. By the end of this course, participants will not only understand the foundational principles of network security but also be proficient in the practical application of Check Point’s solutions.
In this course, students will engage in interactive sessions that highlight the strategic implementation of Check Point’s security management. This includes an in-depth exploration of the Gaia operating system, which forms the core of Check Point’s security architecture.
Participants will learn to navigate the SmartConsole interface with ease, mastering its numerous features and tools for effective network administration. This includes managing user access, permissions, and understanding the nuances of Check Point’s comprehensive security solutions and their pivotal role in safeguarding network infrastructures. The course also covers the crucial aspects of licensing and contract management for Check Point products, providing a holistic view of the administrative responsibilities.
These sessions are particularly beneficial for professionals aiming to specialize in proactive threat mitigation and comprehensive network protection. Lastly, recognizing the burgeoning importance of IoT security, the course provides valuable insights into Check Point’s IoT Protect solutions, equipping participants with the knowledge to secure an increasingly interconnected array of devices.
Check Point Cyber Security Administrator Course Objectives
- Know how to perform periodic administrator task
- Describe the basic functions of the Gaia operating system
- Recognize SmartConsole features, functions, and tools
- Understand how SmartConsole is used by administrators to give user access
- Learn how Check Point security solutions and products work and how they protect networks
- Understand licensing and contract requirements for Check Point security products
- Describe the essential elements of a Security Policy
- Understand the Check Point policy layer concept
- Understand how to enable the Application Control and URL Filtering software
- Blades to block access to various applications
- Describe how to configure manual and automatic NAT
- Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements
- Describe different Check Point Threat Prevention solutions for network attacks
- Articulate how the Intrusion Prevention System is configured, maintained and tuned
- Understand the Infinity Threat Prevention system
- Knowledge about Check Point’s IoT Protect
Prerequisites
Prior to taking this course, it is recommended that learners possess the following:
- Working knowledge of Windows and UNIX
- Working knowledge of network technology
- Working knowledge of the Internet and TCP/IP
Audience
- Technical professionals who support, install, deploy or administer Check Point products.
Check Point Cyber Security Administrator Outline
- Know how to perform periodic administrator tasks
- Describe the basic functions of the Gaia operating system
- Recognize SmartConsole features, functions, and tools
- Understand how SmartConsole is used by administrators to give user access
- Learn how Check Point security solutions and products work and how they protect networks
- Understand licensing and contract requirements for Check Point security products
- Describe the essential elements of a Security Policy
- Understand the Check Point policy layer concept
- Understand how to enable the Application Control and URL Filtering software
- Blades to block access to various applications
- Describe how to configure manual and automatic NAT
- Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements
- Describe different Check Point Threat Prevention solutions for network attacks
- Articulate how the Intrusion Prevention System is configured, maintained and tuned
- Understand the Infinity Threat Prevention system
- Knowledge about Check Point’s IoT Protect
Exercises
- Configure the Security Management Server
- Use the WebUI to run the First Time Wizard
- Install the Smart Console
- Install the Alpha Gateway using the network detailed in the course topology
- Demonstrate how the Security Management Server and Gateway communicate
- Test SIC Status
- Create multiple administrators and apply different roles and permissions for simultaneous administration
- Validate existing licenses for products installed on the network
- Create and configure host, network and group objects
- Create a simplified Security Policy
- Demonstrate how to use Security Zones in policy
- Demonstrate how to share a layer between Security Polices
- Configure Network Address Translation for server and network objects
- Enable Identity Awareness
- Deploy user access roles for more granular control of the security Policy
- Generate network Traffic and use traffic visibility tools to monitor the data
- Use SmartConsole and SmartView Monitor to view status, alerts, and block suspicious traffic
|
$3000.00
|
3 Days Course |

