Maxtrain.com - info@maxtrain.com - 513-322-8888 - 866-595-6863
Check Point Cybersecurity Boot Camp (CCSA+CCSE)
Ohio TechCred Approved Credential: Check Point Cyber Security Administrator
Description
Check Point Cyber Security Administrator and Expert Bundle Introduction
The Check Point Cyber Security Administrator and Expert Bundle is a comprehensive training program designed to equip IT professionals with advanced skills in managing Check Point security systems. This bundle includes both the Check Point Certified Security Administrator (CCSA) and Check Point Certified Security Expert (CCSE) courses.
It’s meticulously structured to provide a deep understanding of Check Point’s advanced security management systems, essential for administering critical IT security tasks. As the digital landscape evolves, the demand for skilled cybersecurity professionals is increasing, making this course an invaluable asset for those looking to advance their careers in this field.
This course goes beyond basic administration to dive into the intricate workings of Check Point’s security solutions. Participants will gain a thorough understanding of the Gaia operating system, SmartConsole’s array of features, and the Check Point Firewall infrastructure. This knowledge is critical for managing permissions, user access, and ensuring network security. The course also covers the practical application of Check Point security products, including understanding licensing and contract requirements.
Students will learn about Security Policies, policy layers, and the implementation of Application Control and URL Filtering to safeguard networks. Additionally, the course encompasses advanced topics such as ClusterXL technology, Management High Availability, and using Check Point API tools for efficient management functions. By exploring topics like SecureXL and CoreXL acceleration technologies, participants will be able to optimize Security Gateway performance effectively.
The bundle also emphasizes the importance of understanding different Check Point Threat Prevention solutions, including SandBlast, Threat Emulation, and Threat Extraction, to provide robust protection against network attacks. With a focus on practical skills and current best practices, this course is ideal for professionals seeking to enhance their expertise in Check Point’s cybersecurity solutions, ensuring they are well-prepared to tackle the challenges of today’s cybersecurity landscape.
Check Point Cyber Security Administrator and Expert Course Objectives
- Know how to perform periodic administrator tasks
- Describe the basic functions of the Gaia operating system
- Recognize SmartConsole features, functions, and tools
- Describe the Check Point Firewall infrastructure
- Understand how SmartConsole is used by administrators to grant permissions and user access
- Learn how Check Point security solutions and products work and how they protect networks
- Understand licensing and contract requirements for Check Point security products
- Describe the essential elements of a Security Policy
- Understand the Check Point policy layer concept
Prerequisites
Prior to taking this course, it is recommended that learners possess the following:
- General knowledge of TCP/IP
- Working knowledge of Windows, UNIX, networking, and the Internet
Audience
- This special combo or bundle course is recommended for Systems Administrators, Network Engineers, Security Managers, Support Analysts and any other IT professional working with Check Point or seeking CCSA and CCSE certifications.
Check Point Cyber Security Administrator and Expert Course Outline
-
- scribe the primary components of a Check Point Three-Tier Architecture and explain how they work together in the Check Point environment.
- Identify the basic workflow to install Security Management Server and Security Gateway for a single-domain solution
- Create SmartConsole objects that correspond to the organization’s topology for use in policies and rules.
- Identify the tools available to manage Check Point licenses and contracts, including their purpose and use.
- Identify features and capabilities that enhance the configuration and management of the Security Policy.
- Demonstrate an understanding of Application Control & URL Filtering and Autonomous Threat Prevention capabilities and how to configure these solutions to meet an organization’s security requirements.
- Describe how to analyze and interpret VPN tunnel traffic.
- Identify how to monitor the health of supported Check Point hardware using the Gaia Portal and the command line.
- Describe the different methods for backing up Check Point system information and discuss best practices and recommendations for each method.
Exercises
- Deploy SmartConsole
- Install a Security Management Server
- Install a Security Gateway
- Configure Objects in SmartConsole
- Establish Secure Internal Communication
- Manage Administrator Access
- Manage Licenses
- Create a Security Policy
- Configure Order Layers
- Configure a Shared Inline Layer
- Configure NAT
- Integrate Security with a Unified Policy
- Elevate Security with Autonomous Threat Prevention
- Configure a Locally Managed Site-to-Site VPN
- Elevate Traffic View
- Monitor System States
- Maintain the Security Environment
- Security Expert
Objectives
- Identify the types of technologies that Check Point supports for automation.
- Explain the purpose of the Check Management High Availability (HA) deployment.
- Explain the basic concepts of Clustering and ClusterXL, including protocols, synchronization, and connection stickyness.
- Explain the purpose of dynamic objects, updatable objects, and network feeds.
- Describe the Identity Awareness components and configurations.
- Describe different Check Point Threat Prevention solutions.
- Articulate how the Intrusion Prevention System is configured.
- Explain the purpose of Domain-based VPNs
- Describe situations where externally managed certificate authentication is used.
- Describe how client security can be provided by Remote Access.
- Discuss the Mobile Access Software Blade.
- Define performance tuning solutions and basic configuration workflow.
- Identify supported upgrade methods and procedures for Security Gateways.
Exercises
- Navigate the Environment and Use the Management API
- Deploy Secondary Security Management Server
- Configure a Dedicated Log Server
- Deploy SmartEvent
- Configure a High Availability Security Gateway Cluster
- Work with ClusterXL
- Configure Dynamic and Updateable Objects
- Verify Accelerated Policy Installation and Monitoring Status
- Elevate Security with HTTPS Inspection
- Deploy Identity Awareness
- Customize Threat Prevention
- Configure a Site-to-Site VPN with an Interoperable Device
- Deploy Remote Access VPN
- Configure Mobile Access VPN
- Monitor Policy Compliance
- Report SmartEvent Statistics
- Tune Security Gateway Performance
|
$5000.00
|
5 Days Course |

