Check Point Certified Security Administrator (CCSA) R80 Blades 1

X

Student Registration Form

Thank you for being interested in our training! Fill out this form to pre-book or request information about the delivery options.

* Required

Course Schedule

I'd like to receive emails with the latest updates and promotions from Insoft.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.

Check Point Certified Security Administrator (CCSA) R80 Blades 1
  • Check Point Certified Security Administrator (CCSA) R80 Blades 1

    3 dienų kursas
    Check Point Courses

    Šie mokymai organizuojami tik kaip uždaras įmonės renginys, ne mažesnei nei 10-ties dalyvių grupei.

    Course Details

    Today, managing security is a complex endeavor. The key to managing this complexity is through security consolidation – bringing all security protections and functions under one umbrella. With R80 management, security consolidation is fully realized. This three-day course covers everything you need to start-up, configure and manage the daily operations of your Check Point infrastructure with R80.

    Turinys

    • Introduction to Check Point Technology
    • Security Policy Management
    • Check Point Security Solutions and Licensing
    • Traffic Visibility
    • Basic Concepts of VPN
    • Managing User Access
    • Working with ClusterXL
    • Administrator Task Implementation Unified Gateway

    Lab Exercises

    • Defining roles and users in Gaia Portal
    • Installing and navigating SmartConsole
    • Configuring objects, rules, and settings to define a Security Policy
    • Publishing database changes
    • Installing and managing a remote Security Gateway
    • Performing Hide and Static Network Address Translation
    • Configuring Application Control and URL filtering Access Control policy layers
    • Working with multiple concurrent Administrators and testing permissions profiles
    • Working with Check Point licenses
    • Viewing and maintaining logs
    • Configuring a Virtual Private Network
    • Providing User Access
    • Working with Check Point clustering
    • Producing Check Point reports

    Tikslinė auditorija

    • This course is recommended for technical professionals, who support, install, deploy or administer Check Point Software Blades.

    Tikslinė auditorija

    • General knowledge of TCP/IP
    • Working knowledge of Windows and/or UNIX, network technology and the Internet