logo

Check Point Course

course overview

Click to View dates & book now

Overview

This 5 day bundle course covers the following two Check Point training courses:

Check Point Certified Security Expert (CCSE) R81.10 - 3 days

and

Check Point Certified Troubleshooting Expert (CCTE) R81.10 - 2 days

This advanced CCSE part of the course (Monday to Wednesday) teaches how to build, modify, deploy and troubleshoot Check Point Security Systems on the GAiA operating system. Hands-on lab exercises teach how to debug firewall processes, optimize VPN performance and upgrade Management Servers.

The CCTE of the course (Thursday to Friday) provides advanced troubleshooting skills to investigate and resolve more complex issues that may occur while managing your Check Point Security environment. 

Audience

Technical professionals who perform advanced deployment configurations of Check Point products. Security experts and Check Point resellers who desire to obtain the necessary knowledge required to perform more advanced troubleshooting skills while managing their security environments. 


Skills Gained

CCSE:

• Articulate Gaia system management procedures

• Explain how to perform database migration procedures

• Articulate the purpose and function of Management High Availability

• Describe how to use Check Point API tools to perform management functions

• Articulate an understanding of Security Gateway cluster upgrade methods

• Discuss the process of Stateful Traffic inspection

• Articulate an understanding of the Check Point Firewall processes and debug procedures

• Describe advanced ClusterXL functions and deployment options

• Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance

• Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance

• Articulate how utilizing multiple traffic queues can make traffic handling more efficient

• Describe different Check Point Threat Prevention solutions for network attacks

• Explain how SandBlast, Threat Emulation, and Threat Extraction help to prevent security incidents

• Recognize alternative Check Point Site-to-Site deployment options

• Recognize Check Point Remote Access solutions and how they differ from each other

• Describe Mobile Access deployment options

CCTE:

• Understand how to use Check Point diagnostic tools to determine the status of a network. 

• Understand how to use network packet analyzers and packet capturing tools to evaluate network traffic. 

• Become familiar with more advanced Linux system commands. 

• Obtain a deeper knowledge of the Security Management architecture. 

• Understand how the Management database is structured and how objects are represented in the database. 

• Understand key Security Management Server processes and their debugs. 

• Understand how GuiDBedit operates. 

• Understand how the kernel handles traffic and how to troubleshoot issues with chain modules. 

• Understand how to use the two main procedures for debugging the Firewall kernel and how they differ. 

• Recognize User mode processes and how to interpret their debugs. 

• Discuss how to enable and use core dumps. 

• Understand the processes and components used for policy installs and processing packets in Access Control policies. 

• Understand how to troubleshoot and debug issues that may occur with App Control and URLF. 

• Understand how to debug HTTPS Inspection-related issues. 

• Understand how to troubleshoot and debug Content Awareness issues. 

• Understand how IPS works and how to manage performance issues. 

• Understand how to troubleshoot Anti-Bot and Antivirus. 

• Recognize how to troubleshoot and debug Site-to-Site VPNrelated issues. 

• Understand how to troubleshoot and debug Remote Access VPNs. 

• Understand how troubleshoot Mobile Access VPN issues. 

• Recognize how to use SecureXL features and commands to enable and disable accelerated traffic. 

• Understand how the server hardware and operating system affects the performance of Security Gateways. 

• Understand how to evaluate hardware configurations for optimal performance.

Prerequisites

CCSA training and/or certification with a working knowledge of Windows and/or UNIX, networking technology, the Internet and TCP/IP, and advanced knowledge of Check Point Security products.

Outline

What is Check Point? Check Point are global providers of IT network and information security solutions, providing customers with robust protection against all types of threats, reduces security complexity and lowers total cost of ownership.

Best known for its FireWall-1 product, Check Point have hardware and software products covering all aspects of IT network, endpoint and data security including the popular NGX, Pointsec, VPN, VSX, R70 and R71 products.

Check Point training and certification courses ensure that IT professionals have up to date security skills, included within our training course portfolio are the Check Point Certified Security Administrator (CCSA) and the Check Point Certified Security Expert (CCSE) certifications all designed to give delegates immediate recognition of their experience, knowledge and abilities within the security arena.

Talk to an expert

Thinking about Onsite?

If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. Its a cost effective option. One on one training can be delivered too, at reasonable rates.

Submit an enquiry from any page on this site and let us know you are interested in the requirements box, or simply mention it when we contact you.

All $ prices are in USD unless it’s a NZ or AU date

SPVC = Self Paced Virtual Class

LVC = Live Virtual Class

Please Note: All courses are availaible as Live Virtual Classes

Trusted by over 1/2 million students in 15 countries

Our clients have included prestigious national organisations such as Oxford University Press, multi-national private corporations such as JP Morgan and HSBC, as well as public sector institutions such as the Department of Defence and the Department of Health.