• Identify online resources for Check Point security products and solutions.
• Demonstrate understanding of capture packet technologies.
• Demonstrate understanding of Firewall chain modules, Kernel and User Mode, and Kernel and User Space.
• Use Linux and Check Point utilities to review processes and system information.
• Troubleshoot log collection issues and interrupted communications.
• Monitor network activity and traffic flow.
• Demonstrate understanding of Check Point SmartConsole and Policy installation.
• Investigate and troubleshoot issues with Check Point SmartConsole and Policy installation.
• Demonstrate understanding of Check Point Identity Awareness.
• Investigate and troubleshoot issues with Check Point Identity Awareness.
• Demonstrate understanding of Check Point Application Control and URL Filtering.
• Investigate and troubleshoot issues with Check Point Application Control and URL Filtering.
• Demonstrate understanding of Check Point Network Address Translation.
• Investigate and troubleshoot issues with Check Point Network Address Translation.
• Demonstrate understanding of Check Point Threat Prevention.
• Investigate and troubleshoot issues with Check Point Threat Prevention.
• Demonstrate understanding of Check Point licenses and contracts.
• Investigate and troubleshoot Check Point licenses and contracts.