:
- Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic.
- Describe the key elements of Check Point?s unified Security Management Architecture.
- Recognize SmartConsole features, functions and tools.
- Understand Check Point deployment options.
- Describe the basic functions of Gaia.
- Describe the essential elements of a Security Policy.
- Understand how traffic inspection takes place in a unified Security Policy.
- Summarize how administration roles and permissions assist in managing policy.
- Recall how to implement backup techniques.
- Understand the Check Point policy layer concept.
- Recognize Check Point security solutions and products and how they work to protect your network.
- Understand licensing and contract requirements for Check Point security products.
- Identify tools designed to monitor data, determine threats and recognize performance improvements.
- Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.
- Understand Site-to-Site and Remote Access VPN deployments and communities.
- Understand how to analyze and interpret VPN traffic.
- Recognize how to define users and user groups.
- Understand how to manage user access for internal and external users.
- Understand the basic concepts of ClusterXL technology and its advantages.
- Understand how to perform periodic administrator tasks as specified in administrator job descriptions.
Interpret the concept of a Firewall and understand the Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic. mechanisms used for controlling network traffic.
Describe the key elements of Check Point?s unified Describe the key elements of Check Point?s unified Security Management Architecture. Security Management Architecture.
Recognize SmartConsole features, functions and tools. Recognize SmartConsole features, functions and tools.
Understand Check Point deployment options. Understand Check Point deployment options.
Describe the basic functions of Gaia. Describe the basic functions of Gaia.
Describe the essential elements of a Security Policy. Describe the essential elements of a Security Policy.
Understand how traffic inspection takes place in a Understand how traffic inspection takes place in a unified Security Policy. unified Security Policy.
Summarize how administration roles and permissions Summarize how administration roles and permissions assist in managing policy. assist in managing policy.
Recall how to implement backup techniques. Recall how to implement backup techniques.
Understand the Check Point policy layer concept. Understand the Check Point policy layer concept.
Recognize Check Point security solutions and products Recognize Check Point security solutions and products and how they work to protect your network. and how they work to protect your network.
Understand licensing and contract requirements for Understand licensing and contract requirements for Check Point security products. Check Point security products.
Identify tools designed to monitor data, determine Identify tools designed to monitor data, determine threats and recognize performance improvements. threats and recognize performance improvements.
Identify tools designed to respond quickly and Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities. users, traffic flow patterns, and other activities.
Understand Site-to-Site and Remote Access VPN Understand Site-to-Site and Remote Access VPN deployments and communities. deployments and communities.
Understand how to analyze and interpret VPN traffic. Understand how to analyze and interpret VPN traffic.
Recognize how to define users and user groups. Recognize how to define users and user groups.
Understand how to manage user access for internal Understand how to manage user access for internal and external users. and external users.
Understand the basic concepts of ClusterXL Understand the basic concepts of ClusterXL technology and its advantages. technology and its advantages.
Understand how to perform periodic administrator tasks Understand how to perform periodic administrator tasks as specified in administrator job descriptions. as specified in administrator job descriptions. Lab exercises: Lab exercises: Lab exercises: Lab exercises: Lab exercises:
- Working with Gaia Portal
- Modifying an Existing Security Policy
- Configuring Hide and Static NAT
- Managing Administrator Access
- Installing and Managing a Remote Security Gateway
- Managing Backups
- Defining Access Control Policy Layers
- Defining and Sharing Security Policy Layers
- Working with Licenses and Contracts
- Working with Check Point Logs
- Maintaining Check Point Logs
- Configuring a Site-to-Site VPN
- Providing User Access
- Working with Cluster XL
- Verifying Network Compliance
- Working with CP View
Working with Gaia Portal Working with Gaia Portal
Modifying an Existing Security Policy Modifying an Existing Security Policy
Configuring Hide and Static NAT Configuring Hide and Static NAT
Managing Administrator Access Managing Administrator Access
Installing and Managing a Remote Security Gateway Installing and Managing a Remote Security Gateway
Managing Backups Managing Backups
Defining Access Control Policy Layers Defining Access Control Policy Layers
Defining and Sharing Security Policy Layers Defining and Sharing Security Policy Layers
Working with Licenses and Contracts Working with Licenses and Contracts
Working with Check Point Logs Working with Check Point Logs
Maintaining Check Point Logs Maintaining Check Point Logs
Configuring a Site-to-Site VPN Configuring a Site-to-Site VPN
Providing User Access Providing User Access
Working with Cluster XL Working with Cluster XL
Verifying Network Compliance Verifying Network Compliance
Working with CP View Working with CP View