Course outline: Validate your understanding and skills necessary to configure and optimally manage Check Point Next Generation Firewalls
Expert users and resellers who need to perform advanced deployment configurations of Check Point Software Blades.
:
Identify advanced CLI commands. Identify advanced CLI commands.
Understand system management procedures, including how to perform system upgrades and apply patches and hotfixes. Understand system management procedures, including how to perform system upgrades and apply patches and hotfixes.
Describe the Check Point Firewall infrastructure. Describe the Check Point Firewall infrastructure.
Describe advanced methods of gathering important gateway data using CPView and CPInfo. Describe advanced methods of gathering important gateway data using CPView and CPInfo.
Recognize how Check Point's flexible API architecture supports automation and orchestration. Recognize how Check Point's flexible API architecture supports automation and orchestration.
Discuss advanced ClusterXL functions. Discuss advanced ClusterXL functions.
Describe VRRP network redundancy advantages. Describe VRRP network redundancy advantages.
Undersand how SecureXL acceleration technology is used to enhance and improve performance. Undersand how SecureXL acceleration technology is used to enhance and improve performance.
Understand how CoreXL acceleration technology is used to enhance and improve performance. Understand how CoreXL acceleration technology is used to enhance and improve performance.
Identify the SmartEvent components that store network activity logs and identify events. Identify the SmartEvent components that store network activity logs and identify events.
Discuss the SmartEvent process that determines which network activities may lead to security issues. Discuss the SmartEvent process that determines which network activities may lead to security issues.
Understand how SmartEvent can assist in detecting, remediating, and preventing security threats. Understand how SmartEvent can assist in detecting, remediating, and preventing security threats.
Discuss the Mobile Access Software Blace and how it secures communication and data. Discuss the Mobile Access Software Blace and how it secures communication and data.
Understand Mobile Access deployment options. Understand Mobile Access deployment options.
Recognize Check Point Remote Access solutions. Recognize Check Point Remote Access solutions.
Discuss Check Point Capsule components and how they protect mobile devices and business documents. Discuss Check Point Capsule components and how they protect mobile devices and business documents.
Discuss diferent Check Point Solutions for attacks such as zero-day and Advanced Persistent Threats. Discuss diferent Check Point Solutions for attacks such as zero-day and Advanced Persistent Threats.
Understand how SandBlast, Threat Emulation, and Threat Extraction prevent security incidents. Understand how SandBlast, Threat Emulation, and Threat Extraction prevent security incidents.
Identify how Check Point Mobile Threat Prevention can help protect data accessed on company-issued smartphones and tablets. Identify how Check Point Mobile Threat Prevention can help protect data accessed on company-issued smartphones and tablets. Lab exercises: Lab exercises: Lab exercises: Lab exercises: Lab exercises:
Upgrading a Security Management Server to R80.10 Upgrading a Security Management Server to R80.10
Applying Check Point Hotfixes Applying Check Point Hotfixes
Configuring a New Security Gateway Cluster Configuring a New Security Gateway Cluster
Core CLI Elements of Firewall Administration Core CLI Elements of Firewall Administration
Configuring Manual Network Address Translation Configuring Manual Network Address Translation
Managing Objects Using the Check Point API Managing Objects Using the Check Point API
Enabling Check Point VRRP Enabling Check Point VRRP
Deploying a Secondary Security Management Server Deploying a Secondary Security Management Server
Viewing the Chain Modules Viewing the Chain Modules
Working with SecureXL Working with SecureXL
Working with CoreXL Working with CoreXL
Evaluating Threats with SmartEvent Evaluating Threats with SmartEvent
Managing Mobile Access Managing Mobile Access
Understanding IPS Protections Understanding IPS Protections
Deploying IPS Geo Protection Deploying IPS Geo Protection
Reviewing Threat Prevention Settings and Protections Reviewing Threat Prevention Settings and Protections
Deploying Threat Emulation and Threat Extraction Deploying Threat Emulation and Threat Extraction
:
: Check Point Security Administration training or equivalent knowledge and experience. Check Point Security Administration training or equivalent knowledge and experience. Check Point Security Administration training or equivalent knowledge and experience. Follow on course: Check Point Security Manager (CCSM) Follow on course: Follow on Follow on Follow on course: course: course: Check Point Security Manager (CCSM) Check Point Security Manager (CCSM) Check Point Security Manager (CCSM) Topics: Topics: Topics: Topics: Topics:
System Management System Management
Automation and Orchestration Automation and Orchestration
Redundancy Redundancy
Acceleration Acceleration
SmartEvent SmartEvent
Mobile and Remote Access Mobile and Remote Access
Threat Prevention Threat Prevention
:
Identify advanced CLI commands. Identify advanced CLI commands.
Understand system management procedures, including how to perform system upgrades and apply patches and hotfixes. Understand system management procedures, including how to perform system upgrades and apply patches and hotfixes.
Describe the Check Point Firewall infrastructure. Describe the Check Point Firewall infrastructure.
Describe advanced methods of gathering important gateway data using CPView and CPInfo. Describe advanced methods of gathering important gateway data using CPView and CPInfo.
Recognize how Check Point's flexible API architecture supports automation and orchestration. Recognize how Check Point's flexible API architecture supports automation and orchestration.
Discuss advanced ClusterXL functions. Discuss advanced ClusterXL functions.
Describe VRRP network redundancy advantages. Describe VRRP network redundancy advantages.
Undersand how SecureXL acceleration technology is used to enhance and improve performance. Undersand how SecureXL acceleration technology is used to enhance and improve performance.
Understand how CoreXL acceleration technology is used to enhance and improve performance. Understand how CoreXL acceleration technology is used to enhance and improve performance.
Identify the SmartEvent components that store network activity logs and identify events. Identify the SmartEvent components that store network activity logs and identify events.
Discuss the SmartEvent process that determines which network activities may lead to security issues. Discuss the SmartEvent process that determines which network activities may lead to security issues.
Understand how SmartEvent can assist in detecting, remediating, and preventing security threats. Understand how SmartEvent can assist in detecting, remediating, and preventing security threats.
Discuss the Mobile Access Software Blace and how it secures communication and data. Discuss the Mobile Access Software Blace and how it secures communication and data.
Understand Mobile Access deployment options. Understand Mobile Access deployment options.
Recognize Check Point Remote Access solutions. Recognize Check Point Remote Access solutions.
Discuss Check Point Capsule components and how they protect mobile devices and business documents. Discuss Check Point Capsule components and how they protect mobile devices and business documents.
Discuss diferent Check Point Solutions for attacks such as zero-day and Advanced Persistent Threats. Discuss diferent Check Point Solutions for attacks such as zero-day and Advanced Persistent Threats.
Understand how SandBlast, Threat Emulation, and Threat Extraction prevent security incidents. Understand how SandBlast, Threat Emulation, and Threat Extraction prevent security incidents.
Identify how Check Point Mobile Threat Prevention can help protect data accessed on company-issued smartphones and tablets. Identify how Check Point Mobile Threat Prevention can help protect data accessed on company-issued smartphones and tablets. Lab exercises: Lab exercises: Lab exercises: Lab exercises: Lab exercises:
Upgrading a Security Management Server to R80.10 Upgrading a Security Management Server to R80.10
Applying Check Point Hotfixes Applying Check Point Hotfixes
Configuring a New Security Gateway Cluster Configuring a New Security Gateway Cluster
Core CLI Elements of Firewall Administration Core CLI Elements of Firewall Administration
Configuring Manual Network Address Translation Configuring Manual Network Address Translation
Managing Objects Using the Check Point API Managing Objects Using the Check Point API
Enabling Check Point VRRP Enabling Check Point VRRP
Deploying a Secondary Security Management Server Deploying a Secondary Security Management Server
Viewing the Chain Modules Viewing the Chain Modules
Working with SecureXL Working with SecureXL
Working with CoreXL Working with CoreXL
Evaluating Threats with SmartEvent Evaluating Threats with SmartEvent
Managing Mobile Access Managing Mobile Access
Understanding IPS Protections Understanding IPS Protections
Deploying IPS Geo Protection Deploying IPS Geo Protection
Reviewing Threat Prevention Settings and Protections Reviewing Threat Prevention Settings and Protections
Deploying Threat Emulation and Threat Extraction Deploying Threat Emulation and Threat Extraction
Our clients have included prestigious national organisations such as Oxford University Press, multi-national private corporations such as JP Morgan and HSBC, as well as public sector institutions such as the Department of Defence and the Department of Health.