18756 Stone Oak Park Way, Suite200, San Antonio TX 78258 USA
100 Queen St W, Brampton, ON L6X 1A4, Canada
country flagUnited States
share button

CCSM R80.20 Check Point Security Master Training


What CCSM R80.20 Check Point Security Master training is all about?

CCSM R80.20 Check Point Security Master Training is an advanced technical course that requires three days for completion. It updates you on the usage of advanced commands for proper configuration and troubleshooting the Check Point Security systems. Microtek Learning interactive training course's prime objectives include Advanced Database Management, Kernel Mode and User Mode Troubleshooting, Smart console and Policy Management, VPN Troubleshooting, and advanced network address translation. Other purposes of this technical training are troubleshooting access control policies, optimization, and tuning, troubleshooting threat prevention policies, advanced clustering, and IPv6.

CCSM R80.20 Check Point Security Master Training course is undoubtedly useful in gaining corporate success for Security Engineers, System Administrators, and Network Engineers. This course can also help R80 CCSEs who are looking to get certification for R77 CCSMs. Any other aspirants who wants to learn advanced skills for troubleshooting and configuration of Check Point Security Gateway with Management Software Blades can also enroll in this course. It is a perfect training program for those who desire to get a know-how of advanced skills and manage virtual security under high-end networks and techniques for security optimization.

Schedule
  • Delivery Format:
Date: Sep 09, 2020 | 10:00 am - 6:00 pm EST
Location: Online
$3000 USD
What are the course objectives for CCSM R80.20 Check Point Security Master training?
  • Tuning and Optimizing.
  • Troubleshooting User Mode and Kernel Mode.
  • Threat Prevention Policies.
  • Acceleration Debugging & Advanced Clustering.
  • VPN Troubleshooting & IPv6.
  • Policy Management & SmartConsole.
  • Network Address Translation & other advancements.
Who should attend CCSM R80.20 Check Point Security Master training?

The primary audience for this course are System Administrators, R80 CCSEs and Security Engineers. Additionally, partners and customers who are seeking to learn advanced troubleshoots can enrol in this training. Professionals who are skilled in management software blades can sign up for this Master training.

What is the course outline for CCSM R80.20 Check Point Security Master training?
  • 1. Obtain a deeper knowledge of the Security Management Architecture.
  • 2. Understand how the Security Management Server uses key processes and debugs.
  • 3. Review how objects are represented in the database.
  • 4. Understand how GuiDBedit operates.
  • 5. Understand how to use fw monitor to capture packets.
  • 6. Discuss how to enable and use core dumps when a User mode process crashes.
  • 7. Understand how to troubleshoot and debug SmartConsole issues.
  • 8. Understand how to troubleshoot and debug NAT issues using Gaia commands.
  • 9. Understand Client Side and Server Side NAT.
  • 10. Describe how to configure port mapping services.
  • 11. Recognize how to debug VPN-related issues.
  • 12. Understand how to debug HTTPS Inspection related issues.
  • 13. Understand how to troubleshoot and debug Content Awareness issues.
  • 14. Understand how to troubleshoot Anti-Bot and Antivirus issues.
  • 15. Discuss how to use IPS Bypass to manage performance issues.
  • 16. Understand how to configure IPS to reduce false positives.
  • 17. Understand how to evaluate hardware configurations for optimal performance.
  • 18. Discover additional tools to assist in monitoring CPU utilization.
  • 19. Understand how to monitor cluster status and work with critical devices.
  • 20. Recognize how to use fwaccel and sim to enable and disable accelerated traffic.
  • 21. Understand how to configure CoreXL to enhance Security Gateway performance.
  • 22. Understand how to deploy IPv6 in a local environment
  • 23. Lab Exercises Include:
  • a). Perform Solr database queries and review the results.
  • b). Use debug files to troubleshoot SmartConsole.
  • c). Use debug commands to explore common management issues.
  • d). Demonstrate how to troubleshoot two methods of Automatic NAT.
  • e). Demonstrate how to manually configure NAT.
  • f). Configure port mapping of services as an alternative to performing NAT.
  • g). Use vpn debug tools to identify issues that may have occurred during encryption
  • h). Manipulate IPS settings to enhance performance and reduce false positives.
  • i). Evaluate network security conditions using the Check Point CheckMe tool.
  • j). Use policy settings to improve performance of Security Gateways.
  • k). Tune the Security Policy for improved Security Gateway performance
  • l). Evaluate the Security Gateway cluster conditions by examining the debug files.
  • m). Demonstrate how to manage connections in a clustered environment.
  • n). Demonstrate how to debug Security Management Server synchronization
  • o). Demonstrate how to identify the cause of acceleration related issues.
  • p). Demonstrate how to configure advanced CoreXL settings
  • q). Define and test communication in an IPv6 environment