Save up to 50% on all Microsoft Courses : Use code : Micro50
Get 20% off on EC-Council, ISACA and Axelos Courses : Use code: Learning20
Buy 1st training of USD 2500 and above and get Excel/PowerPoint/word training Free : Use code: BOGO2020*Promo Terms
    • 18756 Stone Oak Park Way, Suite200, San Antonio TX 78258 USA
  • 100 Queen St W, Brampton, ON L6X 1A4, Canada
  • +1-800-961-0337
START DATE END DATE CLASS TIMINGS MODE Price LOCATION ACTION
For more details, please call us on +1800-961-0337 or email us on info@microteklearning.com

CCSA R77.30 Check Point Security Administration

Course Overview

Check Point Security Administration (R77.30 GAiA) furnishes you with a comprehension of the fundamental ideas and abilities important to design Check Point Security Gateway and Management Software Blades. Amid this course, you will arrange a Security Policy and find out about overseeing and observing a safe system, overhauling and designing a Security Gateway, and actualizing a virtual private system.

Understudies who need to help, introduce, convey or direct Check Point Software Blades, will take in the aptitudes important to work with Check Point Security Administration highlighting R77 GAiA:

Prologue to check point innovation

  • Sending stages

  • Prologue to the security arrangement

  • Checking activity and associations

  • Utilizing SmartUpdate

  • Client administration and confirmation

  • Personality mindfulness

  • Prologue to Check Point VPNs

CCSA R77.30 Check Point Security Administration

Course Outline

  1. Depict Check Point's brought together way to deal with arrange administration and its key components

  2. Outline an appropriated domain

  3. Introduce the Security Gateway in a disseminated domain

  4. Play out a reinforcement and reestablish the present Gateway establishment from the summon line

  5. Recognize basic documents expected to cleanse (or reinforcement), import and fare clients and gatherings, and include (or erase) directors from the charge line

  6. Send Gateways utilizing the Gaia web interface

  7. Make and arrange system, host, and portal objects

  8. Check SIC foundation between the Security Management Server and the Gateway utilizing SmartDashboard

  9. Make a basicRule Base in SmartDashboard that incorporates authorizations for managerial clients, outside administrations, and LAN outbound utilize

  10. Design NAT administers on Web and Gateway servers

  11. Assess existing strategies and improve the tenets in light of corporate prerequisites

  12. Keep up the Security Management Server with booked reinforcements and approach variants to guarantee consistent redesigns with negligible downtime

  13. Utilize Queries in SmartView Tracker to screen IPS and regular system movement and investigate occasions utilizing parcel information

  14. Utilize parcel information to create reports, investigate framework and security issues, and guarantee organize usefulness

  15. Utilizing SmartView Monitor, arrange cautions and movement counters, see a Gateway's status, screen suspicious action rules, investigate burrow action, and screen remote client get to

  16. Screen remote doors utilizing SmartUpdate to assess the requirement for overhauls, new establishments, and permit adjustments

  17. Utilize SmartUpdate to apply update bundles to single or numerous VPN-1Gateways

  18. Overhaul and append item licenses utilizing SmartUpdate

  19. Halfway oversee clients to guarantee just confirmed clients safely get to the corporate system either locally or remotely

  20. Oversee clients to get to the corporate LAN by utilizing outside databases

  21. Utilize Identity Awareness to give granula-level access to organize assets

  22. Get client data utilized by the Security Gateway to control get to

  23. Characterize get to parts for use in an Identity Awareness run the show

  24. Execute Identity Awareness in the Firewall Rule Base

  25. Design a pre-imparted mystery site-to-site VPN to accomplice destinations

  26. Design changeless passages for remote access to corporate assets

  27. Design VPN burrow sharing, given the contrast between have based, subunit-based, and door based passages

Hands On Labs

  1. Lab 1: Distributed Installations

  2. Lab 2: Stand-alone Security Gateway Installations

  3. Lab 3: Common Tools

  4. Lab 4: Building a Security Policy Lab 5: Configure the DMZ

  5. Lab 6: Configure NAT

  6. Lab 7: Monitor with SmartView Tracker Lab 8: Client Authentication

  7. Lab 9: Identity Awareness

  8. Lab 10: Site-to-Site VPN amongst corporate and branch office

Prerequisites

Before taking this course, it is suggested that students have the accompanying:

  • General learning of TCP/IP

  • Working learning of Windows, UNIX, organize innovation, and the Internet


Are you being sponsored by your employer to take this class?
 
Email
 
Contact No.
 
Message
 
 
  • *I authorize Microtek Learning to contact me via Phone/Email