Virtual Live Training
Class is guaranteed to Run
|START DATE||END DATE||CLASS TIMINGS||MODE||Price||LOCATION||ACTION|
The objective of this course is to give a comprehension of fundamental ideas and aptitudes important to design Check Point Security Gateway and Management Software Blades.
nterpret the idea of a Firewall and comprehend the instruments utilized for controlling system activity.
Depict the key components of Check Point?s bound together Security Management Architecture.
Perceive SmartConsole highlights, capacities and instruments.
Comprehend Check Point sending choices.
Portray the fundamental elements of Gaia.
Portray the basic components of a Security Policy.
See how activity investigation happens in a brought together Security Policy.
Outline how organization parts and consents help with overseeing strategy.
Review how to actualize reinforcement methods.
Comprehend the Check Point approach layer idea.
Perceive Check Point security arrangements and items and how they function to ensure your system.
Comprehend permitting and contract necessities for Check Point security items.
Distinguish apparatuses intended to screen information, decide dangers and perceive execution enhancements.
Recognize apparatuses intended to react rapidly and effectively to changes in doors, burrows, remote clients, movement stream designs, and different exercises.
Comprehend Site-to-Site and Remote Access VPN arrangements and groups.
See how to break down and translate VPN movement.
Perceive how to characterize clients and client gatherings.
See how to oversee client access for inside and outer clients.
Comprehend the essential ideas of ClusterXL innovation and its favorable circumstances.
See how to perform intermittent director errands as indicated in overseer sets of responsibilities.
Lab Exercises Include:
Working with Gaia Portal
Altering an Existing Security Policy
Arranging Hide and Static NAT
Overseeing Administrator Access
Introducing and Managing a Remote Security Gateway
Characterizing Access Control Policy Layers Defining and Sharing Security Policy Layers
Working with Licenses and Contracts
Working with Check Point Logs
Keeping up Check Point Logs
Arranging a Site-to-Site VPN
Giving User Access
Working with Cluster XL
Confirming Network Compliance
Working with CP View
Before taking this course, it is prescribed that students have the accompanying:
General information of TCP/IP
Working information of Windows or potentially UNIX
Working information of system innovation
Working information of the Internet