• 100 Queen St W, Brampton, ON L6X 1A4, Canada
  • +1-800-961-0337
START DATE END DATE CLASS TIMINGS MODE LOCATION ACTION
10/31/2018 11/02/2018
  • VLT
Live Online
11/28/2018 11/30/2018
  • VLT
Live Online
12/11/2018 12/13/2018
  • VLT
Live Online

CCSE R80.10 Check Point Cyber Security Engineering

Course Overview

The objective of this course is to give a comprehension and aptitudes important to design and ideally oversee Check Point Next Generation Firewalls.

CCSE R80.10 Check Point Cyber Security Engineering

Course Outline

  • Distinguish propelled CLI charges.
  • Comprehend framework administration methodology, including how to perform framework overhauls and apply patches and hotfixes.
  • Portray the Check Point Firewall foundation.
  • Portray propelled techniques for social affair essential entryway information utilizing CPView and CPInfo.
  • Perceive how Check Point?s adaptable API design bolsters mechanization and coordination.
  • Talk about cutting edge ClusterXL capacities.
  • Portray VRRP organize excess focal points.
  • Undersand how SecureXL quickening innovation is utilized to upgrade and enhance execution.
  • See how CoreXL quickening innovation is utilized to upgrade and enhance execution.
  • Distinguish the SmartEvent segments that store arrange movement logs and recognize occasions.
  • Talk about the SmartEvent procedure that figures out which arrange exercises may prompt security issues.
  • See how SmartEvent can help with distinguishing, remediating, and averting security dangers.
  • Talk about the Mobile Access Software Blace and how it secures correspondence and information.
  • Comprehend Mobile Access arrangement alternatives.
  • Perceive Check Point Remote Access arrangements.
  • Talk about Check Point Capsule parts and how they secure cell phones and business reports.
  • Talk about diferent Check Point Solutions for assaults, for example, zero-day and Advanced Persistent Threats.
  • See how SandBlast, Threat Emulation, and Threat Extraction avoid security occurrences.
  • Recognize how Check Point Mobile Threat Prevention can help secure information got to on organization issued cell phones and tablets.

Lab Exercises Include:

  • Overhauling a Security Management Server to R80.10
  • Applying Check Point Hotfixes
  • Designing a New Security Gateway Cluster
  • Center CLI Elements of Firewall Administration
  • Designing Manual Network Address Translation
  • Overseeing Objects Using the Check Point API
  • Empowering Check Point VRRP
  • Conveying a Secondary Security Management Server
  • Review the Chain Modules
  • Working with SecureXL
  • Working with CoreXL
  • Assessing Threats with SmartEvent
  • Overseeing Mobile Access
  • Understanding IPS Protections
  • Conveying IPS Geo Protection
  • Auditing Threat Prevention Settings and Protections
  • Conveying Threat Emulation and Threat Extraction

Prerequisites

Preceding taking this course, it is suggested that students have the accompanying:

  • CCSA preparing/confirmation
  • Working information of Windows, UNIX, organizing, TCP/IP, and the Internet

Awards