Save up to 50% on all Microsoft Courses : Use code : Micro50
Get 20% off on EC-Council, ISACA and Axelos Courses : Use code: Learning20
Buy 1st training of USD 2500 and above and get Excel/PowerPoint/word training Free : Use code: BOGO2020*Promo Terms
    • 18756 Stone Oak Park Way, Suite200, San Antonio TX 78258 USA
  • 100 Queen St W, Brampton, ON L6X 1A4, Canada
  • +1-800-961-0337
START DATE END DATE CLASS TIMINGS MODE Price LOCATION ACTION
12/18/2019 12/20/2019
USD 3000 Live Online
01/08/2020 01/10/2020
USD 3000 Live Online
01/29/2020 01/31/2020
USD 3000 Live Online
02/12/2020 02/14/2020
USD 3000 Live Online
02/26/2020 02/28/2020
USD 3000 Live Online
03/11/2020 03/13/2020
USD 3000 Live Online
04/01/2020 04/03/2020
USD 3000 Live Online

CCSE R80.20 Check Point Cyber Security Engineering

Course Overview

The objective of this course is to give a comprehension and aptitudes important to design and ideally oversee Check Point Next Generation Firewalls.

CCSE R80.20 Check Point Cyber Security Engineering

Course Outline

  • Distinguish propelled CLI charges.

  • Comprehend framework administration methodology, including how to perform framework overhauls and apply patches and hotfixes.

  • Portray the Check Point Firewall foundation.

  • Portray propelled techniques for social affair essential entryway information utilizing CPView and CPInfo.

  • Perceive how Check Point?s adaptable API design bolsters mechanization and coordination.

  • Talk about cutting edge ClusterXL capacities.

  • Portray VRRP organize excess focal points.

  • Undersand how SecureXL quickening innovation is utilized to upgrade and enhance execution.

  • See how CoreXL quickening innovation is utilized to upgrade and enhance execution.

  • Distinguish the SmartEvent segments that store arrange movement logs and recognize occasions.

  • Talk about the SmartEvent procedure that figures out which arrange exercises may prompt security issues.

  • See how SmartEvent can help with distinguishing, remediating, and averting security dangers.

  • Talk about the Mobile Access Software Blace and how it secures correspondence and information.

  • Comprehend Mobile Access arrangement alternatives.

  • Perceive Check Point Remote Access arrangements.

  • Talk about Check Point Capsule parts and how they secure cell phones and business reports.

  • Talk about diferent Check Point Solutions for assaults, for example, zero-day and Advanced Persistent Threats.

  • See how SandBlast, Threat Emulation, and Threat Extraction avoid security occurrences.

  • Recognize how Check Point Mobile Threat Prevention can help secure information got to on organization issued cell phones and tablets.

Lab Exercises Include:

  • Overhauling a Security Management Server to R80.10

  • Applying Check Point Hotfixes

  • Designing a New Security Gateway Cluster

  • Center CLI Elements of Firewall Administration

  • Designing Manual Network Address Translation

  • Overseeing Objects Using the Check Point API

  • Empowering Check Point VRRP

  • Conveying a Secondary Security Management Server

  • Review the Chain Modules

  • Working with SecureXL

  • Working with CoreXL

  • Assessing Threats with SmartEvent

  • Overseeing Mobile Access

  • Understanding IPS Protections

  • Conveying IPS Geo Protection

  • Auditing Threat Prevention Settings and Protections

  • Conveying Threat Emulation and Threat Extraction

Prerequisites

Preceding taking this course, it is suggested that students have the accompanying:

  • CCSA preparing/confirmation

  • Working information of Windows, UNIX, organizing, TCP/IP, and the Internet


Are you being sponsored by your employer to take this class?
 
Email
 
Contact No.
 
Message
 
 
  • *I authorize Microtek Learning to contact me via Phone/Email