• 18756 Stone Oak Park Way, Suite200, San Antonio TX 78258 USA
  • 100 Queen St W, Brampton, ON L6X 1A4, Canada
  • +1-800-961-0337
START DATE END DATE CLASS TIMINGS MODE Price LOCATION ACTION

CCSE R80.20 Check Point Cyber Security Engineering Certification Course Overview

Course Overview

The objective of this course is to give a comprehension and aptitudes important to design and ideally oversee Check Point Next Generation Firewalls.

CCSE R80.20 Check Point Cyber Security Engineering Course Outline

Course Outline

  • Distinguish propelled CLI charges.

  • Comprehend framework administration methodology, including how to perform framework overhauls and apply patches and hotfixes.

  • Portray the Check Point Firewall foundation.

  • Portray propelled techniques for social affair essential entryway information utilizing CPView and CPInfo.

  • Perceive how Check Point?s adaptable API design bolsters mechanization and coordination.

  • Talk about cutting edge ClusterXL capacities.

  • Portray VRRP organize excess focal points.

  • Undersand how SecureXL quickening innovation is utilized to upgrade and enhance execution.

  • See how CoreXL quickening innovation is utilized to upgrade and enhance execution.

  • Distinguish the SmartEvent segments that store arrange movement logs and recognize occasions.

  • Talk about the SmartEvent procedure that figures out which arrange exercises may prompt security issues.

  • See how SmartEvent can help with distinguishing, remediating, and averting security dangers.

  • Talk about the Mobile Access Software Blace and how it secures correspondence and information.

  • Comprehend Mobile Access arrangement alternatives.

  • Perceive Check Point Remote Access arrangements.

  • Talk about Check Point Capsule parts and how they secure cell phones and business reports.

  • Talk about diferent Check Point Solutions for assaults, for example, zero-day and Advanced Persistent Threats.

  • See how SandBlast, Threat Emulation, and Threat Extraction avoid security occurrences.

  • Recognize how Check Point Mobile Threat Prevention can help secure information got to on organization issued cell phones and tablets.

Lab Exercises Include:

  • Overhauling a Security Management Server to R80.10

  • Applying Check Point Hotfixes

  • Designing a New Security Gateway Cluster

  • Center CLI Elements of Firewall Administration

  • Designing Manual Network Address Translation

  • Overseeing Objects Using the Check Point API

  • Empowering Check Point VRRP

  • Conveying a Secondary Security Management Server

  • Review the Chain Modules

  • Working with SecureXL

  • Working with CoreXL

  • Assessing Threats with SmartEvent

  • Overseeing Mobile Access

  • Understanding IPS Protections

  • Conveying IPS Geo Protection

  • Auditing Threat Prevention Settings and Protections

  • Conveying Threat Emulation and Threat Extraction

Prerequisites

Preceding taking this course, it is suggested that students have the accompanying:

  • CCSA preparing/confirmation

  • Working information of Windows, UNIX, organizing, TCP/IP, and the Internet


Are you being sponsored by your employer to take this class?
 
Email
 
Contact No.
 
Message
 
 
  • *I authorize Microtek Learning to contact me via Phone/Email