Virtual Live Training
Class is guaranteed to Run
|START DATE||END DATE||CLASS TIMINGS||MODE||Price||LOCATION||ACTION|
The objective of this course is to give a comprehension and aptitudes important to design and ideally oversee Check Point Next Generation Firewalls.
Distinguish propelled CLI charges.
Comprehend framework administration methodology, including how to perform framework overhauls and apply patches and hotfixes.
Portray the Check Point Firewall foundation.
Portray propelled techniques for social affair essential entryway information utilizing CPView and CPInfo.
Perceive how Check Point?s adaptable API design bolsters mechanization and coordination.
Talk about cutting edge ClusterXL capacities.
Portray VRRP organize excess focal points.
Undersand how SecureXL quickening innovation is utilized to upgrade and enhance execution.
See how CoreXL quickening innovation is utilized to upgrade and enhance execution.
Distinguish the SmartEvent segments that store arrange movement logs and recognize occasions.
Talk about the SmartEvent procedure that figures out which arrange exercises may prompt security issues.
See how SmartEvent can help with distinguishing, remediating, and averting security dangers.
Talk about the Mobile Access Software Blace and how it secures correspondence and information.
Comprehend Mobile Access arrangement alternatives.
Perceive Check Point Remote Access arrangements.
Talk about Check Point Capsule parts and how they secure cell phones and business reports.
Talk about diferent Check Point Solutions for assaults, for example, zero-day and Advanced Persistent Threats.
See how SandBlast, Threat Emulation, and Threat Extraction avoid security occurrences.
Recognize how Check Point Mobile Threat Prevention can help secure information got to on organization issued cell phones and tablets.
Lab Exercises Include:
Overhauling a Security Management Server to R80.10
Applying Check Point Hotfixes
Designing a New Security Gateway Cluster
Center CLI Elements of Firewall Administration
Designing Manual Network Address Translation
Overseeing Objects Using the Check Point API
Empowering Check Point VRRP
Conveying a Secondary Security Management Server
Review the Chain Modules
Working with SecureXL
Working with CoreXL
Assessing Threats with SmartEvent
Overseeing Mobile Access
Understanding IPS Protections
Conveying IPS Geo Protection
Auditing Threat Prevention Settings and Protections
Conveying Threat Emulation and Threat Extraction
Preceding taking this course, it is suggested that students have the accompanying:
Working information of Windows, UNIX, organizing, TCP/IP, and the Internet