Check Point Firewall
Courses - Check Point Firewall
Check Point Security Administration R77.30
Check Point Security Administration R77 provides an understanding of the basic concepts and skills necessary toconfigure Check Point Security Gateway and Management Software Blades.
During this course you will configure a Security Policy and learn about managing and monitoring a secure network, upgrading and configuring a Security Gateway and implementing a virtual private network.
Duration: 15 Days
PREREQUISITES:
Persons attending this course should have general knowledge of TCP/IP, and working knowledge of Windows, UNIX, network technology and the internet.
Duration – 2 weeks
Network Fundamentals ( TCP/UDP/ cabling types)
COURSE OUTLINE:
Introduction to firewalls 1 Generation and 2nd Gne firewalls
Understanding 1 Generation firewalls
Understanding 2 Generation firewalls
Understanding 2nd Gen Firewalls and futures
Understanding UTM firewalls futures
Introduction to Checkpoint Technologies
What’s new in checkpoint R77.30
Checkpoint’s Architecture
Implementing 3 tier Architecture of checkpoint
Deployment Platforms
Checkpoint supported platforms
Installing Checkpoint on Windows o/s
Installing Checkpoint on GAiA
Configuring checkpoint in standard setup
Configuring checkpoint in distributed setup
Introduction to Security policy
Verify SIC establishment between the Security Management Server and the Gateway using Smart Dashboard
Creating a basic Rulebase
Implicit rules vs Explicit rules
Configuring hide NAT
Configuring Static NAT
Configuring PAT & Port Redirection
User management & Authentication
Configure user & group accounts in checkpoint
Configure policies for authentication
Local Authentication Methods
Configuring user authentication
Configuring Session authentication
Configuring Client Authentication
UTM Features
Configuring Antivirus blade in checkpoint gateway
Verifying Antivirus modules
Implementing content filtering
Configuring cvp & ufp policies
Configuring URL filtering
Testing URL filtering
Advance UTM Features
Java & ActiveX based attacks
Implementing Java & ActiveX blocking
Configuring Application control
Using smart event intro for analyzing application traffic
Checkpoint VPN Introduction
Understanding VPN terminology
Understanding IKEv2
Understanding Phase-1& Phase-2
Implementing site-to-site vpn with head office & Branch office
Monitoring
Using smart view tracker for Analysing logs
Using smartview Monitor for monitoring traffic
Using queries in smartview tracker
Filtering logs in smartview tracker
SMART UPDATE
- Monitor remote Gateways using Smart Update
- Manage New installations
- license modifications
- Upgrading
Checkpoint Gw’s & Management server using Smart update