Check Point Security Administrator R70/R71

PT8109
Training Summary
In this foundation course for Check Point's Security Management Systems, Security Gateway Systems, and deployment platforms, you will learn the basic concepts and skills necessary to configure Check Point Software Blades, including Firewall, IPSec VPN, IPS, Network Policy Management, Logging and Status, Monitoring, URL Filtering, Antivirus and Anti-Malware, and Anti-Spam and Email Security. During this course, you will configure a Security Policy, secure communications across the Internet, defend against network threats, and learn about managing and monitoring a secure network.
Prerequisites
Students should have one to two years experience with networking and networking security.
Duration
5 1/2 Days/Lecture & Lab
Audience
This course is designed for experienced networking and security engineers.
Course Topics
  • Design and install version R70 in a distributed environment
  • Perform a backup and restore the current installation
  • Identify critical files
  • Deploy gateways
  • Create and configure network, host, and gateway objects
  • Verify SIC establishment
  • Create a basic Rule Base
  • Configure NAT rules
  • Evaluate existing policies and optimize rules
  • Ensure seamless upgrades and minimal downtime
  • Use queries to monitor IPS and common network traffic and troubleshoot events
  • Generate reports, troubleshoot system and security issues, and ensure network functionality
  • Configure alerts and traffic counters, monitor suspicious activity, analyze tunnel activity and monitor remote user access
  • Apply upgrade packages
  • Attach product licenses
  • Perform a pre-installation compatibility assessment
  • Centrally manage users and manage users' access using external databases
  • Configure a pre-shared secret site-to-site VPN
  • Configure a certificate-based site-to-site VPN using an internal CA or a third-party CA
  • Configure permanent tunnels for remote access
  • Configure VPN tunnel sharing
  • Configure a web-filtering and antivirus policy to filter and scan traffic
  • Implement default or customized profiles to designated gateways

Related Scheduled Courses