0(0)

CheckPoint CCSA R80.10 [2020]

25.00

Description

The following course includes lectures on how CheckPoint features work and the walk-through of the configuration in the lab/production environment.

Introduction to CheckPoint Technology

  • Building the Lab
  • Installing OS / Configuration
  • Overview of the products
  • Checkpoint Stateful inspection firewall
  • Licensing

CheckPoint Eco System

  • SIC
  • !Restarting SIC without CPstop/CPstart – Extra!
  • Backups
  • NAT
  • Policy configuration (Access Control) Firewall
  • Policy configuration (Access Control) APP control/URL filtering
  • UserCheck
  • Policy configuration (Threat Prevention)
  • Hacking and Protecting by IPS
  • Enforced Suspicious Activity Rules
  • Logging and Reports

VPN (Virtual Private Network)

  • IPSec (Overview)
  • SSL (Overview)
  • Deploy VPN IPSEC [LAB]

ClusterXL

  • High Availability / Load Sharing
  • Deploy ClusterXL [LAB]
  • CCP Overview

HTTPS Inspection

  • HTTPs inspection
  • HTTPs inspection LAB

CCSE Pre-course (Advanced)  [This section will be updated incrementally]

  • Threat Emulation licensing and deployment in the cloud
  • Transparent Upgrade to R80.30 in a cluster

Bonus: Lab guides included

What Will I Learn?

  • CheckPoint General Knowledge
  • Setting up a cluster
  • Threat Prevention policy Management
  • Access Control policy Management
  • VPN
  • HTTPs inspection
  • Ipsec

Topics for this course

36 Lessons

Section 1: Introduction to the technology [Lecture]

1. Introduction8:41
2. History10:06
3. Introduction to Check Point Technology21:01

Section 2: Introduction to the technology [LAB]

Section 3: Check Point Ecosystem [Lecture]

Section 4: Check Point Ecosystem [LAB]

Section 5: VPN IPSEC and SSL [Lecture]

Section 6: ClusterXL [Lecture]

Section 7: ClusterXL [LAB]

Section 8: HTTPs Inspection [Lecture and LAB]

Section 9: CCSE Pre-course (Advanced)

About the instructors

Arkadiusz Włodarczyk

0 ratings (0 )
23 Courses
5 students

Share

Course Details

Requirements

  • General knowledge of TCP/IP
  • Working knowledge of Windows and/or UNIX
  • Working knowledge of networking technology
  • Working knowledge of the Internet

Target Audience

  • System Administrators
  • Information Security Analysts
  • Support Analysts
  • Network Engineers
  • Firewall Enthusiasts
  • Security Engineers