Network-Security-Abhiraksha.com
Network Security

Course Overview

We live in an age where technology is constantly changing and cyber threats are becoming harder to detect. Today unknown attacks too are rising in the count of thousands everyday and attacking every size of the organization. 

Organizations look up to best of the breed technologies and products to protect missing critical IT infrastructure on which  every business operations relies heavily.

Next Generation Firewall solution from Check Point do not need any introduction. From last 20 Years Check Point Firewall has retained the leader position in Gartner Magic Quadrant.

Check Point has also earned the highest security effectiveness score in NSS Labs’ second Breach Prevention Systems (BPS) Group Test. NSS Labs tested Check Point’s Next Generation Firewall Security Gateway, Threat Prevention and Advanced Endpoint Security, earning the solution a “Recommended” rating for its security effectiveness and TCO per protected Mbps. The rating further validates Check Point’s ongoing ability to protect organizations by preventing the most advanced cyber attacks.

Check Point Firewall is the leader and holds market share too. Organizations invest heavily to protect their environment but rely on trained and skilled resources to install, monitor and manage Check Point Firewall Next Generation Threat Prevention Firewall.

Check Point Certifications mean expertise with the technology that secures the internet for all Fortune and Global 100 companies.

With this Check Point Cyber Security Administrator training program you will gain the skills to install, configure, manage and support Check Point Next Generation Threat Prevention Firewall.

COURSE TOPICS

  • Introduction to Check Point Technology
  • Check Point Security Policy Management
  • Security Policy Layers
  • Check Point Security Solutions and Licensing
  • Traffic Visibility
  • Basic Concepts of VPN
  • Managing User Access
  • Working with ClusterXL
  • Administrator Task Implementation

Prerequisites for participation

  • General knowledge of TCP/IP and Internet fundamentals.
  • Network communication & unix command line syntax.

COURSE OBJECTIVES

  1. Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic.
  2. Describe the key elements of Check Point’s unified Security Management Architecture.
  3. Recognize SmartConsole features, functions and tools.
  4. Understand Check Point deployment options.
  5. Describe the basic functions of Gaia.
  6. Describe the essential elements of a Security Policy.
  7. Understand how traffic inspection takes place in a unified Security Policy.
  8. Summarize how administration roles and permissions assist in managing policy.
  9. Recall how to implement backup techniques.
  10. Understand the Check Point policy layer concept.
  11. Recognize Check Point security solutions and products and how they work to protect your network.
  12. Understand licensing and contract requirements for Check Point security products.
  13. Identify tools designed to monitor data, determine threats and recognize performance improvements.
  14. Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.
  15. Understand Site-to-Site and Remote Access VPN deployments and communities.
  16. Understand how to analyze and interpret VPN traffic.
  17. Recognize how to define users and user groups.
  18. Understand how to manage user access for internal  and external users.
  19. Understand the basic concepts of ClusterXL technology and its advantages.Understand how to perform periodic administrator tasks as specified in administrator job descriptions.

Practical Hands-On Experience

  • Learn Check Point Gaia Portal operations.
  • Modifying an existing security policy.
  • How to configure hide and static NAT.
  • Roles of Firewall and Smartcenter administrator access.
  • Installing and Managing a Remote Security Gateway.
  • Performing and Configuration backups.
  • Defining Access Control Policy Layers
  • Defining and Sharing Security Policy Layers
  • Understand licenses and contracts
  • Working with Check Point traffic detection Logs
  • Maintaining Check Point Logs
  • How to setup Site-to-Site IPSEC VPN.
  • Providing User Access
  • Working with Cluster XL for High Availability
  • Verifying Network Compliance
  • Working with CP View for troubleshooting.
Related Training

Information Security Management System ISMS

Information Security Management System (ISMS)

Implementer Professional for BS ISO/ IEC 27001:2013 Information Security Management System (ISMS)The International Organization for Standardization (ISO) is a global body that collects and manages various standards for different disciplines. The ISO 27001 standard is designed to function as a ...
Read More
Ethical-Hacking

Penetration Testing and Ethical Hacking

Course Overview Ethical hacking involves penetration testing where trained or experienced professionals attempt to penetrate a IT network or computer system as a service to the owner of the system to find security vulnerabilities which a hacker may be able ...
Read More
Network-Security-Abhiraksha.com

Network Security With Checkpoint Firewall

Course Overview We live in an age where technology is constantly changing and cyber threats are becoming harder to detect. Today unknown attacks too are rising in the count of thousands everyday and attacking every size of the organization. Organizations ...
Read More
System Protection - Abhiraksha.com

System Protection From Malwares

Course Duration - 18 hoursOur System Security training program will provide in-depth learning of protecting endpoint systems (desktop, laptop & server) with McAfee Endpoint security software from malware attacks.This course provides an in-depth understanding of the tasks crucial to set ...
Read More
Security Analyst - Abhiraksha.com

Security Analyst

Cybersecurity Analyst is one of the high demand job roles by the reputed organizations for their security positions.Course OverviewA security analyst is a member of network security operations team  and is responsible to monitor as well as perform cyber incident  ...
Read More

Network Access Control

Organizations and individuals today are surrounded by devices from laptops, smartphones and tablets to servers, virtual instances, IoT devices and industrial systems of all kinds. Unknown, Unprotected and Vulnerable systems as well as devices significantly expand your attack surface. Organizations today ...
Read More
Data Protection - Abhiraksha.com

Data Protection

Course OverviewThis course provides in-depth training to design, implement,configure, and use Endpoint Data Loss Prevention in order to protect business confidential data from intentional or unintentional leakage. We will discuss and explain how to monitor day-to-day end-user data transfer actions, ...
Read More

IT and Cybersecurity Fundamentals

Course Overview This course helps to learn information technology fundamentals which are outlined below and creates a broader understanding of IT concepts making it ideal for non-technical professionals such as beginners in this domain whether passed from school or graduated ...
Read More