Description
This training will allow you to acquire all the techniques and methodologies necessary to take the exam to obtain CCSA R77 certification. You will learn how to set up a security policy, address translation (NAT) and the Intrusion Prevention System (IPS) module.
Who is this training for ?
For whom ?Technician, administrator and systems/networks/security engineer.
Prerequisites
Training objectives
Training program
- Introduction
- Check Point products.
- What's new in version R77.
- Operation and installation
- The architecture in distributed mode and in standalone mode.
- The management server.
- The SIC protocol.
- The commands backup and restoration.
- Presentation of the Gaïa system.
- Practical work Installation of Check Point R77.
- Implementation of a security policy
- Getting started with SmartConsole.
- Start and use SmartDashboard.
- Security policy.
- Managing rules.
- Practical work Installation of SmartConsole.
- Create objects.
- Create a security policy.
- Activate anti-spoofing.
- Address translation (NAT)
- Address translation rules.
- NAT "static" and NAT "hide".
- ARP management.
- Practical work Setting up automatic NAT of the "hide", "static" type and manual transaction rules.
- Monitoring and log management
- The log management policy.
- Track connections with SmartView Tracker.
- The SmartView Monitor, features and alert thresholds.
- Practical work Example of log management.
- Block intrusions with SAM (Suspicious Activity Monitor).
- R75 client authentication
- Identity Awareness.
- Application Control.
- Old authentication methods.
- Practical work Setup of Identity Awareness.
- Site-to-site VPN and nomadic VPN
- The architecture of the VPN.
- The basics of encryption.
- Introduction to IKE and IPSec.
- The certificate authority ( CA).
- The Domain-Based VPN.
- The SecureClient and the SSL Network Extender.
- Practical work Setting up a tunnel Site-to-site IPSec by preshared key and certificate.
- Configuring remote access with IPSec VPN and SSL VPN.
- The IPS module
- Presentation of IPS.
- Web Intelligence.
- Application Intelligence.
- IPS and IDS security profiles.
- Practical work Example of protection against vulnerabilities with the IPS module.