Train together, save more! 10% off individual registration, 20% off for pairs.
×
Log in
Or create your account
You have just added to your selection
Your cart is empty, See our trainings

Description

This training will allow you to acquire all the techniques and methodologies necessary to take the exam to obtain CCSA R77 certification. You will learn how to set up a security policy, address translation (NAT) and the Intrusion Prevention System (IPS) module.

Who is this training for ?

For whom ?

Technician, administrator and systems/networks/security engineer.

Prerequisites

Training objectives

Training program

    • Check Point products.
    • What's new in version R77.
    • The architecture in distributed mode and in standalone mode.
    • The management server.
    • The SIC protocol.
    • The commands backup and restoration.
    • Presentation of the Gaïa system.
    • Practical work Installation of Check Point R77.
    • Getting started with SmartConsole.
    • Start and use SmartDashboard.
    • Security policy.
    • Managing rules.
    • Practical work Installation of SmartConsole.
    • Create objects.
    • Create a security policy.
    • Activate anti-spoofing.
    • Address translation rules.
    • NAT "static" and NAT "hide".
    • ARP management.
    • Practical work Setting up automatic NAT of the "hide", "static" type and manual transaction rules.
    • The log management policy.
    • Track connections with SmartView Tracker.
    • The SmartView Monitor, features and alert thresholds.
    • Practical work Example of log management.
    • Block intrusions with SAM (Suspicious Activity Monitor).
    • Identity Awareness.
    • Application Control.
    • Old authentication methods.
    • Practical work Setup of Identity Awareness.
    • The architecture of the VPN.
    • The basics of encryption.
    • Introduction to IKE and IPSec.
    • The certificate authority ( CA).
    • The Domain-Based VPN.
    • The SecureClient and the SSL Network Extender.
    • Practical work Setting up a tunnel Site-to-site IPSec by preshared key and certificate.
    • Configuring remote access with IPSec VPN and SSL VPN.
    • Presentation of IPS.
    • Web Intelligence.
    • Application Intelligence.
    • IPS and IDS security profiles.
    • Practical work Example of protection against vulnerabilities with the IPS module.
  • 943
  • 28 h

Submit your review

Translated By Google Translate