• Presencial

Check Point Security Engineering R80.20 (CCSE)


Neste curso avançado de 3 dias poderá aprender a construir, modificar, implementar e resolver problemas nos sistemas de segurança da Check Point baseados na plataforma GAiA.

Laboratórios permitirão fazer debug aos processos da firewall, optimizar a performance das VPN e realizar upgrades às plataformas de Management, entre outras tarefas.

Cursos relacionados

Destinatários

Expert users and resellers who need to perform advanced deployment configurations of Check Point Software Blades, which includes:

  • System administrators
  • Support analysts
  • Network engineers
  • Anyone seeking CCSE certification

Pré-requisitos

  • CCSA training/certification
  • Working knowledge of Windows, UNIX, networking, TCP/IP, and the Interne

Objetivos

Validate your understanding and skills necessary to configure and optimally manage Check Point Next Generation Firewalls:

  • Identify advanced CLI commands.
  • Understand system management procedures, including how to perform system upgrades and apply patches and hotfixes.
  • Describe the Check Point Firewall infrastructure.
  • Describe advanced methods of gathering important gateway data using CPView and CPInfo.
  • Recognize how Check Point’s flexible API architecture supports automation and orchestration.
  • Discuss advanced ClusterXL functions.
  • Describe VRRP network redundancy advantages.
  • Undersand how SecureXL acceleration technology is used to enhance and improve performance.
  • Understand how CoreXL acceleration technology is used to enhance and improve performance.
  • Identify the SmartEvent components that store network activity logs and identify events.
  • Discuss the SmartEvent process that determines which network activities may lead to security issues.
  • Understand how SmartEvent can assist in detecting, remediating, and preventing security threats.
  • Discuss the Mobile Access Software Blace and how it secures communication and data.
  • Understand Mobile Access deployment options.
  • Recognize Check Point Remote Access solutions.
  • Discuss Check Point Capsule components and how they protect mobile devices and business documents.
  • Discuss diferent Check Point Solutions for attacks such as zero-day and Advanced Persistent Threats.
  • Understand how SandBlast, Threat Emulation, and Threat Extraction prevent security incidents.
  • Identify how Check Point Mobile Threat Prevention can help protect data accessed on company-issued smartphones and tablets.

Metodologia

  • Sessões teóricas e práticas.

Programa

  • System Management
  • Automation and Orchestration
  • Redundancy
  • Acceleration
  • SmartEvent
  • Mobile and Remote Access
  • Threat Prevention

LAB EXERCISES

  • Upgrading a Security Management Server to R80.X
  • Applying Check Point Hotfixes
  • Configuring a New Security Gateway Cluster
  • Core CLI Elements of Firewall Administration
  • Configuring Manual Network Address Translation
  • Managing Objects Using the Check Point API
  • Enabling Check Point VRRP
  • Deploying a Secondary Security Management Server
  • Viewing the Chain Modules
  • Working with SecureXL
  • Working with CoreXL
  • Evaluating Threats with SmartEvent
  • Managing Mobile Access
  • Understanding IPS Protections
  • Deploying IPS Geo Protection
  • Reviewing Threat Prevention Settings and Protections
  • Deploying Threat Emulation and Threat Extraction

Check Point Security Engineering R80.20 (CCSE)

Área

Dados

Como chegou até nós

Os seus dados pessoais são recolhidos em conformidade com o Regulamento Geral de Proteção de Dados (RGPD).
Consente que os seus dados sejam utilizados, nos termos da nossa Politica de Privacidade, para o contacto/envio de:

Ações de informação, de marketing de produtos e serviços, como campanhas e eventos?

Para mais informações, consulte a Política de Privacidade do Grupo Rumos.
pode retirar o seu consentimento a qualquer momento através do botão Cancelar subscrição ou Unsubscribe que estão presentes em cada comunicação enviada, bem como exercer os direitos descritos na politica de privacidade

Para a subscrição da newsletter deverá desativar o bloqueio de pop-ups do seu browser.