• Presencial
  • Training

Check Point Security Expert R81.10 (CCSE)


Learn advanced concepts and develop skills necessary to design, deploy, and upgrade Check Point Security environments.

Advanced three-day course teaches how to build, modify, deploy and troubleshoot the R81.10 Check Point Security Systems on the GAiA operating system. Hands-on lab exercises teach how to debug firewall processes, optimize VPN performance and upgrade Management Servers.

Learn How To:

  • Backup your R81.1 Security Gateway and Management Server
  • Build, test and troubleshoot a clustered Security Gateway
  • Upgrade and troubleshoot a Management Server
  • Configure and maintain security acceleration solutions
  • Manage, test and optimize corporate VPN tunnels

How You Will Benefit:

  • Build, test and troubleshoot numerous deployment scenarios
  • Apply insider tips troubleshooting Check Point Security Systems
  • Practice advanced upgrading techniques
  • Migrate to a clustering security solution
  • Create events for compliance reporting
  • Manage internal and external access to corporate resources

Cursos relacionados

Destinatários

Technical Professionals who architect, upgrade, maintain, and support Check Point products.

Pré-requisitos

CCSA Training or Certification, fundamental Unix and Windows knowledge, certificate management experience, system administration and networking knowledge.

Objetivos

  • Provide an overview of the upgrade service and options available.
  • Explain how to perform management upgrade and migration.
  • Articulate the process using CPUSE features.
  • Articulate the purpose and function of Management HighAvailability.
  • Explain Primary vs Secondary, Active vs Standby and Synchronization.
  • Explain disaster recovery steps in case the primary management server becomes unavailable.
  • Provide overview of Central Deployment in SmartConsole.
  • Articulate an understanding of Security Gateway cluster upgrade methods.
  • Explain about Multi Version Cluster (MVC) upgrades.
  • Discuss Gaia Commands and how they are used.
  • Explain the main processes on s and s.
  • Describe how to work with scripts and SmartTasks to configure automatic actions.
  • Explain the Management Data Plane Separation (MDPS)
  • Explain kernel operations and traffic flow
  • Articulate Dynamic and Updatable Objects in Security Gateways
  • Explain the policy installation flow and files used.
  • Describe the use of policy installation history.
  • Explain concurrent and accelerated install policy.
  • Describe an overview of APIs and ways to use and authenticate.
  • Explain how to make changes in GAIA and management configuration.
  • Explain how to install policy using API.
  • Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance.
  • Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance.
  • Articulate how utilizing multiple traffic queues can make traffic handling more efficient.
  • Discuss Site-to-Site VPN basics, deployment and communities.
  • Describe how to analyze and interpret VPN tunnel traffic.
  • Explain Link Selection and ISP Redundancy options.
  • Explain tunnel management features.
  • Discuss Check Point Remote Access solutions and how they differ from each other.
  • Describe how client security can be provided by Remote Access .
  • Explain authentication methods including machine authentication.
  • Explain Multiple Entry Point (MEP).
  • Discuss the Mobile Access Software Blade and how it secures communication and data exchange during remote connections.
  • Describe Mobile Access deployment options.
  • Discuss various features in Mobile Access like Portals, Link Translation, running Native Applications, Reverse Proxy and more.
  • Explain basic concepts of Clustering and ClusterXL.
  • Explain about Cluster Control Protocol (CCP) and synchronization.
  • Describe advanced ClusterXL functions and modes like Load Sharing Active-Active, VMAC mode etc.
  • Discuss Cluster Correction Layer (CCL) to provide connection stickyness.
  • Advanced Logs and Monitoring
  • Explain how to determine if the configuration is compliant with the best practices.
  • Explain how to set action items to meet the compliance.
  • Discuss how SmartEvent functions to identify critical security issues.
  • Describe the components of SmartEvent and their deployment options.
  • Discuss how SmartEvent can assist in reporting security threats.
  • Explain how to customize event definitions and set an Event Policy

Programa

COURSE TOPICS

  • Management Upgrade and Migration
  • Management High Availability
  • Security Gateway Upgrades
  • Advanced Check Point Maintenance
  • Security Gateway Operations
  • Policy Installation
  • Gaia and Management APIs
  • Acceleration
  • Site-to-Site VPN
  • Remote Access VPN
  • Mobile Access VPN
  • Clustering
  • Advanced Logs and Monitoring

LAB EXERCISES

  • Prepare for a Security Management Server Upgrade
  • Upgrade the Security Management Server
  • Deploy a Secondary Security Management Server
  • Configure a Distributed Log Server
  • Upgrade a Security Gateway from SmartConsole
  • Work with the Command Line
  • Use Scripts and SmartTasks
  • Configure Dynamic Objects
  • Monitor Traffic
  • Verify Policy Installation and Status
  • Work with Gaia and Management APIs
  • Work with Acceleration Features
  • Configure a Locally Managed Site to Site VPN
  • Configure a Site to Site VPN with an Interoperable Device
  • Configure Remote Access VPN
  • Configure Mobile Access VPN
  • Configure a High Availability Cluster
  • Work with ClusterXL
  • Configure Policy Compliance
  • Deploy SmartEvent

Check Point Security Expert R81.10 (CCSE)

Área

Dados

Como chegou até nós

Os seus dados pessoais são recolhidos em conformidade com o Regulamento Geral de Proteção de Dados (RGPD).

Consente que os seus dados sejam utilizados, nos termos da nossa Politica de Privacidade, para o contacto/envio de:

Ações de informação, de marketing de produtos e serviços, como campanhas e eventos?

Para mais informações, consulte a Política de Privacidade do Grupo Rumos.
pode retirar o seu consentimento a qualquer momento através do botão Cancelar subscrição ou Unsubscribe que estão presentes em cada comunicação enviada, bem como exercer os direitos descritos na politica de privacidade