Check Point Certified Security Administrator (CCSA) R77.30

Certification Preparation
3.1 (7 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
59 students enrolled
$19
$150
87% off
Take This Course
  • Lectures 27
  • Length 6 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 5/2016 English

Course Description

Course: Checkpoint Certification Training

Benefits : After completing this course you will be able to Be prepared to defend against network threats, Evaluate existing security policies and optimize the rule base, Manage user access to corporate LANs, Monitor suspicious network activities and analyze attacks. Certified Checkpoint Professionals rank higher than other security vendor professionals. Validation you have the skills to implement the latest network security advancements

Delivery: Online

Agenda : Advance your knowledge on the GAiA operating system. This course covers everything you need to start-up, configure and manage daily operations of Check Point Security Gateway and Management Software Blades systems on the GAiA operating system..

Lab Access & Lab Guide : Not Included

What are the requirements?

  • Basic knowledge of networking
  • Windows Server and/or UNIX skills
  • Internet and TCP/IP experience

What am I going to get from this course?

  • Install the security gateway in a distributed environment
  • Configure rules on Web and Gateway servers
  • Create a basic rule base in SmartDashboard and assign permissions
  • Check Point Technology Overview
  • Deployment Platforms and Security Policies
  • Monitoring Traffic and Connections
  • Network Address Translations
  • User Management and Authentication
  • Using SmartUpdate
  • Implementing Identity Awareness
  • Configuring VPN tunnels

What is the target audience?

  • Security Adminstrators
  • Security Consultants
  • Network Adminstrators
  • System Engineers
  • System Analysts
  • Security Analysts

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Course Introduction
03:34

Course Introduction: Benefits, Pre Requisites, Target Audience and Agenda

Section 2: Introduction to Checkpoint Technology
16:10

Describe Check Point's unified approach to network management, and the key elements of this architecture.

Design a distributed environment using the network detailed in the course topology.

Install the Security Gateway version R77 in a distributed environment 

07:19

Describe Check Point's unified approach to network management, and the key elements of this architecture.

Design a distributed environment .

Install the Security Gateway version R77 in a distributed environment 

15:07

Describe Check Point's unified approach to network management, and the key elements of this architecture.

Design a distributed environment .

Install the Security Gateway version R77 in a distributed environment 

12:04

Describe Check Point's unified approach to network management, and the key elements of this architecture.

Design a distributed environment .

Install the Security Gateway version R77 in a distributed environment 

Section 3: Deployment Platforms
10:21

Given network specifications, perform a backup and restore the current Gateway installation from the command line.

Identify critical files needed to purge or backup, import and export users and groups and add or delete administrators from the command line.

Deploy Gateways from the Gateway command line .

04:12

Given network specifications, perform a backup and restore the current Gateway installation from the command line.

Identify critical files needed to purge or backup, import and export users and groups and add or delete administrators from the command line.

Deploy Gateways from the Gateway command line .

18:04

Given network specifications, perform a backup and restore the current Gateway installation from the command line.

Identify critical files needed to purge or backup, import and export users and groups and add or delete administrators from the command line.

Deploy Gateways from the Gateway command line .

13:20

Given network specifications, perform a backup and restore the current Gateway installation from the command line.

Identify critical files needed to purge or backup, import and export users and groups and add or delete administrators from the command line.

Deploy Gateways from the Gateway command line .

Section 4: Introduction to Security Policy
11:50

Given the network topology, create and configure network, host and gateway objects.

Verify SIC establishment between the Security Management Server and the Gateway using SmartDashboard.

Create a basic Rule Base in SmartDashboard that includes permissions for administrative users, external services, and LAN outbound use.

Configure NAT rules on Web and Gateway servers.

Evaluate existing policies and optimize the rules based on current corporate requirements.

Maintain the Security Management Server with scheduled backups and policy versions to ensure seamless upgrades and minimal downtime.

07:48

Given the network topology, create and configure network, host and gateway objects.

Verify SIC establishment between the Security Management Server and the Gateway using SmartDashboard.

Create a basic Rule Base in SmartDashboard that includes permissions for administrative users, external services, and LAN outbound use.

Configure NAT rules on Web and Gateway servers.

Evaluate existing policies and optimize the rules based on current corporate requirements.

Maintain the Security Management Server with scheduled backups and policy versions to ensure seamless upgrades and minimal downtime.

15:02

Given the network topology, create and configure network, host and gateway objects.

Verify SIC establishment between the Security Management Server and the Gateway using SmartDashboard.

Create a basic Rule Base in SmartDashboard that includes permissions for administrative users, external services, and LAN outbound use.

Configure NAT rules on Web and Gateway servers.

Evaluate existing policies and optimize the rules based on current corporate requirements.

Maintain the Security Management Server with scheduled backups and policy versions to ensure seamless upgrades and minimal downtime.

Section 5: Monitoring Traffic and Connections
13:24

Use Queries in SmartView Tracker to monitor IPS and common network traffic and troubleshoot events using packet data.

Using packet data on a given corporate network, generate reports, troubleshoot system and security issues, and ensure network functionality.

Using SmartView Monitor, configure alerts and traffic counters, view a Gateway's status, monitor suspicious activity rules, analyze tunnel activity and monitor remote user access based on corporate requirements.

20:10

Use Queries in SmartView Tracker to monitor IPS and common network traffic and troubleshoot events using packet data.

Using packet data on a given corporate network, generate reports, troubleshoot system and security issues, and ensure network functionality.

Using SmartView Monitor, configure alerts and traffic counters, view a Gateway's status, monitor suspicious activity rules, analyze tunnel activity and monitor remote user access based on corporate requirements.

Section 6: Network Address Translation
20:07

Configure NAT rules on Web and Gateway servers.

Section 7: Using Smart Update
08:24

Monitor remote Gateways using SmartUpdate to evaluate the need for upgrades, new installations, and license modifications.

Use SmartUpdate to apply upgrade packages to single or multiple VPN-1 Gateways.

Upgrade and attach product licenses using SmartUpdate.

18:38

Monitor remote Gateways using SmartUpdate to evaluate the need for upgrades, new installations, and license modifications.

Use SmartUpdate to apply upgrade packages to single or multiple VPN-1 Gateways.

Upgrade and attach product licenses using SmartUpdate.

Section 8: User Management and Authentication
13:17

Centrally manage users to ensure only authenticated users securely access the corporate network either locally or remotely.

Manage users to access to the corporate LAN by using external databases.

13:00

Centrally manage users to ensure only authenticated users securely access the corporate network either locally or remotely.

Manage users to access to the corporate LAN by using external databases.

19:47

Centrally manage users to ensure only authenticated users securely access the corporate network either locally or remotely.

Manage users to access to the corporate LAN by using external databases.

Section 9: Identity Awareness
15:04

Use Identity Awareness to provide granular level access to network resources.

Acquire user information used by the Security Gateway to control access.

Define Access Roles for use in an Identity Awareness rule.

Implementing Identity Awareness in the Firewall Rule Base.

05:08

Use Identity Awareness to provide granular level access to network resources.

Acquire user information used by the Security Gateway to control access.

Define Access Roles for use in an Identity Awareness rule.

Implementing Identity Awareness in the Firewall Rule Base.

04:56

Use Identity Awareness to provide granular level access to network resources.

Acquire user information used by the Security Gateway to control access.

Define Access Roles for use in an Identity Awareness rule.

Implementing Identity Awareness in the Firewall Rule Base.

17:05

Use Identity Awareness to provide granular level access to network resources.

Acquire user information used by the Security Gateway to control access.

Define Access Roles for use in an Identity Awareness rule.

Implementing Identity Awareness in the Firewall Rule Base.

Section 10: Introduction to Checkpoint VPN's
19:08

Configure a pre-shared secret site-to-site VPN with partner sites.

Configure permanent tunnels for remote access to corporate resources.

Configure VPN tunnel sharing, given the difference between host-based, subunit-based and gateway-based tunnels.

10:44

Configure a pre-shared secret site-to-site VPN with partner sites.

Configure permanent tunnels for remote access to corporate resources.

Configure VPN tunnel sharing, given the difference between host-based, subunit-based and gateway-based tunnels.

18:03

Configure a pre-shared secret site-to-site VPN with partner sites.

Configure permanent tunnels for remote access to corporate resources.

Configure VPN tunnel sharing, given the difference between host-based, subunit-based and gateway-based tunnels.

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Security Skills Hub, Information Security Training

Information Security organization focusing on enabling skills and competency in the domain of Information Security across multiple practices including Governance, Risk Management, Compliance Management, Identity and Access Management, data Security, Application Security, SAP Security, Managed Security Services, Infrastructure Security and Device Management.

Our mission and vision is to bring hands on training on training in the domain of Information Security tools and technologies to every individual wanting to make a career in this domain by making it more affordable, self intuitive and tailored to the skills required.

Ready to start learning?
Take This Course