Buying for a Team? Gift This Course
Wishlisted Wishlist

Please confirm that you want to add Check Point Certified Security Administrator (CCSA) R77.30 to your Wishlist.

Add to Wishlist

Check Point Certified Security Administrator (CCSA) R77.30

Certification Preparation
2.6 (15 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
88 students enrolled
Last updated 8/2016
English
$10 $150 93% off
1 day left at this price!
30-Day Money-Back Guarantee
Includes:
  • 6 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Have a coupon?
What Will I Learn?
Install the security gateway in a distributed environment
Configure rules on Web and Gateway servers
Create a basic rule base in SmartDashboard and assign permissions
Check Point Technology Overview
Deployment Platforms and Security Policies
Monitoring Traffic and Connections
Network Address Translations
User Management and Authentication
Using SmartUpdate
Implementing Identity Awareness
Configuring VPN tunnels
View Curriculum
Requirements
  • Basic knowledge of networking
  • Windows Server and/or UNIX skills
  • Internet and TCP/IP experience
Description

Course: Checkpoint Certification Training

Benefits : After completing this course you will be able to Be prepared to defend against network threats, Evaluate existing security policies and optimize the rule base, Manage user access to corporate LANs, Monitor suspicious network activities and analyze attacks. Certified Checkpoint Professionals rank higher than other security vendor professionals. Validation you have the skills to implement the latest network security advancements

Delivery: Online

Agenda : Advance your knowledge on the GAiA operating system. This course covers everything you need to start-up, configure and manage daily operations of Check Point Security Gateway and Management Software Blades systems on the GAiA operating system..

Lab Access & Lab Guide : Not Included

Who is the target audience?
  • Security Adminstrators
  • Security Consultants
  • Network Adminstrators
  • System Engineers
  • System Analysts
  • Security Analysts
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 27 Lectures Collapse All 27 Lectures 05:51:46
+
Course Introduction
1 Lecture 03:34

Course Introduction: Benefits, Pre Requisites, Target Audience and Agenda

Preview 03:34
+
Introduction to Checkpoint Technology
4 Lectures 50:40

Describe Check Point's unified approach to network management, and the key elements of this architecture.

Design a distributed environment using the network detailed in the course topology.

Install the Security Gateway version R77 in a distributed environment 

Preview 16:10

Describe Check Point's unified approach to network management, and the key elements of this architecture.

Design a distributed environment .

Install the Security Gateway version R77 in a distributed environment 

2
07:19

Describe Check Point's unified approach to network management, and the key elements of this architecture.

Design a distributed environment .

Install the Security Gateway version R77 in a distributed environment 

3
15:07

Describe Check Point's unified approach to network management, and the key elements of this architecture.

Design a distributed environment .

Install the Security Gateway version R77 in a distributed environment 

4
12:04
+
Deployment Platforms
4 Lectures 45:57

Given network specifications, perform a backup and restore the current Gateway installation from the command line.

Identify critical files needed to purge or backup, import and export users and groups and add or delete administrators from the command line.

Deploy Gateways from the Gateway command line .

Lesson 1
10:21

Given network specifications, perform a backup and restore the current Gateway installation from the command line.

Identify critical files needed to purge or backup, import and export users and groups and add or delete administrators from the command line.

Deploy Gateways from the Gateway command line .

Lesson 2
04:12

Given network specifications, perform a backup and restore the current Gateway installation from the command line.

Identify critical files needed to purge or backup, import and export users and groups and add or delete administrators from the command line.

Deploy Gateways from the Gateway command line .

Lesson 3
18:04

Given network specifications, perform a backup and restore the current Gateway installation from the command line.

Identify critical files needed to purge or backup, import and export users and groups and add or delete administrators from the command line.

Deploy Gateways from the Gateway command line .

Lesson 4
13:20
+
Introduction to Security Policy
3 Lectures 34:40

Given the network topology, create and configure network, host and gateway objects.

Verify SIC establishment between the Security Management Server and the Gateway using SmartDashboard.

Create a basic Rule Base in SmartDashboard that includes permissions for administrative users, external services, and LAN outbound use.

Configure NAT rules on Web and Gateway servers.

Evaluate existing policies and optimize the rules based on current corporate requirements.

Maintain the Security Management Server with scheduled backups and policy versions to ensure seamless upgrades and minimal downtime.

Lesson 1
11:50

Given the network topology, create and configure network, host and gateway objects.

Verify SIC establishment between the Security Management Server and the Gateway using SmartDashboard.

Create a basic Rule Base in SmartDashboard that includes permissions for administrative users, external services, and LAN outbound use.

Configure NAT rules on Web and Gateway servers.

Evaluate existing policies and optimize the rules based on current corporate requirements.

Maintain the Security Management Server with scheduled backups and policy versions to ensure seamless upgrades and minimal downtime.

Lesson 2
07:48

Given the network topology, create and configure network, host and gateway objects.

Verify SIC establishment between the Security Management Server and the Gateway using SmartDashboard.

Create a basic Rule Base in SmartDashboard that includes permissions for administrative users, external services, and LAN outbound use.

Configure NAT rules on Web and Gateway servers.

Evaluate existing policies and optimize the rules based on current corporate requirements.

Maintain the Security Management Server with scheduled backups and policy versions to ensure seamless upgrades and minimal downtime.

Lesson 3
15:02
+
Monitoring Traffic and Connections
2 Lectures 33:34

Use Queries in SmartView Tracker to monitor IPS and common network traffic and troubleshoot events using packet data.

Using packet data on a given corporate network, generate reports, troubleshoot system and security issues, and ensure network functionality.

Using SmartView Monitor, configure alerts and traffic counters, view a Gateway's status, monitor suspicious activity rules, analyze tunnel activity and monitor remote user access based on corporate requirements.

Lesson 1
13:24

Use Queries in SmartView Tracker to monitor IPS and common network traffic and troubleshoot events using packet data.

Using packet data on a given corporate network, generate reports, troubleshoot system and security issues, and ensure network functionality.

Using SmartView Monitor, configure alerts and traffic counters, view a Gateway's status, monitor suspicious activity rules, analyze tunnel activity and monitor remote user access based on corporate requirements.

Lesson 2
20:10
+
Network Address Translation
1 Lecture 20:07

Configure NAT rules on Web and Gateway servers.

Network Address Translation
20:07
+
Using Smart Update
2 Lectures 27:02

Monitor remote Gateways using SmartUpdate to evaluate the need for upgrades, new installations, and license modifications.

Use SmartUpdate to apply upgrade packages to single or multiple VPN-1 Gateways.

Upgrade and attach product licenses using SmartUpdate.

Lesson 1
08:24

Monitor remote Gateways using SmartUpdate to evaluate the need for upgrades, new installations, and license modifications.

Use SmartUpdate to apply upgrade packages to single or multiple VPN-1 Gateways.

Upgrade and attach product licenses using SmartUpdate.

Lesson 2
18:38
+
User Management and Authentication
3 Lectures 46:04

Centrally manage users to ensure only authenticated users securely access the corporate network either locally or remotely.

Manage users to access to the corporate LAN by using external databases.

Lesson 1
13:17

Centrally manage users to ensure only authenticated users securely access the corporate network either locally or remotely.

Manage users to access to the corporate LAN by using external databases.

Lesson 2
13:00

Centrally manage users to ensure only authenticated users securely access the corporate network either locally or remotely.

Manage users to access to the corporate LAN by using external databases.

Lesson 3
19:47
+
Identity Awareness
4 Lectures 42:13

Use Identity Awareness to provide granular level access to network resources.

Acquire user information used by the Security Gateway to control access.

Define Access Roles for use in an Identity Awareness rule.

Implementing Identity Awareness in the Firewall Rule Base.

Lesson 1
15:04

Use Identity Awareness to provide granular level access to network resources.

Acquire user information used by the Security Gateway to control access.

Define Access Roles for use in an Identity Awareness rule.

Implementing Identity Awareness in the Firewall Rule Base.

Lesson 2
05:08

Use Identity Awareness to provide granular level access to network resources.

Acquire user information used by the Security Gateway to control access.

Define Access Roles for use in an Identity Awareness rule.

Implementing Identity Awareness in the Firewall Rule Base.

Lesson 3
04:56

Use Identity Awareness to provide granular level access to network resources.

Acquire user information used by the Security Gateway to control access.

Define Access Roles for use in an Identity Awareness rule.

Implementing Identity Awareness in the Firewall Rule Base.

Lesson 4
17:05
+
Introduction to Checkpoint VPN's
3 Lectures 47:55

Configure a pre-shared secret site-to-site VPN with partner sites.

Configure permanent tunnels for remote access to corporate resources.

Configure VPN tunnel sharing, given the difference between host-based, subunit-based and gateway-based tunnels.

Lesson 1
19:08

Configure a pre-shared secret site-to-site VPN with partner sites.

Configure permanent tunnels for remote access to corporate resources.

Configure VPN tunnel sharing, given the difference between host-based, subunit-based and gateway-based tunnels.

Lesson 2
10:44

Configure a pre-shared secret site-to-site VPN with partner sites.

Configure permanent tunnels for remote access to corporate resources.

Configure VPN tunnel sharing, given the difference between host-based, subunit-based and gateway-based tunnels.

Lesson 3
18:03
About the Instructor
3.7 Average rating
121 Reviews
3,900 Students
13 Courses
Information Security Training

Information Security organization focusing on enabling skills and competency in the domain of Information Security across multiple practices including Governance, Risk Management, Compliance Management, Identity and Access Management, data Security, Application Security, SAP Security, Managed Security Services, Infrastructure Security and Device Management.

Our mission and vision is to bring hands on training on training in the domain of Information Security tools and technologies to every individual wanting to make a career in this domain by making it more affordable, self intuitive and tailored to the skills required.

Report Abuse