• Opening: 8:00am - 6:00pm

Call Now0115210022

Send Messageinfo@gnts.lk

Our Location18B, 2nd Floor, 42nd Lane, Colombo-06

Checkpoint

Check Point Security Administration R77.30

  • Check Point Security Administration R77 provides an understanding of the basic concepts and skills necessary toconfigure Check Point Security Gateway and Management Software Blades.
    During this course you will configure a Security Policy and learn about managing and monitoring a secure network, upgrading and configuring a Security Gateway and implementing a virtual private network.
    Duration: 15 Days
    PREREQUISITES:
    Persons attending this course should have general knowledge of TCP/IP, and working knowledge of Windows, UNIX, network technology and the internet.
    Duration – 2 weeks
    COURSE OUTLINE:
    Introduction to firewalls 1 Generation and 2nd Gne firewalls
    • Understanding 1 Generation firewalls
    • Understanding 2 Generation firewalls
    • Understanding 2nd Gen Firewalls and futures
    • Understanding UTM firewalls futures
    Introduction to Checkpoint Technologies
    • What’s new in checkpoint R77.30
    • Checkpoint’s Architecture
    • Implementing 3 tier Architecture of checkpoint
    Deployment Platforms
    • Checkpoint supported platforms
    • Installing Checkpoint on Windows o/s
    • Installing Checkpoint on GAiA
    • Configuring checkpoint in standard setup
    • Configuring checkpoint in distributed setup
    Introduction to Security policy
    • Verify SIC establishment between the Security Management Server and the Gateway using Smart Dashboard
    • Creating a basic Rulebase
    • Implicit rules vs Explicit rules
    • Configuring hide NAT
    • Configuring Static NAT
    • Configuring PAT & Port Redirection
    User management & Authentication
    • Configure user & group accounts in checkpoint
    • Configure policies for authentication
    • Local Authentication Methods
    • Configuring user authentication
    • Configuring Session authentication
    • Configuring Client Authentication
    UTM Features
    • Configuring Antivirus blade in checkpoint gateway
    • Verifying Antivirus modules
    • Implementing content filtering
    • Configuring cvp & ufp policies
    • Configuring URL filtering
    • Testing URL filtering
    Advance UTM Features
    • Java & ActiveX based attacks
    • Implementing Java & ActiveX blocking
    • Configuring Application control
    • Using smart event intro for analyzing application traffic
    Checkpoint VPN Introduction
    • Understanding VPN terminology
    • Understanding IKEv2
    • Understanding Phase-1& Phase-2
    • Implementing site-to-site vpn with head office & Branch office
    Monitoring
    • Using smart view tracker for Analysing logs
    • Using smartview Monitor for monitoring traffic
    • Using queries in smartview tracker
    • Filtering logs in smartview tracker
    SMART UPDATE
    • Monitor remote Gateways using Smart Update
    • Manage New installations
    • license modifications
    • Upgrading Checkpoint  Gw’s & Management server using Smart update