title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.
Cybersecurity Boot Camp R81.20
Course Description
Overview
The Check Point Cybersecurity Boot Camp is a fast-paced course intended for Security Experts and other technical professionals with prior training and/or practical experience with Check Point Security Management Servers and Security Gateways running on the Gaia operating system.Objectives
- Design, maintain, and protect Check Point Security Gateways and Management Software Blades that run on the Gaia operating system.
- Deploy, configure, and manage daily operations of Check Point Security Gateways and Management Software Blades.
- Gain an understanding of High Availability and Clustering, advanced configuration, management and monitoring, custom Threat Prevention, performance tuning, and automation.
Audience
Prerequisites
-
Before taking this course, the following prerequisites are strongly encouraged:
- A minimum of one year experience working with Check Point products.
- Unix-like and/or Windows operating systems
- Networking Fundamentals
- Networking Security
- TCP/IP Networking
Topics
- Security Management
- SmartConsole
- Deployment
- Object Management
- Licenses and Contracts
- Policy Rules and Rulebase
- Policy Packages
- Policy Layers
- Traffic Inspection
- Network Address Translation
- Application Control
- URL Filtering
- Logging
- Snapshots
- Backup and Restore
- Gaia
- Permissions
- Policy Installation
- Advanced Deployments
- Management High Availability
- Advanced Gateway Deployment
- Advanced Policy Configuration
- Advanced User Access Management
- Custom Threat Protection
- Advanced Site-to-Site VPN
- Remote Access VPN
- Mobile Access VPN
- Advanced Security Monitoring
- Performance Tuning
- Advanced Security Maintenance
- Describe the primary components of a Check Point Three-Tier Architecture and explain how they work together in the Check Point environment.
- Identify the basic workflow to install Security Management Server and Security Gateway for a single-domain solution.
- Create SmartConsole objects that correspond to the organization’s topology for use in policies and rules.
- Identify the tools available to manage Check Point licenses and contracts, including their purpose and use.
- Identify features and capabilities that enhance the configuration and management of the Security Policy.
- Demonstrate an understanding of Application Control & URL Filtering and Autonomous Threat Prevention capabilities and how to configure these solutions to meet an organization’s security requirements.
- Describe how to analyze and interpret VPN tunnel traffic.
- Identify how to monitor the health of supported Check Point hardware using the Gaia Portal and the command line.
- Describe the different methods for backing up Check Point system information and discuss best practices and recommendations for each method.
- Deploy SmartConsole
- Install a Security Management Server
- Install a Security Gateway
- Configure Objects in SmartConsole
- Establish Secure Internal Communication
- Manage Administrator Access
- Manage Licenses
- Create a Security Policy
- Configure Order Layers
- Configure a Shared Inline Layer
- Configure NAT
- Integrate Security with a Unified Policy
- Elevate Security with Autonomous Threat Prevention
- Configure a Locally Managed Site-to-Site VPN
- Elevate Traffic View
- Monitor System States
- Maintain the Security Environment
- Identify the types of technologies that Check Point supports for automation.
- Explain the purpose of the Check Management High Availability (HA) deployment.
- Explain the basic concepts of Clustering and ClusterXL, including protocols, synchronization, and connection stickyness.
- Explain the purpose of dynamic objects, updatable objects, and network feeds.
- Describe the Identity Awareness components and configurations.
- Describe different Check Point Threat Prevention solutions.
- Articulate how the Intrusion Prevention System is configured.
- Explain the purpose of Domain-based VPNs.
- Describe situations where externally managed certificate authentication is used.
- Describe how client security can be provided by Remote Access.
- Discuss the Mobile Access Software Blade.
- Define performance tuning solutions and basic configuration workflow.
- Identify supported upgrade methods and procedures for Security Gateways.
- Navigate the Environment and Use the Management API
- Deploy Secondary Security Management Server
- Configure a Dedicated Log Server
- Deploy SmartEvent
- Configure a High Availability Security Gateway Cluster
- Work with ClusterXL
- Configure Dynamic and Updateable Objects
- Verify Accelerated Policy Installation and Monitoring Status
- Elevate Security with HTTPS Inspection
- Deploy Identity Awareness
- Customize Threat Prevention
- Configure a Site-to-Site VPN with an Interoperable Device
- Deploy Remote Access VPN
- Configure Mobile Access VPN
- Monitor Policy Compliance
- Report SmartEvent Statistics
- Tune Security Gateway Performance
Related Courses
-
Security Administration R81.20 (CCSA)
CP-CCSA- Duration: 3
- Delivery Format: Classroom Training, Online Training
- Price: 3,000.00 USD
-
Certified Security Expert R81.20 (CCSE)
CP-CCSE- Duration: 3
- Delivery Format: Classroom Training, Online Training
- Price: 3,000.00 USD
Self-Paced Training Info
Learn at your own pace with anytime, anywhere training
- Same in-demand topics as instructor-led public and private classes.
- Standalone learning or supplemental reinforcement.
- e-Learning content varies by course and technology.
- View the Self-Paced version of this outline and what is included in the SPVC course.
- Learn more about e-Learning
Course Added To Shopping Cart
bla
bla
bla
bla
bla
bla
Self-Paced Training Terms & Conditions
Exam Terms & Conditions
Sorry, there are no classes that meet your criteria.
Please contact us to schedule a class.

STOP! Before You Leave
Save 0% on this course!
Take advantage of our online-only offer & save 0% on any course !
Promo Code skip0 will be applied to your registration
Purchase Information
title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.