Train together, save more! 10% off individual registration, 20% off for pairs.
Log in

Or create your account

You have just added to your selection
Your cart is empty, See our trainings

Description

This training will introduce you to the new features brought by the latest version of Check Point products, version R77. At the end, you will be able to set up and manage a security policy, address translation (NAT) or the Intrusion Prevention System (IPS) module.

Who is this training for ?

For whom ?

Technician, administrator and systems/networks/security engineer.

Prerequisites

Training objectives

  • Install and configure Check Point R77
  • Implement a security policy
  • Block intrusions with SAM (Suspicious Activity Monitor)
  • Implement Check Point Mobile
  • Training program

    • Introduction
      • - Check Point products.
      • - Components.
      • - New features in version R77.
    • Operation and installation
      • - The architecture in distributed and standalone mode.
      • - The management server.
      • - The SIC protocol.
      • - Presentation of the Gaia system .
      • - The command line interface (CLI).
      • - Backup and restore commands.
      • - Practical work Installation of Check Point under Gaïa in version R77.
    • Implementation of a security policy

      - n'as pas encore du programme

    • Address translation (NAT)
      • - Address translation rules.
      • - NAT "static" and NAT "hide".
      • - ARP management.
      • - Practical work Setting up automatic NAT of the "hide", "static" type and manual transaction rules.
    • Monitoring and log management
      • - The log management policy.
      • - Track connections with SmartView Tracker.
      • - The SmartView Monitor, features and alert thresholds.
      • - Practical work Setting up automatic NAT of type "hide", "static" and manual transaction rules.
    • R77 client authentication
      • - Legacy methods of authentication.
      • - Identity Awareness.
      • - Application Control.
      • - Authentication: captive portal, Identity Agent, Active integration Directory.
      • - Practical work Implementation of Identity Awareness.
    • Site-to-site VPN and nomadic VPN
      • - The architecture of the VPN.
      • - Encryption basics.
      • - Introduction IPSec, the certification authority.
      • - The authority of certification (CA).
      • - Domain-Based VPN, heavy client mode.
      • - Authentication modes in Mobile Access: Check Point Mobile, SSL/SNX, .
      • - Practical work Setting up a site-to-site IPSec tunnel.
      • - Configuring remote access via IPSec VPN.
      • - Activation and implementation in place of Check Point Mobile.
    • The IPS module
      • - Presentation.
      • - Vulnerabilities and security flaws.
      • - Implementation of a security profile.
      • - Geo-Protection, inspection HTTPS.
      • - Other modules: Data Leakage Prevention, QoS, .
      • - Practical work Example of protection against vulnerabilities with the IPS module.
    • 836
    • 28 h

    Submit your review

    Translated By Google Translate