Check Point Security Administration R77.30

Check Point Security Administration R77 provides an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.
During this course you will configure a Security Policy and learn about managing and monitoring a secure network, upgrading and configuring a Security Gateway and implementing a virtual private network.

 

Duration: 15 Days

 

PREREQUISITES: 
Persons attending this course should have a general knowledge of TCP/IP, and working knowledge of Windows, UNIX, network technology and the internet.

 

COURSE OUTLINE: 

Introduction to firewalls 1 Generation and 2nd Gne firewalls

    • Understanding 1 Generation firewalls
    • Understanding 2 Generation firewalls
    • Understanding 2nd Gen Firewalls and futures
    • Understanding UTM firewalls futures

 

Introduction to Checkpoint Technologies

    • What’s new in checkpoint R77.30
    • Checkpoint’s Architecture
    • Implementing 3 tier Architecture of checkpoint

 

Deployment Platforms

    • Checkpoint supported platforms
    • Installing Checkpoint on Windows o/s
    • Installing Checkpoint on GAiA
    • Configuring checkpoint in standard setup
    • Configuring checkpoint in a distributed setup

 

Introduction to Security policy

    • Verify SIC establishment between the Security Management Server and the Gateway using Smart Dashboard
    • Creating a basic Rulebase
    • Implicit rules vs Explicit rules
    • Configuring hide NAT
    • Configuring Static NAT
    • Configuring PAT & Port Redirection

 

User management & Authentication

    • Configure user & group accounts in checkpoint
    • Configure policies for authentication
    • Local Authentication Methods
    • Configuring user authentication
    • Configuring Session authentication
    • Configuring Client Authentication

 

UTM Features

    • Configuring Antivirus blade in checkpoint gateway
    • Verifying Antivirus modules
    • Implementing content filtering
    • Configuring cvp & ufp policies
    • Configuring URL filtering
    • Testing URL filtering

 

Advance UTM Features

    • Java & ActiveX based attacks
    • Implementing Java & ActiveX blocking
    • Configuring Application control
    • Using smart event intro for analyzing application traffic

 

Checkpoint VPN Introduction

    • Understanding VPN terminology
    • Understanding IKEv2
    • Understanding Phase-1& Phase-2
    • Implementing site-to-site vpn with head office & Branch office

 

Monitoring

    • Using smart view tracker for Analysing logs
    • Using smartview Monitor for monitoring traffic
    • Using queries in smartview tracker
    • Filtering logs in smartview tracker

 

SMART UPDATE

    • Monitor remote Gateways using Smart Update
    • Manage New installations
    • license modifications
    • Upgrading Checkpoint  Gw’s & Management server using Smart update