Check Point Firewall Ccsa R80.40 Training Part2/2
Published 4/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 6.33 GB | Duration: 11h 1m
Published 4/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 6.33 GB | Duration: 11h 1m
Learn CheckPoint Firewall CCSA R80.40 with Step by Step Lab Workbook
What you'll learn
Configure and Manage CheckPoint Firewall
How to setup a Lab Environment
Understand how to deploy Checkpoint Firewalls in EVE NG
Configure and Manage CheckPoint User and Group
Configure and Verify Administrator Accounts
HTTPS Inspection
Unified Access Control Policy
Explicit, Stealth, Cleanup & Mgmt Rules
Requirements
Basic IP and security knowledge is nice to have.
Students need to understand basic networking.
Students needs to understand Networking Fundamentals.
General knowledge of TCP/IP
Working knowledge of Windows and/or UNIX
Working knowledge of networking technology
Description
Check Point CCSA certification is the very important for IT admins who manage day to day operations of Checkpoint solutions. Here you will get expertise in startup, manage and configure day to day Check Point installations with R80. Course covers how to install R80 security gateway in a distributed environment, configure rules and defines a policy for security, how to work with multiple administrators and how to define permission profiles. After completion of this certification you will be expert in to keep your network secure, you will be expert in evaluating existing security policy, you will be able to manage multiple user access to organization LANs, you will be expert in to monitor any suspicious activities over the internet and you can analyze security attacks better, implement backup for Check Point. Prerequisites:You should have basic level knowledge of networking, you should have 6 months to 1-year experience with Check Point products and this is mandatory. Check Point Primary Products: Network Security, Software Defined Protection, Public and Private Cloud Security, Zero Trust Remote Access, Data Security, IoT Security, ThreatCloud, ThreatCloud IntelliStore, Virtual Systems, Endpoint Security, Mobile Security, Security Management, Document Security (Capsule Docs product line), Zero-day Protection (SandBlast appliance product line) and Mobile Security (Mobile Threat Prevention product line). The following course includes lectures on how Check Point features work and the walk-through of the configuration in the lab/production environment. From the very beginning following step-by-step approach you will be able to grasp advanced concepts and step on the next level.The course is structured in an easy to follow manner starting from the very basic to advanced topics. The topics that are covered are: Installing Check Point in a lab environment, understanding general principles of Firewalling. THE COURSE INCLUDES:Introduction to CheckPoint TechnologyBuilding the Lab in EVE-NGObjectsAdmin AccountsUsers and GroupsSite to Site VPNHA, Load Sharing Monitoring ThreatAccess Policy
Overview
Section 1: Introduction
Lecture 1 Introduction
Section 2: Administrator Accounts
Lecture 2 Introduction to Administrator Accounts
Lecture 3 Verify Administrator Accounts
Lecture 4 Admin Accounts Advanced Options
Lecture 5 Certificate Based Login Administrator
Section 3: HTTPS Inspection
Lecture 6 HTTPS Inspection Theory
Lecture 7 HTTPS Inspection Lab
Lecture 8 Install Certificate in Client PC
Lecture 9 Test & Verification HTTPS Inspection
Section 4: Security Policy
Lecture 10 Security Zones
Lecture 11 Security Policy
Lecture 12 Unified Access Control Policy
Lecture 13 Introduction to Implied Rules
Lecture 14 Verify Implied Rules Lab
Lecture 15 Explicit, Stealth, Cleanup & Mgmt Rules
Lecture 16 Access Control Policy Lab
Lecture 17 Access Control Policy Sections
Lecture 18 Access Control Policy UserCheck
Lecture 19 ACP Order Layers
Lecture 20 ACP Inline Layers
Lecture 21 Application Control
Lecture 22 Application Control Lab
Lecture 23 Threat Prevention Theory
Lecture 24 Threat Prevention IP Lab
Lecture 25 IP Spoofing Anti-Spoofing
Section 5: VPN Concept
Lecture 26 Cryptography Concepts
Lecture 27 Symmetric and Asymmetric
Lecture 28 Hashing
Lecture 29 Diffie-Hellman DH
Lecture 30 IPsec Protocols
Lecture 31 IPsec Protocols ESP and AH
Lecture 32 IKE Internet Key Exchange
Lecture 33 VPN Virtual Private Network
Lecture 34 VPN Terminologies
Section 6: Site-to-Site VPN Lab
Lecture 35 Site-to-Site VPN Lab Topology
Lecture 36 HQ-SG First time Wizard
Lecture 37 BR-SG First Time Wizard
Lecture 38 SMS First Time Wizard
Lecture 39 HQ-SG Interfaces & Static Route
Lecture 40 BR-SG Interfaces & Static Route
Lecture 41 SmartConsole and SMS
Lecture 42 Add Security Gateways to SMS
Lecture 43 Assign Interface to Security Zone
Lecture 44 Site to Site VPN Configuration
Lecture 45 NAT and ACP Configuration
Lecture 46 Configure Hosts and ISP Router
Lecture 47 Updating Gateway Topology
Lecture 48 VPN Testing & Verification
Section 7: ClusterXL & HA
Lecture 49 Introduction to Clustering
Lecture 50 Load Sharing & High Availability
Lecture 51 ClusterXL Lab Topology
Lecture 52 SG-1 First Time Wizard
Lecture 53 SG-2 First Time Wizard
Lecture 54 SMS First Time Wizard
Lecture 55 SG-1 Network Interfaces & Route
Lecture 56 SG-2 Network Interfaces & Route
Lecture 57 SmartConsole and SMS
Lecture 58 Cluster Configuration
Lecture 59 Security Policy
Lecture 60 Configure Hosts
Lecture 61 HA Testing & Verfication
Lecture 62 Load Sharing Lab
This course is for students trying to obtain the CCSA,This course is for students trying to learn the Check Point Firewall.,Any Network or Security Engineer want to learn or polish their Skills.,System Administrators and Information Security Analysts,Network Engineers and Security Engineers