Call Us : 011-64601115
Mail Us : info@bytecode.in
Follow Us :

Home » Check Point Security Administrator

Check Point Security Administrator

CHECKPOINT CERTIFIED CCSA

The Check Point Security Administrator provides an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software During this course you will configure a Security Policy and learn about managing and monitoring a secure network. In addition, you will upgrade and configure a Security Gateway to implement a virtual private network for bothinternal and external, remote users.

CCSA CERTIFICATION EXAM

COURSE EXAM CODE NORMAL & STEADY TRACK FAST & FURIOUS TRACK
CCSA 7 4
No. of question : questions
Course Duration: 24 Hours
Minimum passing score : 70%
Question type : Multiple choice scenario based questions

 

  • COURSE CONTENT
    • CHECK POINT SECURITY ADMINISTRATOR

      CHAPTER 1—INTRODUCTION TO CHECK POINT TECHNOLOGY

      Describe Check Point’s unified approach to network management and the key elements of this architecture
      Design a distributed environment using the network detailed in the course topology
      Install the Security Gateway version R75 in a distributed environment using the network detailed in the course topology

      CHAPTER 2—DEPLOYMENT PLATFORMS

      Given network specifications, perform a backup and restore the current Gateway installation from the command line
      Identify critical files needed to purge or backup, import and export users and groups and add or delete administrators from the command line
      Deploy Gateways using sysconfig and cpconfig from the Gateway command line

      CHAPTER 3—INTRODUCTION TO THE SECURITY POLICY

      Given the network topology, create and configure network, host and gateway objects
      Verify SIC establishment between the Security Manage-ment Server and the Gateway using Smart Dashboard
      Create a basic Rule Base in Smart Dashboard that includes permissions for administrative users, external Services, and LAN outbound use
      Configure NAT rules on Web and Gateway servers
      Evaluate existing policies and optimize the rules based on current corporate requirements
      Maintain the Security Management Server with scheduled backups and policy versions to ensure seamless upgrades with minimal downtime

      CHAPTER 4—MONITORING TRAFFIC AND CONNECTIONS

      Use Queries in SmartView Tracker to monitor IPS and common network traffic and troubleshoot events using packet data
      Using packet data on a given corporate network, generate reports, troubleshoot system and security issues, and ensure network functionality
      Using SmartView Monitor, configure alerts and traffic counters, view a Gateway’s status, monitor suspicious activity rules, analyze tunnel activity and monitor remote user access based on corporate requirements

      CHAPTER 5—USING SMARTUPDATE

      Monitor remote Gateways using SmartUpdate to evaluate the need for upgrades, new installations, and license modifications
      Use SmartUpdate to apply upgrade packages to single or multiple VPN-1 Gateways
      Upgrade and attach product licenses using SmartUpdate

      CHAPTER 6—USER MANAGEMENT AND AUTHENTICATION

      Centrally manage users to ensure only authenticated users securely access the corporate network either locally or remotely
      Manage users to access the corporate LAN by using external databases

      CHAPTER 7—IDENTITY AWARENESS

      Use Identity Awareness to provide granular level access to network resources
      Acquire user information used by the Security Gateway to control access
      Define Access Roles for use in an Identity Awareness rule
      Implement Identity Awareness in the Firewall Rule Base

      CHAPTER 8—INTRODUCTION TO CHECK POINT VPNS

      Configure a pre-shared secret site-to-site VPN with partner sites
      Configure permanent tunnels for remote access to corporate resources
      Configure VPN tunnel sharing, given the difference between host-based, subunit-based and gateway-based tunnels

  • BENEFITS
    • BENEFITS OF ACHIEVING THIS CERTIFICATION

      Training by best security expert or well experienced trainers.

      International BYTE CODE Training Certification + 2 years free membership of BYTE CODE

      Training under the interactive and lab intensive environment equips the professionals with in-depth knowledge.

      The professionals can confirm their potentials of being an expert in security systems.

      Learning from the experienced and leading experts.


  • PACKAGE DETAILS
    • COMPLETE PACHAGE DETAILS FOR INDIAN & INTERNATIONAL STUDENTS

      Our Package includes:

      Official Training by certified instructors

      Head-2-Head training by Certified Subject matter experts

      Highly interactive lectures, group exercises, and review sessions

      Intensive Hands-on Training

      2 years membership of bytecode international training group

      Chance to become country representative for bytecode

      Certification Exam Fees Included.

      Individual study environment

      Training Environment

      Practical live hacking

      Concept based training

      24/7 High speed internet connectivity

      Limited candidates in class

      Stay, food( breakfast, lunch and dinner)

      Post training support after training & certification

Email ID: info@bytecode.in
Tel No.: 011-64601115

ENQUIRE NOW












 

BYTECODE LIKE US