Prerequisites
To apply for the Checkpoint Training, you need to either:
- You should have a basic understanding of computer networking concepts like TCP/IP, DNS and firewalls
- You should have a basic understanding of Operating systems like Windows & Linux
- You should have a basic understanding of security concepts like access control, encryption and authentication
- You should also be familiar with at least one programming language like Java, Ruby or Python.
Course Curriculum
Module 1: Introduction to Checkpoint Technologies
- 1.1 Checkpoint certified security administrator
- 1.2 What’s new in checkpoint R77.10
- 1.3 Checkpoint’s Architecture
- 1.4 Implementing 3 tier Architecture of checkpoint
Module 2: Deployment platforms
- 2.1 Checkpoint supported platforms
- 2.2 Installing Checkpoint on Windows o/s
- 2.3 Installing Checkpoint on Linux o/s
- 2.4 Installing Checkpoint on SPLAT
- 2.5 Installing Checkpoint on GAiA
- 2.6 Configuring checkpoint in standard setup
- 2.7 Configuring checkpoint in a distributed setup
Module 3: Introduction to Security Policy
- 3.1 Understanding Checkpoint Licensing
- 3.2 VerifySIC establishment between the Security Management Server and the Gateway using 3.3 Smart Dashboard
- 3.4 Creating a basic Rulebase
- 3.5 Implicit rules vs Explicit rules
- 3.6 Configuring hide NAT
- 3.7 Configuring Static NAT
Module 4: External Authentication
- 4.1 Creating LDAP and TACACS+ objects
- 4.2 Integrating active directory server with checkpoint gateway
- 4.3 Configuring Tacacs+ server
- 4.4 Integrating Tacacs+ server with checkpoint gateway
Module 5: User Management and Authentication
- 5.1 Configure user and group accounts in checkpoint
- 5.2 Configure policies for authentication
- 5.3 Local Authentication Methods
- 5.4 Configuring user authentication
- 5.5 Configuring Session authentication
- 5.6 Configuring Client Authentication
Module 6: Identity Awareness
- 6.1 Introduction to Identity Awareness
- 6.2 Configuring Identity Awareness
- 6.3 Using Identity awareness to provide access to a network resource
Module 7: Introduction to Checkpoint VPN
- 7.1 Understanding VPN terminology
- 7.2 Configuring Remote access VPN
- 7.3 Implementing site-to-site VPN with head office and Branch office
Module 8: Monitoring with Smart View
- 8.1 Using Smart View trackers for Analyzing logs
- 8.2 Using Smart View Monitor for monitoring traffic
- 8.3 Using queries in Smart View tracker
- 8.4 Filtering logs in SmartView tracker
Module 9: Advanced Firewall
- 9.1 Debugging firewall Modules
- 9.2 Upgrade and troubleshoot Management server
- 9.3 Performing Backup of the Management server
- 9.4 Backup using snapshot
- 9.5 Backup using cpbackup
- 9.6 Backup using upgrade tools
Module 10: Command-line Administration
- 10.1 Understanding standard mode and Expert mode shells
- 10.2 Running Checkpoint commands
- 10.3 Accessing Firewall Directory
Module 11: UTM Features
- 11.1 Configuring Antivirus blade in checkpoint gateway
- 11.2 Verifying Antivirus modules
- 11.3 Implementing content filtering
- 11.4 Configuring CVP and ufp policies
- 11.5 Configuring URL filtering
- 11.6 Testing URL filtering
Module 12: Advanced UTM Features
- 12.1 Checkpoint security expert
- 12.2 Debugging firewall Modules
- 12.3 Upgrade and troubleshoot Management server
- 12.4 Performing Backup of the Management server
- 12.5 Backup using snapshot
- 12.6 Backup using cpbackup
- 12.7 Backup using upgrade tools
Module 13: IDS/IPS
- 13.1 Configuring IPS blade
- 13.2 Updating IPS signatures
- 13.3 Configuring IPS policies
- 13.4 Customizing IPS profiles
- 13.5 Implementing location-based restrictions
- 13.6 Verifying IPS
Module 14: QoS
- 14.1 Understanding Checkpoint QoS architecture
- 14.2 Enabling QoS blade
- 14.3 Bandwidth Monitoring using QoS
- 14.4 Segregate Bandwidth to different networks
- 14.5 Writing QoS policies in a rule base
Module 15: CLUSTERING
- 15.1 Building clusterXL for load balancing
- 15.2 Adding gateways into a cluster
- 15.3 Verify Load balancing
- 15.4 Building clusterXL for High Availability
- 15.5 Deploying HA on an Enterprise network
- 15.6 Verifying HA using smartview monitor
- 15.7 Management server Clustering
- 15.8 Management server recovery