Checkpoint Certification Training

Enquire Now

6 + 8 =

Course Description:

The Checkpoint is an industry spearhead in network security known as the next age band and a modern firewall protection system detects and governs applications and scans contents to end threats. Checkpoint is generally accepted and widely used security solutions, offering solutions to top organizations globally. The CheckPoint certification training are personalized for the skills and knowledge to work with next-generation firewall.

The CheckPoint certification training will let you acquire a stable foundation on all the fundamentals of CheckPoint and will offer knowledge to design and manage CheckPoint firewalls. Through practical projects and actual examples, you’ll learn how to improve VPN performance, debug firewall processes, and elevate management servers.

Checkpoint certification validates your skills and knowledge to apply the latest network security developments. Careerera CheckPoint certification training enables network professionals to deploy and administer checkpoint security solutions efficiently.

Audience Profile:

Our course is suitable for the mentioned

    • IT technicians
    • Network administrators
    • Network specialists
    • Security analyst
    • System engineers
    • System analyst
    • Candidates who are keen to form their careers in the network related fields.

Course Essentials:

The professionals who are desired to learn the CheckPoint must know the following:

      • Networking
      • TCP/IP protocol knowledge
      • Experience on working with Windows or UNIX Server

Course Objectives:

The basic skills that you will gain are as follows:

        • Set up security accesses in distributed settings
        • Arrange rules on web servers and gateway servers
        • Make a rule base in Smart Dashboard and assign permissions
        • CheckPoint technology overview
        • Monitor traffic and connections
        • Deployment platforms and security policies
        • User management and authentication
        • Implement identity awareness
        • Network address translations
        • Using SmartUpdate
        • Configure VPN tunnels

Course Highlights:

        • 24 Hours of the classroom/Instructor Led Online/E-learning Sessions through qualified professionals.
        • E-learning Sessions with complete E-book.
        • Actual studies, events, and training give you a broad view of the kind of Industries.
        • Value course of action, tips & techniques during sessions gear you well for the examination.
        • Test tips & considered agenda to set learners for the final examinations.
        • Needed reading material, updates, apt website links, and the reference books for students.
        • Several handouts and the courseware to download, so learners may simply refer to that material anytime.
        • 1-day money-back assurances without any query.
        • Access to the recorded version of the session as trainees misses on any live session.

Course Delivery:

        • We offer CheckPoint (CCSA|CCSE) Certification and Training classroom, Online, both online self-paced and live instructor-led interactive sessions, in which the live instructor-led pieces of training are managed by our practiced professionals from the reputed industry.
        • At Careerera, live instructor-led interactive the classes is well showed by Live Video streaming, where the candidates may learn the interactive content with the guidance of an instructor. Mentor trains the candidates through chatting and sharing the screen, and technology tools.
        • The instructors are capable enough of trailing the candidate’s learning strategy process to make them an expert in the CheckPoint field.
        • Careerera is the best innovator for CheckPoint to the candidates who are ambitious in the CheckPoint role.

Course Enables:

In this CheckPoint certification training course, the trainees will get the knowledge of :

      • The CheckPoint Technologies and their functioning
      • Deployment Platforms
      • Introduction to Security policy
      • User management & Authentication
      • External Authentication
      • Identity Awareness
      • CheckPoint VPN Introduction
The CheckPoint is becoming the go-to solution for many IT operations with a huge demand for certified professionals all over the world. Many foremost global organizations are accepting CheckPoint firewalls for their security operations. Observing this demand for CheckPoint professionals, this training course is supportive to make your career.
The training course is delivered by our certified professionals with rich training experience. All of them have gone through a tough selection process and a training demo formerly they are certified to train for us. We also confirm that only those trainers with a great alumni rating continue to train for us
In such a case, you may request to attend the required classes again depending on the availability of batches.
Yes, without any second thought given Careerera will always be there to help you and clear all your doubts if any. You may attend extra classes, interact with your mentors and get help always.
Sl. No. Chapter
Chapter - 1 Introduction to Check Point Technology
Chapter - 1.1 Check Point Security Management Architecture(SMART)
Chapter - 1.2 The Check Point Firewall
Chapter - 1.3 Security Gateway Inspection Architecture
Chapter - 1.4 Deployment Considerations
Chapter - 1.5 Check Point SmartConsole Clients
Chapter - 1.6 Security Management Server
Chapter - 1.7 Securing Channels of Communication
Chapter - 2 Deployment Platforms & Introduction to the Security Policy
Chapter - 2.1 Check Point Deployment Platforms
Chapter - 2.2 Check Point Gaia
Chapter - 2.3 Security Policy Basics
Chapter - 2.4 Managing Objects
Chapter - 2.5 Creating the Rule Base
Chapter - 2.6 Rule Base Management
Chapter - 2.7 Policy Management and Revision Control
Chapter - 3 Monitoring Traffic and Connections
Chapter - 3.1 SmartView Tracker
Chapter - 3.2 SmartView Monitor
Chapter - 3.3 Monitoring Suspicious Activity Rules
Chapter - 3.4 SmartView Tracker vs.SmartView Monitor
Chapter - 4 Network Address Translation
Chapter - 4.1 Introduction to NAT
Chapter - 4.2 Hid NAT
Chapter - 4.3 Choosing the Hide Address in Hide NAT
Chapter -4.4 Static NAT
Chapter - 4.5 Original Packet
Chapter - 4.6 Reply Packet
Chapter - 4.7 NAT Global Properties
Chapter - 4.8 Object Configuration – Hid NAT
Chapter - 4.9 Hide NAT Using Another Interface
Chapter - 4.10 Static NAT
Chapter - 4.11 Configuring Manual NAT
Chapter - 5 Using SmartUpdate
Chapter - 5.1 SmartUpdate Architecture
Chapter - 5.2 SmartUpdate Introduction
Chapter - 5.3 Overview of Managing Licenses
Chapter - 5.4 License Terminology
Chapter - 5.5 Upgrading Licenses
Chapter - 5.6 Retrieving License Data from Security Gateways
Chapter - 5.7 Accumulating Fresh Licenses to the License & Contract Repository
Chapter - 5.8 Importing License Files
Chapter - 5.9 Adding License Details Manually
Chapter - 5.10 Attaching Licenses
Chapter - 5.11 Detaching Licenses
Chapter - 5.12 Deleting Licenses From License & Contract Repository
Chapter - 5.13 Installation Process
Chapter - 6 User Management and Authentication
Chapter - 6.1 Creating Users and Groups
Chapter - 6.2 Security Gateway Authentication
Chapter - 6.3 User Authentication
Chapter - 6.4 Session Authentication
Chapter -6.5 Client Authentication
Chapter - 6.6 LDAP User Management with User Directory
Chapter - 7 Introduction to Check Point VPNs
Chapter - 7.1 VPN Deployments and Implementation
Chapter - 7.2 VPN Topologies
Chapter - 7.3 Special VPN Gateway Conditions
Chapter - 7.4 Access Control and VPN Communities
Chapter - 7.5 Integrating VPNs into a Rule Base
Chapter - 7.6 Remote Access VPNs
Chapter - 8 Lab Environment Setup
Chapter - 8.1 Build the Management Server
Chapter - 8.2 Build Gateways
Chapter - 8.3 Install and configure NTP
Chapter - 8.4 Upgrade to R70.1
Chapter - 8.5 Establish SIC
Chapter - 9 Management Portal
Chapter - 9.1 Configure Management Portal on corporate site
Chapter - 9.2 Test Management Portal access
Chapter - 9.3 Configure Management Portal access on partner site
Chapter - 9.4 Test Management Portal
Chapter - 10 Smart Workflow
Chapter - 10.1 Create New Administrators
Chapter - 10.2 Configure Smart Workflow
Chapter - 10.3 Open and Submit a Session for Approval
Chapter - 10.4 Disapprove the Session and Request a Modification
Chapter - 10.5 Approve the Session and Install the Policy
Chapter - 10.6 Disable Smart Workflow
Chapter - 11 Smart Provisioning
Chapter - 11.1 Enable Smart Provisioning
Chapter - 11.2 Create a New Profile
Chapter - 11.3 Assign Profile to Gateways
Chapter - 11.4 Verify Profile Changes
Chapter - 12 SSL VPN
Chapter - 12.1 Configure Connectra R66 Gateway
Chapter - 12.2 Enable Connectra Gateway in Smart Dashboard
Chapter - 12.3 Generate a file-share application in the SSL VPN tab
Chapter - 12.4 Create an Internal User
Chapter - 12.5 Assign file-share access to User Group
Chapter - 12.6 Update Rule Base for DMZ traffic
Chapter - 12.7 Verify file-share access through the User Portal
Chapter - 12.8 Configure embedded RDP
Chapter - 12.9 Shutdown and remove Connectra Server
Chapter - 13 SecureXL
Chapter - 13.1 Enable and Configure SecureXL on the Gateway
Chapter - 13.2 Open connections and verify acceleration
Chapter - 14 Deploying New Mode HA
Chapter - 14.1 Create and configure a secondary cluster member
Chapter - 14.2 Configure Gateway-Cluster object
Chapter - 14.3 Configure ClusterXL properties
Chapter - 14.4 Modify the Rule Base
Chapter - 14.5 Pass traffic through the cluster
Chapter - 14.6 Observe cluster status in Smart View Monitor
Chapter - 14.7 Perform test failovers
Chapter -15 Load Sharing Modes
Chapter - 15.1 Configure Load Sharing Unicast mode
Chapter - 15.2 Test Load Sharing Unicast mode
Chapter - 15.3 Configure Load Sharing Multicast mode
Chapter - 15.4 Test Load Sharing Multicast mode
Chapter - 16 VPN with Sticky Decision Function
Chapter - 16.1 Configure VPN in a Cluster
Chapter - 16.2 Outlook a packet capture of FTP networks without Sticky Decision function
Chapter - 16.3 Outlook a packet capture of FTP networks with Sticky Decision function
Chapter - 17 Configure Check Point QoS Policy
Chapter - 17.1 Enable and Configure Check Point QoS
Chapter - 17.2 Create Check Point QoS Rules and adjust Rule weights
Chapter - 17.3 Verify and install Policy
Chapter - 17.4 Test QoS Policy
Chapter - 18 Route-based VPNs with Static Routes
Chapter - 18.1 Configure Gateway and VPN Community objects
Chapter - 18.2 Add participating Gateway to Community
Chapter - 18.3 Configure VTI's on participating Gateways
Chapter - 18.4 Add Static Routes for internal networks
Chapter - 19 Eventia Analyzer
Chapter - 19.1 Install the Eventia Suite on CG_Corporate
Chapter - 19.2 Configure the network object in Smart Dashboard
Chapter - 19.3 Configure Eventia
Chapter - 19.4 Monitor events with Eventia

StudentS' Review & Feedback

No Review & Feedback