- Lectures: 38
- Students: 31
CHECK POINT CERTIFIED SECURITY ADMINISTRATOR (CCSA)- R81
[Pre Recorded Video & Admin Guide]
The Check Point CCSA training and certification is mainly targeted to those candidates who want to build their career in Security domain. The Check Point Certified Security Administrator (CCSA) R81 exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of Check Point CCSA R81
PREREQUISITES
Working knowledge of Windows, UNIX, networking technology, the Internet and TCP/IP
AUDIENCE
- Technical professionals who support, install deploy or administer Check Point products
- Network and security Engineers
COURSE TOPICS:
Module 1: Overview of Firewall Technologies
- What is a Firewall
- Firewall Technologies
- Legacy or Traditional Firewalls
- Next Generation Firewalls
Module 2: Introduction to Checkpoint Technology
- Security Management Architecture – SMART
- Checkpoint Core Systems – 3 Tier Architecture
- Secure Internal Communication – SIC
- Internal Certificate Authority – ICA
- Initializing trust
Module 3: Checkpoint Security Solutions and Licensing
- Software Blade Architecture
- Security Gateway Software Blades
- Management Server Software Blades
- Licensing overview
Module 4: Checkpoint Firewall Deployment
- Deployment Platforms
- Checkpoint Gaia OS
- Standalone Deployment
- Distributed Deployment
Module 5: Gaia OS Installation and Configuration
- Preparing for LAB
- Gaia OS Installation
- Initial Configuration – WebUI
- Downloading and Installing Smart Console
Module 6: Secure Internal communication (SIC)
- Smart console access to management Server
- Creating Security gateway object
- SIC establishment
- Verifying Policy installation
Module 7: Anti spoofing
- Understanding IP spoofing
- Prevention and tracking
- Network group
Module 8: Security Policy Management
- Security Policy Basics
- Implicit and Explicit Security rules
- Publishing Security Policy
- Installing Security Policy
Module 9: Logging and Monitoring
- Security and Audit Logs
- Smart View Monitor
- Monitoring Traffic and Connections
Module 10: HTTPS Inspection
- SSL Handshake
- Digital Certificate
- Inbound and outbound Inspection
- Enabling HTTPS Inspection
- HTTPS Inspection Policy
Module 11: Application Control and URL Filtering
- Application and URL Filtering Blades
- Editing Policy Layer
- Creating Security Rule
- Monitoring Application and URL Filtering
Module 12: Zone Based Security Rule
- Understanding Security Zone
- Creating Zone Based security Rule
Module 13: Inline Layer Policy
- Benefits of Inline Layer Policy
- Creating Inline Layer Policy
Module 14: Suspicious Activity Rules
- Understanding SAM Rule
- Creating SAM Rule from Smart View Monitor
Module 15: Network Address Translation – NAT
- Introduction to NAT
- Types of NAT – Static and Hide NAT
- Automatic Vs Manual NAT
- Manual Proxy ARP – Local.arp
- NAT – Global Properties
Module 16: Managing User Access
- Identity Awareness
- Methods for Acquiring Identity
- Light Weight Directory Access Protocol – LDAP
Module 17: Threat Prevention Solution
- Threat Prevention Components
- Threat Prevention Profiles
Module 18: Intrusion Prevention System (IPS)
- IPS Software Blade
- IPS Protection
Module 19: Anti Virus and Anti Bot
- Anti Virus
- Anti Bot
Module 20: Sand Blast
- Sandblast – Threat Emulation
- Sandblast – Threat extraction
Module 21: Adding a Second Security Gateway
- Creating Security Rule for SIC
- Control connections and NAT
- Policy Packages
Module 22: Virtual Private Network
- VPN Overview
- IPsec site to site VPN
- Internet Key Exchange (IKE)
- Phase 1 and Phase 2 Tunnels
- Domain Based VPN Vs Route Based VPN
- VPN Community and Domain
Module 23: IPsec site to Site VPN Configuration
- Creating VPN Community
- Encryption Domains
- IKE Phase 1 and Phase 2 Attributes
Module 24: IPsec S2S VPN between Checkpoint and Cisco
- Configuring Cisco Router
- Interoperable Device Object
- Checkpoint Gateway Configuration
Module 25: Troubleshooting IPsec VPN
- VPN Debug
- Analyzing debug log with Ikeview tool
Module 26: Remote Access VPN
- Clientless Vs Client based
- SSL VPN
- Split Tunnelling
Module 27: Backup and Snapshot
- Database Revisions
- Backup and Restore
- Snapshot and Revert
Module 28: CLI and Troubleshooting
- Clish and Bash (Expert Mode)
- Important commands
- TCPDUMP and fw monitor
Module 29: Packet Flow
Module 30: IPSec VPN Troubleshooting (Scenario based)
Module 31: Checkpoint Admin Guide (PDF)
-
Module 1: Overview of Firewall Technologies (Preview)
-
Module 2: Introduction to Checkpoint Technology (Preview)
-
Module 3: Checkpoint Security Solutions and Licensing
-
Lecture 3.1Checkpoint Security Solutions and Licensing28m
-
-
Module 4: Checkpoint Firewall Deployment
-
Lecture 4.1Checkpoint Firewall Deployment43m
-
-
Module 5: Gaia OS Installation and Configuration
-
Lecture 5.1Gaia OS Installation and Configuration1h20m
-
-
Module 6: Secure Internal communication (SIC)
-
Lecture 6.1Secure Internal communication49m
-
-
Module 7: Anti spoofing
-
Lecture 7.1Anti spoofing1h4m
-
-
Module 8: Security Policy Management
-
Lecture 8.1Security Policy Management (PART 1)42m
-
Lecture 8.2Security Policy Management (PART 2)31m
-
Lecture 8.3Security Policy Management (PART 3)57m
-
-
Module 9: Logging and Monitoring
-
Lecture 9.1Logging and Monitoring50m
-
-
Module 10: HTTPS Inspection
-
Lecture 10.1HTTPS Inspection (PART 1)48m
-
Lecture 10.2HTTPS Inspection (PART 2)33m
-
-
Module 11: Application Control and URL Filtering
-
Lecture 11.1Application Control and URL Filtering47m
-
-
Module 12: Zone Based Security Rule
-
Lecture 12.1Zone Based Security Rule19m
-
-
Module 13: Inline Layer Policy
-
Lecture 13.1Inline Layer Policy22m
-
-
Module 14: Suspicious Activity Rule
-
Lecture 14.1Suspicious Activity Rule (SAM)22m
-
-
Module 15: Network Address Translation
-
Lecture 15.1Network Address Translation (PART 1)1h10m
-
Lecture 15.2Network Address Translation (PART 2)1h33m
-
Lecture 15.3Network Address Translation (PART 3)1h20m
-
-
Module 16: Managing User Access
-
Lecture 16.1Managing User Access (PART 1)54m
-
Lecture 16.2Managing User Access (PART 2)52m
-
-
Module 17: Threat Prevention Solution
-
Lecture 17.1Threat Prevention Solution18m
-
-
Module 18: Intrusion Prevention System (IPS)
-
Lecture 18.1Intrusion Prevention System (IPS)46m
-
-
Module 19: Anti Virus and Anti Bot
-
Lecture 19.1Anti Virus and Anti Bot9m
-
-
Module 20: Sand Blast
-
Lecture 20.1Sand Blast11m
-
-
Module 21: Adding a Second Security Gateway
-
Lecture 21.1Adding a Second Security Gateway56m
-
-
Module 22: Virtual Private Network
-
Lecture 22.1Virtual Private Network (PART 1)1h2m
-
Lecture 22.2Virtual Private Network (PART 2)40m
-
-
Module 23: IPsec site to Site VPN Configuration
-
Lecture 23.1IPsec site to Site VPN Configuration48m
-
-
Module 24: IPsec S2S VPN between Checkpoint and Cisco
-
Lecture 24.1IPsec S2S VPN between Checkpoint and Cisco25m
-
-
Module 25: Troubleshooting IPsec VPN
-
Lecture 25.1Troubleshooting IPsec VPN33m
-
-
Module 26: Remote Access VPN
-
Lecture 26.1Remote Access VPN1h17m
-
-
Module 27: Database Revision, Backup and Snapshot
-
Lecture 27.1Backup and Snapshot45m
-
-
Module 28: CLI and Troubleshooting
-
Lecture 28.1CLI and Troubleshooting1h9m
-
-
Module 29: Packet Flow
-
Lecture 29.1Packet Flow31m
-
-
Module 30: IPSec VPN Troubleshooting (Scenario based)
-
Lecture 30.1IPSec VPN Troubleshooting (Scenario based)1h6m
-
-
Module 31: Checkpoint Admin Guide (PDF)
-
Lecture 31.1Checkpoint Firewall Admin Guide (PDF)
-
(2) Comments