Security administration in Check Point: Introduction to Firewalls and Check Point

This course is included in our On-demand training solution.

Overview

To identify the functions of a firewall and identify the methods used by Check Point to execute those functions

Target Audience

system administrators, security managers, network engineers, and consultants who manage Check Point NG VPN-1/FireWall-1 gateway deployments

Prerequisites

A good understanding of networking technologies, such as IP addressing, network topologies; a working knowledge of Microsoft Windows and or Unix; an ability to identify the threats to a network and the services that they use

Expected Duration

160 min.

Course Objectives

Security administration in Check Point: Introduction to Firewalls and Check Point

  • recognize firewall technologies and security policy components.
  • install Check Point VPN-1/Firewall-1 NG.
  • install Check Point VPN-1/Firewall-1 NG.
  • recognize how Check Point VPN-1/Firewall-1 NG operates.
  • recognize how internal communications are secured using Check Point VPN-1/FireWall-1 NG.
  • identify the functions of Check Point firewall license types and SmartUpdate Managers.
  • match the Check Point command-line utilities to their functions.
  • use Check Point command-line utilities to carry out management tasks in a given scenario.
  • SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?