Security administration in Check Point: Logging and SmartView Tracker

This course is included in our On-demand training solution.

Overview

To identify the components of SmartView Tracker and the data it can access and to be able to use that data to block intruders

Target Audience

system administrators, security managers, network engineers, and consultants who manage Check Point NG VPN-1/FireWall-1 gateway deployments

Prerequisites

A good understanding of networking technologies, such as IP addressing, network topologies; a working knowledge of Microsoft Windows and or Unix; an ability to identify the threats to a network and the services that they use

Expected Duration

140 min.

Course Objectives

Security administration in Check Point: Logging and SmartView Tracker

  • recognize how the Check Point logging architecture works and key tasks that can be performed using SmartView Tracker.
  • match the SmartView Tracker modes to their functions in a given scenario.
  • manage log files in Check Point.
  • change the location of a log file and export a log database.
  • search log entries and filter log queries in a given scenario.
  • apply a block in a given scenario.
  • filter a log query and apply a block in a given scenario.
  • SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?