Security administration in Check Point: User Authentication

This course is included in our On-demand training solution.

Overview

To be able to create and administer users and user authentication schemes

Target Audience

system administrators, security managers, network engineers, and consultants who manage Check Point NG VPN-1/FireWall-1 gateway deployments

Prerequisites

A good understanding of networking technologies, such as IP addressing, network topologies; a working knowledge of Microsoft Windows and or Unix; an ability to identify the threats to a network and the services that they use

Expected Duration

160 min.

Course Objectives

Security administration in Check Point: User Authentication

  • configure an authentication scheme and a server object in a given scenario.
  • create a user and a user template in a given scenario.
  • configure a Check Point administrator and a group, and install the users database in a given scenario.
  • configure user authentication and install the security policy and users database in a given scenario.
  • configure user authentication in a given scenario.
  • configure client authentication in a given scenario.
  • configure session authentication and the session authentication agent in a given scenario.
  • configure user-based authentication in a given scenario.
  • SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?