YoVDO

Check Point CCSA

Offered By: Udemy

Tags

Network Security Courses VPN Courses Access Control Policies Courses IPsec Courses

Course Description

Overview

Learn all about Check Point firewall administration. Master to deploy Checkpoint blades efficiently. Upgrade to R80.30

What you'll learn:
  • CheckPoint General Knowledge
  • Setting up a cluster
  • Threat Prevention policy Management
  • Access Control policy Management
  • VPN
  • HTTPs inspection
  • Ipsec

The following course includes lectures on how Check Point features work and the walk-through of the configuration in the lab/production environment. From the very beginning following step-by-step approach you will be able to grasp advanced concepts and step on the next level.

The course is structured in an easy to follow manner starting from the very basic to advanced topics [CCSE topics included]. The topics that are covered are: Installing Check Point in a lab environment, understanding general principles of Firewalling. Then, we move to the whole Check Point ECOSYSTEM (Everything that has to do with unified management and managing firewall policies) and so much more.


THECOURSEINCLUDES:

Introduction to CheckPoint Technology

  • Building the Lab

  • Installing OS / Configuration

  • Overview of the products

  • Checkpoint Stateful inspection firewall

  • Licensing

CheckPoint Eco System

  • SIC

  • !Restarting SIC without CPstop/CPstart - Extra!

  • Backups

  • NAT

  • Policy configuration (Access Control) Firewall

  • Policy configuration (Access Control) APP control/URL filtering

  • UserCheck

  • Policy configuration (Threat Prevention)

  • Hacking and Protecting by IPS

  • Enforced Suspicious Activity Rules

  • Logging and Reports

VPN (Virtual Private Network)

  • IPSec (Overview)

  • SSL (Overview)

  • Deploy VPN IPSEC [LAB]

ClusterXL

  • High Availability / Load Sharing

  • Deploy ClusterXL [LAB]

  • CCP Overview

HTTPS Inspection

  • HTTPs inspection

  • HTTPs inspection LAB

CCSE Pre-course (Advanced) [This section will be updated incrementally]

  • Threat Emulation licensing and deployment in the cloud

  • Transparent Upgrade to R80.30 in a cluster


Bonus: Lab guides included


I have applied the streamlined, step-by-step method to excel as a Check Pointprofessional in less time than you ever thought possible. I'm going to walk you through the main challenges, so you can step on the next level.


Taught by

Evgenii Puzakov

Related Courses

Hybrid Cloud Service Mesh with Anthos
Google Cloud via Coursera
Security Policies and Standards Automation on AWS for DevOps Engineers
Pluralsight