Check Point

Check Point Security Administration R77.30

Check Point Security Administration R77.30 teaches you how to install Check Point Security Gateway and Management Software Blades using common principles and skills. This program will prepare and teach you how to create a security policy, as well as how to manage and track a secure system, upgrade and configure a security gateway, and set up a virtual private network.

  • An overview of checkpoint technology
  • Recognize Check Point’s centralized network management strategy and its main components.
  • Set up a Security Gateway to build a virtual private network for both inner and remote users.
  • Maximize VPN performance and update Management Servers
  • Learn to get the backup and restore the existing Gateway installation from the command line
  • Install the Security Gateway in a distributed environment

Deployment Platforms

Get to know more about the different deployment platforms of Check Point and understand the basic working operations of these on Windows and GAiA.

Introduction to Security policy

The security policy examines how to create the rules based on network objects, evaluate the existing policies and maintain the security management server.

User management & Authentication

Teaches you to centrally manage the users to ensure that only authenticated users access the corporate network by using external databases.

Introduction to Check Point VPNs

The course helps to set up VPN tunnel sharing, given the difference between host-based, subnet-based and gateway-based tunnels.

UTM Features

Configure the antivirus blade in checkpoint gateway, verify the antivirus modules, Implement content filtering, and configure URL filtering.

Monitoring Traffic and Connections

Learn the details on the network's traffic patterns to efficiently control your network and make intelligent choices.

Scroll Up