SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Check Point Security Administration NGX I Course Overview
Course Description Objectives Describe Check Point’s unified approach to network management, and the key elements of this architecture Design a distributed environment using the network detailed in the course topology Install the Security Gateway version R71 in a distribute environment using the network detailed in the course topology Given Check Point’s latest integration of CoreXL technology, select the best security solution for your corporate environment Given network specifications, perform a backup and restore the current Gateway installation from the command line Check Point Security Administration NGX R71 I
Course Description Objectives Identify critical files needed to purge or backup, import and export users and groups and add or delete administrators from the command line Deploy Gateways using sysconfig and cpconfig from the Gateway command line Use the Command Line to assist support in troubleshooting common problems on the Security Gateway Given the network topology, create and configure network, host and gateway objects Verify SIC establishment between the SmartCenter Server and the Gateway using SmartDashboard Create a basic Rule Base in SmartDashboard that includes permissions for administrative users, external services, and LAN outbound use Check Point Security Administration NGX R71 I
Course Description Objectives Configure NAT rules on Web and Gateway servers Evaluate existing policies and optimize the rules based on current corporate requirements Maintain the Security Management Server with scheduled backups and policy versions to ensure seamless upgrades and minimal downtime Use queries in SmartView Tracker to monitor IPS and common network traffic and troubleshoot events using packet data Using packet data on a given corporate network, generate reports, troubleshoot system and security issues, and ensure network functionality Using SmartView Monitor, configure alerts and traffic counters, view a Gateway's status, monitor suspicious activity rules, analyze tunnel activity and monitor remote user access based on corporate requirements Check Point Security Administration NGX R71 I
Course Description Objectives Monitor remote Gateways using SmartUpdate to evaluate the need for upgrades, new installations, and license modifications Use SmartUpdate to apply upgrade packages to single or multiple VPN-1 Gateways Upgrade and attach product licenses using SmartUpdate Centrally manage users to ensure only authenticated users securely access the corporate network either locally or remotely Manage users to access to the corporate LAN by using external databases Select the most appropriate encryption algorithm when securing communication over a VPN, based on corporate requirements Check Point Security Administration NGX R71 I
Course Description Objectives Establish VPN connections to partner sites in order to establish access to a central database by configuring Advanced IKE properties Configure a pre-shared secret site-to-site VPN with partner sites Configure a certificate based site-to-site VPN using one partner's internal Configure a certificate based site-to-site VPN using a third-party CA Configure permanent tunnels for remote access to corporate resources Configure VPN tunnel sharing, given the difference between host-based, subnet-based and gateway-based tunnels Check Point Security Administration NGX R71 I
Course Description Objectives Configure Check Point Messaging Security to test IP Reputation, content based anti-spam, and zero hour virus detection Based on network analysis disclosing threats by specific sites, configure a Web-filtering and antivirus policy to filter and scan traffic Implement default or customized profiles to designated Gateways in the corporate network Check Point Security Administration NGX R71 I
Course Layout Course Requirements Prerequisites Check Point Certified Security Administrator (CCSA) Check Point Security Administration NGX R71 I
The course is geared towards System administators Support analysts Network engineers Course Requirements
Each delegate should have : General knowledge of TCP/IP Working knowledge of Windows and/or Unix Working knowledge of network technology Working knowledge of the Internet Pre-requisites
Course Map Module 1: Check Point Technology Overview Module 2: Deployment Platforms Module 3: Introduction to the Security Policy Module 4: Monitoring Traffic and Connections Module 5: Using SmartUpdate Module 6: Upgrading to R71 Module 7: User Management and Authentication Module 8: Encryption and VPNs Module 9: Introduction to VPNs Module 10: Messaging and Content Security Course Map
Lab Setup Lab Topology IP Addresses Lab Terms Lab Stations Lab Setup
Lab Topology
NGX R71 Security Software Containers by Platform
NGX R71 Security Gateway Software Blades by Platform
NGX R71 Security Management Software Blades by Platform
NGX R71 Minimum RequirementSecurity Management Server
NGX R71 SmartConsoleHardware Requirements
End End of Course Overview

Weitere ähnliche Inhalte

Was ist angesagt?

Security Advantages of Software-Defined Networking
Security Advantages of Software-Defined NetworkingSecurity Advantages of Software-Defined Networking
Security Advantages of Software-Defined NetworkingPriyanka Aash
 
Chapter 5 overview
Chapter 5 overviewChapter 5 overview
Chapter 5 overviewali raza
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bellCisco Canada
 
Managing Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network SecurityManaging Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network Securityshira koper
 
Kaspersky Security center 10 documentation
Kaspersky Security center 10  documentationKaspersky Security center 10  documentation
Kaspersky Security center 10 documentationTarek Amer
 
OWASP Brisbane - SDN Security
OWASP Brisbane - SDN SecurityOWASP Brisbane - SDN Security
OWASP Brisbane - SDN SecurityDavid Jorm
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Decisions
 
Migrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best PracticesMigrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best Practicesshira koper
 
Carrier grade linux maintenance
Carrier grade linux maintenanceCarrier grade linux maintenance
Carrier grade linux maintenanceNagesh Kollu
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarCisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarAlgoSec
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk managementAEC Networks
 
Securing Traditional Workloads on AWS
Securing Traditional Workloads on AWSSecuring Traditional Workloads on AWS
Securing Traditional Workloads on AWSTim Feng
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...AlgoSec
 
Cisco Security Technical Alliance
Cisco Security Technical AllianceCisco Security Technical Alliance
Cisco Security Technical AllianceCisco DevNet
 

Was ist angesagt? (20)

Fire Eye Appliance Quick Start
Fire Eye Appliance Quick StartFire Eye Appliance Quick Start
Fire Eye Appliance Quick Start
 
Security Advantages of Software-Defined Networking
Security Advantages of Software-Defined NetworkingSecurity Advantages of Software-Defined Networking
Security Advantages of Software-Defined Networking
 
Chapter 5 overview
Chapter 5 overviewChapter 5 overview
Chapter 5 overview
 
CV Steve Shawcross
CV Steve ShawcrossCV Steve Shawcross
CV Steve Shawcross
 
KRACK attack
KRACK attackKRACK attack
KRACK attack
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
Managing Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network SecurityManaging Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network Security
 
Kaspersky Security center 10 documentation
Kaspersky Security center 10  documentationKaspersky Security center 10  documentation
Kaspersky Security center 10 documentation
 
6421 b Module-09
6421 b Module-096421 b Module-09
6421 b Module-09
 
OWASP Brisbane - SDN Security
OWASP Brisbane - SDN SecurityOWASP Brisbane - SDN Security
OWASP Brisbane - SDN Security
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto Stop
 
Migrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best PracticesMigrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best Practices
 
Carrier grade linux maintenance
Carrier grade linux maintenanceCarrier grade linux maintenance
Carrier grade linux maintenance
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarCisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
Securing Traditional Workloads on AWS
Securing Traditional Workloads on AWSSecuring Traditional Workloads on AWS
Securing Traditional Workloads on AWS
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
 
Matrix
MatrixMatrix
Matrix
 
Cisco Security Technical Alliance
Cisco Security Technical AllianceCisco Security Technical Alliance
Cisco Security Technical Alliance
 
SDN-ppt-new
SDN-ppt-newSDN-ppt-new
SDN-ppt-new
 

Andere mochten auch

Vlg Loss Prevention & Secruity Engels
Vlg Loss Prevention & Secruity EngelsVlg Loss Prevention & Secruity Engels
Vlg Loss Prevention & Secruity Engelspascalverbaten
 
Twd Capabilities 2009
Twd Capabilities  2009Twd Capabilities  2009
Twd Capabilities 2009haneyd
 
Summer School - Security in SOA
Summer School - Security in SOASummer School - Security in SOA
Summer School - Security in SOAWSO2
 
Perimeter Security Scenario Questions
Perimeter Security Scenario QuestionsPerimeter Security Scenario Questions
Perimeter Security Scenario QuestionsJohn N. Motlagh
 
Building Automation and Control Systems - Atlanta, Georgia, North Carolina, F...
Building Automation and Control Systems - Atlanta, Georgia, North Carolina, F...Building Automation and Control Systems - Atlanta, Georgia, North Carolina, F...
Building Automation and Control Systems - Atlanta, Georgia, North Carolina, F...McKenney's Inc
 
Marksmanship principles modified
Marksmanship principles modifiedMarksmanship principles modified
Marksmanship principles modifiedRobert Freeman
 
Perimeter security solutions
Perimeter security solutionsPerimeter security solutions
Perimeter security solutionsbappyni
 
Preliminary Marksmanship Instruction
Preliminary Marksmanship InstructionPreliminary Marksmanship Instruction
Preliminary Marksmanship InstructionMintcho Mintchev
 
Prime Development Inc Firearms Training
Prime Development Inc Firearms TrainingPrime Development Inc Firearms Training
Prime Development Inc Firearms TrainingJeffery Long
 
Proposal for cctv cameras
Proposal for cctv camerasProposal for cctv cameras
Proposal for cctv camerasMritunjay Kumar
 
Seminar on CCTV Cameras
Seminar on CCTV CamerasSeminar on CCTV Cameras
Seminar on CCTV CamerasSachin Sharma
 
Fundamentals Of Pistol Marksmanship
Fundamentals Of Pistol MarksmanshipFundamentals Of Pistol Marksmanship
Fundamentals Of Pistol Marksmanshipbubut97
 
CCTV Camera Presentation
CCTV Camera PresentationCCTV Camera Presentation
CCTV Camera PresentationBasith JM
 
The evolution of mobile phones
The evolution of mobile phonesThe evolution of mobile phones
The evolution of mobile phonesOlivia2590
 

Andere mochten auch (19)

Vlg Loss Prevention & Secruity Engels
Vlg Loss Prevention & Secruity EngelsVlg Loss Prevention & Secruity Engels
Vlg Loss Prevention & Secruity Engels
 
Twd Capabilities 2009
Twd Capabilities  2009Twd Capabilities  2009
Twd Capabilities 2009
 
Summer School - Security in SOA
Summer School - Security in SOASummer School - Security in SOA
Summer School - Security in SOA
 
Security Intrusion Detection & Electronic Surveillance
Security Intrusion Detection & Electronic SurveillanceSecurity Intrusion Detection & Electronic Surveillance
Security Intrusion Detection & Electronic Surveillance
 
Perimeter monitoring, detection and surveillance
Perimeter monitoring, detection and surveillancePerimeter monitoring, detection and surveillance
Perimeter monitoring, detection and surveillance
 
Perimeter Security Scenario Questions
Perimeter Security Scenario QuestionsPerimeter Security Scenario Questions
Perimeter Security Scenario Questions
 
Building Automation and Control Systems - Atlanta, Georgia, North Carolina, F...
Building Automation and Control Systems - Atlanta, Georgia, North Carolina, F...Building Automation and Control Systems - Atlanta, Georgia, North Carolina, F...
Building Automation and Control Systems - Atlanta, Georgia, North Carolina, F...
 
Fire fighting
Fire fightingFire fighting
Fire fighting
 
Marksmanship principles modified
Marksmanship principles modifiedMarksmanship principles modified
Marksmanship principles modified
 
Perimeter security solutions
Perimeter security solutionsPerimeter security solutions
Perimeter security solutions
 
Preliminary Marksmanship Instruction
Preliminary Marksmanship InstructionPreliminary Marksmanship Instruction
Preliminary Marksmanship Instruction
 
Prime Development Inc Firearms Training
Prime Development Inc Firearms TrainingPrime Development Inc Firearms Training
Prime Development Inc Firearms Training
 
Proposal for cctv cameras
Proposal for cctv camerasProposal for cctv cameras
Proposal for cctv cameras
 
Seminar on CCTV Cameras
Seminar on CCTV CamerasSeminar on CCTV Cameras
Seminar on CCTV Cameras
 
Fundamentals Of Pistol Marksmanship
Fundamentals Of Pistol MarksmanshipFundamentals Of Pistol Marksmanship
Fundamentals Of Pistol Marksmanship
 
CCTV Camera Presentation
CCTV Camera PresentationCCTV Camera Presentation
CCTV Camera Presentation
 
Cctv presentation
Cctv presentationCctv presentation
Cctv presentation
 
PPT FOR SECURITY
PPT FOR SECURITYPPT FOR SECURITY
PPT FOR SECURITY
 
The evolution of mobile phones
The evolution of mobile phonesThe evolution of mobile phones
The evolution of mobile phones
 

Ähnlich wie Check Point CCSE NGX R71 Course Overview

RESUME-GANESH D
RESUME-GANESH DRESUME-GANESH D
RESUME-GANESH DGanesh D
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...VMworld
 
Resume_Monitoring_ServiceManagement
Resume_Monitoring_ServiceManagementResume_Monitoring_ServiceManagement
Resume_Monitoring_ServiceManagementNirmit Bali
 
GDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud Boundaries
GDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud BoundariesGDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud Boundaries
GDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud BoundariesJames Anderson
 
Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...
Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...
Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...Kiran Sirupa
 
AppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the CloudAppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the CloudCryptzone
 
Using Kubernetes to make cellular data plans cheaper for 50M users
Using Kubernetes to make cellular data plans cheaper for 50M usersUsing Kubernetes to make cellular data plans cheaper for 50M users
Using Kubernetes to make cellular data plans cheaper for 50M usersMirantis
 
pcnsa-study-guide_PAN-OS_v11.0-1__01.pdf
pcnsa-study-guide_PAN-OS_v11.0-1__01.pdfpcnsa-study-guide_PAN-OS_v11.0-1__01.pdf
pcnsa-study-guide_PAN-OS_v11.0-1__01.pdfAzzeddine Salem
 
ccnp-enterprise-core-networking-encor-product-overview.pptx
ccnp-enterprise-core-networking-encor-product-overview.pptxccnp-enterprise-core-networking-encor-product-overview.pptx
ccnp-enterprise-core-networking-encor-product-overview.pptxssuserff1f40
 
Chapter 6 overview
Chapter 6 overviewChapter 6 overview
Chapter 6 overviewali raza
 
IBM Software Defined Networking = Brave New World of IT
IBM Software Defined Networking = Brave New World of  ITIBM Software Defined Networking = Brave New World of  IT
IBM Software Defined Networking = Brave New World of ITSteve Cole
 
SDN and NFV: Friends or Enemies
SDN and NFV: Friends or EnemiesSDN and NFV: Friends or Enemies
SDN and NFV: Friends or EnemiesJustyna Bak
 
Arun Resume 2017
Arun Resume 2017Arun Resume 2017
Arun Resume 2017Arun j
 
DevFest | Presentation | Final - Imran Roshan
DevFest | Presentation | Final - Imran RoshanDevFest | Presentation | Final - Imran Roshan
DevFest | Presentation | Final - Imran RoshanImranRoshan5
 

Ähnlich wie Check Point CCSE NGX R71 Course Overview (20)

Tharun Resume
Tharun ResumeTharun Resume
Tharun Resume
 
RESUME-GANESH D
RESUME-GANESH DRESUME-GANESH D
RESUME-GANESH D
 
VPN
VPNVPN
VPN
 
Vp ns
Vp nsVp ns
Vp ns
 
Prasad_Meduri
Prasad_MeduriPrasad_Meduri
Prasad_Meduri
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
 
Ccnp
CcnpCcnp
Ccnp
 
Resume_Monitoring_ServiceManagement
Resume_Monitoring_ServiceManagementResume_Monitoring_ServiceManagement
Resume_Monitoring_ServiceManagement
 
GDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud Boundaries
GDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud BoundariesGDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud Boundaries
GDG Cloud Southlake #9 Secure Cloud Networking - Beyond Cloud Boundaries
 
Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...
Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...
Intel Network Builders Summit: Key Lessons from an advanced multi-vendor NFV ...
 
AppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the CloudAppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the Cloud
 
2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a
 
Using Kubernetes to make cellular data plans cheaper for 50M users
Using Kubernetes to make cellular data plans cheaper for 50M usersUsing Kubernetes to make cellular data plans cheaper for 50M users
Using Kubernetes to make cellular data plans cheaper for 50M users
 
pcnsa-study-guide_PAN-OS_v11.0-1__01.pdf
pcnsa-study-guide_PAN-OS_v11.0-1__01.pdfpcnsa-study-guide_PAN-OS_v11.0-1__01.pdf
pcnsa-study-guide_PAN-OS_v11.0-1__01.pdf
 
ccnp-enterprise-core-networking-encor-product-overview.pptx
ccnp-enterprise-core-networking-encor-product-overview.pptxccnp-enterprise-core-networking-encor-product-overview.pptx
ccnp-enterprise-core-networking-encor-product-overview.pptx
 
Chapter 6 overview
Chapter 6 overviewChapter 6 overview
Chapter 6 overview
 
IBM Software Defined Networking = Brave New World of IT
IBM Software Defined Networking = Brave New World of  ITIBM Software Defined Networking = Brave New World of  IT
IBM Software Defined Networking = Brave New World of IT
 
SDN and NFV: Friends or Enemies
SDN and NFV: Friends or EnemiesSDN and NFV: Friends or Enemies
SDN and NFV: Friends or Enemies
 
Arun Resume 2017
Arun Resume 2017Arun Resume 2017
Arun Resume 2017
 
DevFest | Presentation | Final - Imran Roshan
DevFest | Presentation | Final - Imran RoshanDevFest | Presentation | Final - Imran Roshan
DevFest | Presentation | Final - Imran Roshan
 

Kürzlich hochgeladen

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Check Point CCSE NGX R71 Course Overview

  • 1. Check Point Security Administration NGX I Course Overview
  • 2. Course Description Objectives Describe Check Point’s unified approach to network management, and the key elements of this architecture Design a distributed environment using the network detailed in the course topology Install the Security Gateway version R71 in a distribute environment using the network detailed in the course topology Given Check Point’s latest integration of CoreXL technology, select the best security solution for your corporate environment Given network specifications, perform a backup and restore the current Gateway installation from the command line Check Point Security Administration NGX R71 I
  • 3. Course Description Objectives Identify critical files needed to purge or backup, import and export users and groups and add or delete administrators from the command line Deploy Gateways using sysconfig and cpconfig from the Gateway command line Use the Command Line to assist support in troubleshooting common problems on the Security Gateway Given the network topology, create and configure network, host and gateway objects Verify SIC establishment between the SmartCenter Server and the Gateway using SmartDashboard Create a basic Rule Base in SmartDashboard that includes permissions for administrative users, external services, and LAN outbound use Check Point Security Administration NGX R71 I
  • 4. Course Description Objectives Configure NAT rules on Web and Gateway servers Evaluate existing policies and optimize the rules based on current corporate requirements Maintain the Security Management Server with scheduled backups and policy versions to ensure seamless upgrades and minimal downtime Use queries in SmartView Tracker to monitor IPS and common network traffic and troubleshoot events using packet data Using packet data on a given corporate network, generate reports, troubleshoot system and security issues, and ensure network functionality Using SmartView Monitor, configure alerts and traffic counters, view a Gateway's status, monitor suspicious activity rules, analyze tunnel activity and monitor remote user access based on corporate requirements Check Point Security Administration NGX R71 I
  • 5. Course Description Objectives Monitor remote Gateways using SmartUpdate to evaluate the need for upgrades, new installations, and license modifications Use SmartUpdate to apply upgrade packages to single or multiple VPN-1 Gateways Upgrade and attach product licenses using SmartUpdate Centrally manage users to ensure only authenticated users securely access the corporate network either locally or remotely Manage users to access to the corporate LAN by using external databases Select the most appropriate encryption algorithm when securing communication over a VPN, based on corporate requirements Check Point Security Administration NGX R71 I
  • 6. Course Description Objectives Establish VPN connections to partner sites in order to establish access to a central database by configuring Advanced IKE properties Configure a pre-shared secret site-to-site VPN with partner sites Configure a certificate based site-to-site VPN using one partner's internal Configure a certificate based site-to-site VPN using a third-party CA Configure permanent tunnels for remote access to corporate resources Configure VPN tunnel sharing, given the difference between host-based, subnet-based and gateway-based tunnels Check Point Security Administration NGX R71 I
  • 7. Course Description Objectives Configure Check Point Messaging Security to test IP Reputation, content based anti-spam, and zero hour virus detection Based on network analysis disclosing threats by specific sites, configure a Web-filtering and antivirus policy to filter and scan traffic Implement default or customized profiles to designated Gateways in the corporate network Check Point Security Administration NGX R71 I
  • 8. Course Layout Course Requirements Prerequisites Check Point Certified Security Administrator (CCSA) Check Point Security Administration NGX R71 I
  • 9. The course is geared towards System administators Support analysts Network engineers Course Requirements
  • 10. Each delegate should have : General knowledge of TCP/IP Working knowledge of Windows and/or Unix Working knowledge of network technology Working knowledge of the Internet Pre-requisites
  • 11. Course Map Module 1: Check Point Technology Overview Module 2: Deployment Platforms Module 3: Introduction to the Security Policy Module 4: Monitoring Traffic and Connections Module 5: Using SmartUpdate Module 6: Upgrading to R71 Module 7: User Management and Authentication Module 8: Encryption and VPNs Module 9: Introduction to VPNs Module 10: Messaging and Content Security Course Map
  • 12. Lab Setup Lab Topology IP Addresses Lab Terms Lab Stations Lab Setup
  • 14. NGX R71 Security Software Containers by Platform
  • 15. NGX R71 Security Gateway Software Blades by Platform
  • 16. NGX R71 Security Management Software Blades by Platform
  • 17. NGX R71 Minimum RequirementSecurity Management Server
  • 19. End End of Course Overview