Our Courses

Contact Us

+1-800-281-9192 Need Help? Call Us

Enquire Now

+1
2 + 5 =

Course Description:

The Checkpoint is an industry spearhead in network security known as the next age band and a modern firewall protection system detects and governs applications and scans contents to end threats. Checkpoint is generally accepted and widely used security solutions, offering solutions to top organizations globally. The CheckPoint certification training are personalized for the skills and knowledge to work with next-generation firewall.

The CheckPoint certification training will let you acquire a stable foundation on all the fundamentals of CheckPoint and will offer knowledge to design and manage CheckPoint firewalls. Through practical projects and actual examples, you’ll learn how to improve VPN performance, debug firewall processes, and elevate management servers.

Checkpoint certification validates your skills and knowledge to apply the latest network security developments. Careerera CheckPoint certification training enables network professionals to deploy and administer checkpoint security solutions efficiently.

Audience Profile:

Our course is suitable for the mentioned

    • IT technicians
    • Network administrators
    • Network specialists
    • Security analyst
    • System engineers
    • System analyst
    • Candidates who are keen to form their careers in the network related fields.

Course Essentials:

The professionals who are desired to learn the CheckPoint must know the following:

      • Networking
      • TCP/IP protocol knowledge
      • Experience on working with Windows or UNIX Server

Course Objectives:

The basic skills that you will gain are as follows:

        • Set up security accesses in distributed settings
        • Arrange rules on web servers and gateway servers
        • Make a rule base in Smart Dashboard and assign permissions
        • CheckPoint technology overview
        • Monitor traffic and connections
        • Deployment platforms and security policies
        • User management and authentication
        • Implement identity awareness
        • Network address translations
        • Using SmartUpdate
        • Configure VPN tunnels

Course Highlights:

        • 24 Hours of the classroom/Instructor Led Online/E-learning Sessions through qualified professionals.
        • E-learning Sessions with complete E-book.
        • Actual studies, events, and training give you a broad view of the kind of Industries.
        • Value course of action, tips & techniques during sessions gear you well for the examination.
        • Test tips & considered agenda to set learners for the final examinations.
        • Needed reading material, updates, apt website links, and the reference books for students.
        • Several handouts and the courseware to download, so learners may simply refer to that material anytime.
        • 1-day money-back assurances without any query.
        • Access to the recorded version of the session as trainees misses on any live session.

Course Delivery:

        • We offer CheckPoint (CCSA|CCSE) Certification and Training classroom, Online, both online self-paced and live instructor-led interactive sessions, in which the live instructor-led pieces of training are managed by our practiced professionals from the reputed industry.
        • At Careerera, live instructor-led interactive the classes is well showed by Live Video streaming, where the candidates may learn the interactive content with the guidance of an instructor. Mentor trains the candidates through chatting and sharing the screen, and technology tools.
        • The instructors are capable enough of trailing the candidate’s learning strategy process to make them an expert in the CheckPoint field.
        • Careerera is the best innovator for CheckPoint to the candidates who are ambitious in the CheckPoint role.

Course Enables:

In this CheckPoint certification training course, the trainees will get the knowledge of :

      • The CheckPoint Technologies and their functioning
      • Deployment Platforms
      • Introduction to Security policy
      • User management & Authentication
      • External Authentication
      • Identity Awareness
      • CheckPoint VPN Introduction

Curriculum

  • Sl. No.
  • Chapter
  • Chapter - 1
  • Introduction to Check Point Technology
  • Chapter - 1.1
  • Check Point Security Management Architecture(SMART)
  • Chapter - 1.2
  • The Check Point Firewall
  • Chapter - 1.3
  • Security Gateway Inspection Architecture
  • Chapter - 1.4
  • Deployment Considerations
  • Chapter - 1.5
  • Check Point SmartConsole Clients
  • Chapter - 1.6
  • Security Management Server
  • Chapter - 1.7
  • Securing Channels of Communication
  • Chapter - 2
  • Deployment Platforms & Introduction to the Security Policy
  • Chapter - 2.1
  • Check Point Deployment Platforms
  • Chapter - 2.2
  • Check Point Gaia
  • Chapter - 2.3
  • Security Policy Basics
  • Chapter - 2.4
  • Managing Objects
  • Chapter - 2.5
  • Creating the Rule Base
  • Chapter - 2.6
  • Rule Base Management
  • Chapter - 2.7
  • Policy Management and Revision Control
  • Chapter - 3
  • Monitoring Traffic and Connections
  • Chapter - 3.1
  • SmartView Tracker
  • Chapter - 3.2
  • SmartView Monitor
  • Chapter - 3.3
  • Monitoring Suspicious Activity Rules
  • Chapter - 3.4
  • SmartView Tracker vs.SmartView Monitor
  • Chapter - 4
  • Network Address Translation
  • Chapter - 4.1
  • Introduction to NAT
  • Chapter - 4.2
  • Hid NAT
  • Chapter - 4.3
  • Choosing the Hide Address in Hide NAT
  • Chapter -4.4
  • Static NAT
  • Chapter - 4.5
  • Original Packet
  • Chapter - 4.6
  • Reply Packet
  • Chapter - 4.7
  • NAT Global Properties
  • Chapter - 4.8
  • Object Configuration – Hid NAT
  • Chapter - 4.9
  • Hide NAT Using Another Interface
  • Chapter - 4.10
  • Static NAT
  • Chapter - 4.11
  • Configuring Manual NAT
  • Chapter - 5
  • Using SmartUpdate
  • Chapter - 5.1
  • SmartUpdate Architecture
  • Chapter - 5.2
  • SmartUpdate Introduction
  • Chapter - 5.3
  • Overview of Managing Licenses
  • Chapter - 5.4
  • License Terminology
  • Chapter - 5.5
  • Upgrading Licenses
  • Chapter - 5.6
  • Retrieving License Data from Security Gateways
  • Chapter - 5.7
  • Accumulating Fresh Licenses to the License & Contract Repository
  • Chapter - 5.8
  • Importing License Files
  • Chapter - 5.9
  • Adding License Details Manually
  • Chapter - 5.10
  • Attaching Licenses
  • Chapter - 5.11
  • Detaching Licenses
  • Chapter - 5.12
  • Deleting Licenses From License & Contract Repository
  • Chapter - 5.13
  • Installation Process
  • Chapter - 6
  • User Management and Authentication
  • Chapter - 6.1
  • Creating Users and Groups
  • Chapter - 6.2
  • Security Gateway Authentication
  • Chapter - 6.3
  • User Authentication
  • Chapter - 6.4
  • Session Authentication
  • Chapter -6.5
  • Client Authentication
  • Chapter - 6.6
  • LDAP User Management with User Directory
  • Chapter - 7
  • Introduction to Check Point VPNs
  • Chapter - 7.1
  • VPN Deployments and Implementation
  • Chapter - 7.2
  • VPN Topologies
  • Chapter - 7.3
  • Special VPN Gateway Conditions
  • Chapter - 7.4
  • Access Control and VPN Communities
  • Chapter - 7.5
  • Integrating VPNs into a Rule Base
  • Chapter - 7.6
  • Remote Access VPNs
  • Chapter - 8
  • Lab Environment Setup
  • Chapter - 8.1
  • Build the Management Server
  • Chapter - 8.2
  • Build Gateways
  • Chapter - 8.3
  • Install and configure NTP
  • Chapter - 8.4
  • Upgrade to R70.1
  • Chapter - 8.5
  • Establish SIC
  • Chapter - 9
  • Management Portal
  • Chapter - 9.1
  • Configure Management Portal on corporate site
  • Chapter - 9.2
  • Test Management Portal access
  • Chapter - 9.3
  • Configure Management Portal access on partner site
  • Chapter - 9.4
  • Test Management Portal
  • Chapter - 10
  • Smart Workflow
  • Chapter - 10.1
  • Create New Administrators
  • Chapter - 10.2
  • Configure Smart Workflow
  • Chapter - 10.3
  • Open and Submit a Session for Approval
  • Chapter - 10.4
  • Disapprove the Session and Request a Modification
  • Chapter - 10.5
  • Approve the Session and Install the Policy
  • Chapter - 10.6
  • Disable Smart Workflow
  • Chapter - 11
  • Smart Provisioning
  • Chapter - 11.1
  • Enable Smart Provisioning
  • Chapter - 11.2
  • Create a New Profile
  • Chapter - 11.3
  • Assign Profile to Gateways
  • Chapter - 11.4
  • Verify Profile Changes
  • Chapter - 12
  • SSL VPN
  • Chapter - 12.1
  • Configure Connectra R66 Gateway
  • Chapter - 12.2
  • Enable Connectra Gateway in Smart Dashboard
  • Chapter - 12.3
  • Generate a file-share application in the SSL VPN tab
  • Chapter - 12.4
  • Create an Internal User
  • Chapter - 12.5
  • Assign file-share access to User Group
  • Chapter - 12.6
  • Update Rule Base for DMZ traffic
  • Chapter - 12.7
  • Verify file-share access through the User Portal
  • Chapter - 12.8
  • Configure embedded RDP
  • Chapter - 12.9
  • Shutdown and remove Connectra Server
  • Chapter - 13
  • SecureXL
  • Chapter - 13.1
  • Enable and Configure SecureXL on the Gateway
  • Chapter - 13.2
  • Open connections and verify acceleration
  • Chapter - 14
  • Deploying New Mode HA
  • Chapter - 14.1
  • Create and configure a secondary cluster member
  • Chapter - 14.2
  • Configure Gateway-Cluster object
  • Chapter - 14.3
  • Configure ClusterXL properties
  • Chapter - 14.4
  • Modify the Rule Base
  • Chapter - 14.5
  • Pass traffic through the cluster
  • Chapter - 14.6
  • Observe cluster status in Smart View Monitor
  • Chapter - 14.7
  • Perform test failovers
  • Chapter -15
  • Load Sharing Modes
  • Chapter - 15.1
  • Configure Load Sharing Unicast mode
  • Chapter - 15.2
  • Test Load Sharing Unicast mode
  • Chapter - 15.3
  • Configure Load Sharing Multicast mode
  • Chapter - 15.4
  • Test Load Sharing Multicast mode
  • Chapter - 16
  • VPN with Sticky Decision Function
  • Chapter - 16.1
  • Configure VPN in a Cluster
  • Chapter - 16.2
  • Outlook a packet capture of FTP networks without Sticky Decision function
  • Chapter - 16.3
  • Outlook a packet capture of FTP networks with Sticky Decision function
  • Chapter - 17
  • Configure Check Point QoS Policy
  • Chapter - 17.1
  • Enable and Configure Check Point QoS
  • Chapter - 17.2
  • Create Check Point QoS Rules and adjust Rule weights
  • Chapter - 17.3
  • Verify and install Policy
  • Chapter - 17.4
  • Test QoS Policy
  • Chapter - 18
  • Route-based VPNs with Static Routes
  • Chapter - 18.1
  • Configure Gateway and VPN Community objects
  • Chapter - 18.2
  • Add participating Gateway to Community
  • Chapter - 18.3
  • Configure VTI's on participating Gateways
  • Chapter - 18.4
  • Add Static Routes for internal networks
  • Chapter - 19
  • Eventia Analyzer
  • Chapter - 19.1
  • Install the Eventia Suite on CG_Corporate
  • Chapter - 19.2
  • Configure the network object in Smart Dashboard
  • Chapter - 19.3
  • Configure Eventia
  • Chapter - 19.4
  • Monitor events with Eventia

FAQs