Security Administration R77



Similar documents
Check Point Security Administrator R70

Advantages of Managed Security Services

Move over, TMG! Replacing TMG with Sophos UTM

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201

Achieving PCI-Compliance through Cyberoam

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

Fireware Essentials Exam Study Guide

Application Control and URL Filtering

74% 96 Action Items. Compliance

V1.4. Spambrella Continuity SaaS. August 2

MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments

Security Management Server

Introduction to Endpoint Security

Fortigate Features & Demo

Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures

Chapter 9 Firewalls and Intrusion Prevention Systems

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239

Cloud Services Prevent Zero-day and Targeted Attacks

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

CCNA Security 2.0 Scope and Sequence

Astaro Gateway Software Applications

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Applications erode the secure network How can malware be stopped?

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Workshop. Avril 2015 Benoit Buonassera

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Networking for Caribbean Development

McAfee Next Generation Firewall (NGFW) Administration Course

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

Zscaler Internet Security Frequently Asked Questions

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Multi-Domain Security Management

Checkpoint Check Point Provider-1 NGX (v4) Practice Test. Version 2.1

NET ACCESS HIPAA COMPLIANT FLEXCloud

Infrastruktur Sicherheit mit Checkpoint

R75. Installation and Upgrade Guide

Securing Virtualization with Check Point and Consolidation with Virtualized Security

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Introduction of Intrusion Detection Systems

SonicWALL PCI 1.1 Implementation Guide

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

Managed Security Services for Data

MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Websense Certified Engineer Web Security Professional Examination Specification

Host/Platform Security. Module 11

Forcepoint Stonesoft Management Center

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Protect your internal users on the Internet with Secure Web Gateway. Richard Bible EMEA Security Solution Architect

Uncover security risks on your enterprise network

Advantages of Managed Security Services

SSECMGT: CManaging Enterprise Security with Cisco Security Manager v4.x

Securing Networks with Cisco Routers and Switches 1.0 (SECURE)

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

SmartView Monitor. R77 Versions. Administration Guide. 21 May Classification: [Protected]

Cert Pro 4/17/01 2:05 AM Page 1 T HE C HECK P OINT. Certified Professional Program SECURE.

Security Threats VPNs and IPSec AAA and Security Servers PIX and IOS Router Firewalls. Intrusion Detection Systems

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Computer Security: Principles and Practice

E2BN Direct - Network Services for Schools and Academies

McAfee Network Security Platform Administration Course

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

Gateway Security at Stateful Inspection/Application Proxy

e2e Secure Cloud Connect Service - Service Definition Document

Computer Security DD2395

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Cisco Small Business ISA500 Series Integrated Security Appliances

Dell SonicWALL Portfolio

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

WildFire. Preparing for Modern Network Attacks

Enterprise Buyer Guide

Unified Threat Management, Managed Security, and the Cloud Services Model

Quick Start 5: Introducing and configuring Websense Cloud Web Security solution

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Did you know your security solution can help with PCI compliance too?

Introducing IBM s Advanced Threat Protection Platform

Implementing Cisco Intrusion Prevention System 7.0 (IPS)

Firewall Environments. Name

MS Managing and Maintaining Windows 8

Top 10 Reasons Enterprises are Moving Security to the Cloud

LogRhythm and PCI Compliance

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Network protection and UTM Buyers Guide

Transcription:

Security Administration R77 Validate your skills on the GAiA operating system Check Point Security Administration R77 provides an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades. During this course you will configure a Security Policy and learn about managing and monitoring a secure network, upgrading and configuring a Security Gateway and implementing a virtual private network. Course Design Technical persons who support, install, deploy or administer Check Point Software Blades should attend this course. This course include the following: System Administrators Support Analysts Security Managers Network Engineers Anyone seeking CCSA certification Prerequisites Persons attending this course should have general knowledge of TCP/IP, and working knowledge of Windows, UNIX, network technology and the internet. Instructional Method This course is available in either classroom or self-paced online formats, and includes access to a live lab environment, as well as demonstrations and the practical application of concepts through hands-on exercises. 1 Course Length 3 days Certification Information This course helps prepare for CCSA exam #156-215.77 available at VUE test centers www.vue.com/checkpoint. It contains 90 multiple-choice, scenario-based questions. A passing score is 70% or higher. The exam is based on 80% course materials and 20% hands-on experience with Check Point products. Students should have at least 6 months experience with Check Point products before challenging the exam. Course Topics Introduction to Check Point Technology Deployment Platforms Introduction to the Security Policy Monitoring Traffic and Connections Network Address Translation Using SmartUpdate User Management and Authentication

Identity Awareness Introduction to Check Point VPNs Course Objectives Include Describe Check Point s unified approach to network management, and the key elements of it Design a distributed environment Install the Security Gateway in a distributed environment Perform a backup and restore the current Gateway installation from the command line Identify critical files needed to purge or backup, import and export users and groups and add or delete administrators from the command line Deploy Gateways using the Gaia web interface Create and configure network, host and gateway objects Verify SIC establishment between the Security Management Server and the Gateway using SmartDashboard Create a basic Rule Base in SmartDashboard that includes permissions for administrative users, external services, and LAN outbound use Configure NAT rules on Web and Gateway servers Evaluate existing policies and optimize the rules based on current corporate requirements Maintain the Security Management Server with scheduled backups and policy versions to ensure seamless upgrades with minimal downtime Use Queries in SmartView Tracker to monitor IPS and common network traffic and trouble shoot events using packet data Use packet data to generate reports, trouble shoot system and security issues, and ensure network functionality Using SmartView Monitor, configure alerts and traffic counters, view a Gateway s status,monitor suspicious activity rules, analyze tunnel activity and monitor remote user access Monitor remote Gateways using SmartUpdate to evaluate the need for upgrades, new installations, and license modifications Use SmartUpdate to apply upgrade packages to single or multiple VPN-1 Gateways Upgrade and attach product licenses using SmartUpdate Centrally manage users to ensure only authenticated users securely access the corporate network either locally or remotely Manage users to access the corporate LAN by using external databases Use Identity Awareness to provide granular level access to network resources Acquire user information used by the Security Gateway to control access Define Access Roles for use in an Identity Awareness rule Implement Identity Awareness in the Firewall Rule Base Configure a pre-shared secret site-to-site VPN with partner sites Configure permanent tunnels for remote access to corporate resources Configure VPN tunnel sharing, given the difference between host-based, subunit-based and gateway-based tunnels 2 Lab Exercises Include Distributed Installations Stand-alone Security Gateway Installations

Common Tools Building a Security Policy Configure the DMZ Configure NAT Monitor with SmartView Tracker Client Authentication Identity Awareness Site-to-Site VPN between corporate and branch office 3

Check Point Secure Web Gateway 2-day course teaches how Check Point's Secure Web Gateway enables safe use of the Web and applications with real-time multi-layered protection that blocks access to malicious malware, phishing and dangerous apps by constantly updating URLs and antivirus signatures from our global network of security intelligence sensors. Course Design This course is designed for customers and partners who want to add a secure web gateway solution to their security strategy. This could include the following: System Administrators Support Analysts Network Engineer Prerequisites Successful completion of this course depends on knowledge of multiple disciplines related to network-security activities including UNIX and Windows operating systems, Certificate management, system administration, security administration and networking (TCP/IP). Instructional Method This course is available in either classroom or self-paced online formats, and includes access to a live lab environment, as well as demonstrations and the practical application of concepts through hands-on exercises. 4 Course Length 2 days Learn how to Identify and block malware Block access to dangerous websites Control access to applications and websites by person Apply Intrusion Prevention Investigate App Control and URL Filtering security events Define advanced security policy configurations How You Will Benefit: Protect your network from threats on the Web Develop a corporate web and application profile Get 360 degree visibility of your security profile and events Monitor suspicious network activities and analyze attacks Block high bandwidth apps and URLs

Course Topics How to leverage the ThreatCloud for global security intelligence How to identify and block malware How to block dangerous websites How to apply granular control of applications Why IPS is essential to a secure web How to get 360 degree visibility of your security profile and events The value of a Unified Security Policy Course Objectives Include Explain the best practices for IT Security Describe how ThreatCloud fights cybercrime Apply Antivirus Explain how URL Filtering categorizes websites Discuss how Application Control enables granular control of Web applications and social networking widgets Apply proactive intrusion prevention Detect infected hosts, identify bot outbreaks, block bot communication Describe how Identity Awareness provides granular visibility of users, groups and machines Describe how SmartEvent enables you to view users online behavior and applications Explain how Captive Portal authenticates users Describe the different between Terminal Server Identity Agent and Endpoint Identity Agent Deploy Application Control & URL Filtering Configure the Application Control & URL Filtering Policy Test Basic Application Control & URL Filtering Functionality Deploy SmartEvent Monitor Application Control and URL Filtering Activity Configure Application Control & URL Filtering Tracking Mechanisms Generate Traffic that Triggers Application Control & URL Filtering Customize SmartEvent to Present Application Control & URL Filtering Events Investigate Application Control & URL Filtering Events Identify Application Control & URL Filtering Activity 5 Lab Exercises Include Configuring User Directory Integration Protecting your network from threats on the web Developing a corporate web and application profile Defining User Exceptions and Advanced Policy Configurations Handling HTTPS Inspection Blocking high bandwidth applications and URLs Working with Captive Portal

Certification Information This exam prepares for Secure Web Gateway exam #156-726.77 available at VUE test centers www.vue.com/checkpoint. 6