Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Check Point Firewall Ccsa R80.40 Training Part2/2

    Posted By: ELK1nG
    Check Point Firewall Ccsa R80.40 Training Part2/2

    Check Point Firewall Ccsa R80.40 Training Part2/2
    Published 4/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 6.33 GB | Duration: 11h 1m

    Learn CheckPoint Firewall CCSA R80.40 with Step by Step Lab Workbook

    What you'll learn

    Configure and Manage CheckPoint Firewall

    How to setup a Lab Environment

    Understand how to deploy Checkpoint Firewalls in EVE NG

    Configure and Manage CheckPoint User and Group

    Configure and Verify Administrator Accounts

    HTTPS Inspection

    Unified Access Control Policy

    Explicit, Stealth, Cleanup & Mgmt Rules

    Requirements

    Basic IP and security knowledge is nice to have.

    Students need to understand basic networking.

    Students needs to understand Networking Fundamentals.

    General knowledge of TCP/IP

    Working knowledge of Windows and/or UNIX

    Working knowledge of networking technology

    Description

    Check Point CCSA certification is the very important for IT admins who manage day to day operations of Checkpoint solutions. Here you will get expertise in startup, manage and configure day to day Check Point installations with R80. Course covers how to install R80 security gateway in a distributed environment, configure rules and defines a policy for security, how to work with multiple administrators and how to define permission profiles. After completion of this certification you will be expert in to keep your network secure, you will be expert in evaluating existing security policy, you will be able to manage multiple user access to organization LANs, you will be expert in to monitor any suspicious activities over the internet and you can analyze security attacks better, implement backup for Check Point. Prerequisites:You should have basic level knowledge of networking, you should have 6 months to 1-year experience with Check Point products and this is mandatory. Check Point Primary Products: Network Security, Software Defined Protection, Public and Private Cloud Security, Zero Trust Remote Access, Data Security, IoT Security, ThreatCloud, ThreatCloud IntelliStore, Virtual Systems, Endpoint Security, Mobile Security, Security Management, Document Security (Capsule Docs product line), Zero-day Protection (SandBlast appliance product line) and Mobile Security (Mobile Threat Prevention product line). The following course includes lectures on how Check Point features work and the walk-through of the configuration in the lab/production environment. From the very beginning following step-by-step approach you will be able to grasp advanced concepts and step on the next level.The course is structured in an easy to follow manner starting from the very basic to advanced topics. The topics that are covered are: Installing Check Point in a lab environment, understanding general principles of Firewalling. THE COURSE INCLUDES:Introduction to CheckPoint TechnologyBuilding the Lab in EVE-NGObjectsAdmin AccountsUsers and GroupsSite to Site VPNHA, Load Sharing Monitoring ThreatAccess Policy

    Overview

    Section 1: Introduction

    Lecture 1 Introduction

    Section 2: Administrator Accounts

    Lecture 2 Introduction to Administrator Accounts

    Lecture 3 Verify Administrator Accounts

    Lecture 4 Admin Accounts Advanced Options

    Lecture 5 Certificate Based Login Administrator

    Section 3: HTTPS Inspection

    Lecture 6 HTTPS Inspection Theory

    Lecture 7 HTTPS Inspection Lab

    Lecture 8 Install Certificate in Client PC

    Lecture 9 Test & Verification HTTPS Inspection

    Section 4: Security Policy

    Lecture 10 Security Zones

    Lecture 11 Security Policy

    Lecture 12 Unified Access Control Policy

    Lecture 13 Introduction to Implied Rules

    Lecture 14 Verify Implied Rules Lab

    Lecture 15 Explicit, Stealth, Cleanup & Mgmt Rules

    Lecture 16 Access Control Policy Lab

    Lecture 17 Access Control Policy Sections

    Lecture 18 Access Control Policy UserCheck

    Lecture 19 ACP Order Layers

    Lecture 20 ACP Inline Layers

    Lecture 21 Application Control

    Lecture 22 Application Control Lab

    Lecture 23 Threat Prevention Theory

    Lecture 24 Threat Prevention IP Lab

    Lecture 25 IP Spoofing Anti-Spoofing

    Section 5: VPN Concept

    Lecture 26 Cryptography Concepts

    Lecture 27 Symmetric and Asymmetric

    Lecture 28 Hashing

    Lecture 29 Diffie-Hellman DH

    Lecture 30 IPsec Protocols

    Lecture 31 IPsec Protocols ESP and AH

    Lecture 32 IKE Internet Key Exchange

    Lecture 33 VPN Virtual Private Network

    Lecture 34 VPN Terminologies

    Section 6: Site-to-Site VPN Lab

    Lecture 35 Site-to-Site VPN Lab Topology

    Lecture 36 HQ-SG First time Wizard

    Lecture 37 BR-SG First Time Wizard

    Lecture 38 SMS First Time Wizard

    Lecture 39 HQ-SG Interfaces & Static Route

    Lecture 40 BR-SG Interfaces & Static Route

    Lecture 41 SmartConsole and SMS

    Lecture 42 Add Security Gateways to SMS

    Lecture 43 Assign Interface to Security Zone

    Lecture 44 Site to Site VPN Configuration

    Lecture 45 NAT and ACP Configuration

    Lecture 46 Configure Hosts and ISP Router

    Lecture 47 Updating Gateway Topology

    Lecture 48 VPN Testing & Verification

    Section 7: ClusterXL & HA

    Lecture 49 Introduction to Clustering

    Lecture 50 Load Sharing & High Availability

    Lecture 51 ClusterXL Lab Topology

    Lecture 52 SG-1 First Time Wizard

    Lecture 53 SG-2 First Time Wizard

    Lecture 54 SMS First Time Wizard

    Lecture 55 SG-1 Network Interfaces & Route

    Lecture 56 SG-2 Network Interfaces & Route

    Lecture 57 SmartConsole and SMS

    Lecture 58 Cluster Configuration

    Lecture 59 Security Policy

    Lecture 60 Configure Hosts

    Lecture 61 HA Testing & Verfication

    Lecture 62 Load Sharing Lab

    This course is for students trying to obtain the CCSA,This course is for students trying to learn the Check Point Firewall.,Any Network or Security Engineer want to learn or polish their Skills.,System Administrators and Information Security Analysts,Network Engineers and Security Engineers