Facebook

Checkpoint Courses

Most popular
Trending

All Checkpoint Courses

Checkpoint Online Training Courses - Live



We found 9 courses available for you
See

CNSE-AWS Cloud Network Security Expert for AWS

26 Lessons
Intermediate

Course Description: Learn advanced concepts and develop skills needed to …

What you'll learn
Discuss AWS Platform Components and their relationship to Check Point CloudGuard Network Security.
Explain how to maintain a secure, efficient, and stable cloud environment.
Describe the components and constraints of a hub and spoke security environment.
Describe the function of the Cloud Management Extension.
Explain the purpose of identity and access controls and constraints in different cloud platforms.
Explain the steps required to configure Identity and Access controls in AWS.
Describe the purpose and function of the CloudGuard Controller, its processes, and how it is tied to the Identity Awareness feature.
Explain how to design and configure Cloud Adaptive Policies.
Discuss the purpose and function of Data Center Objects.
Describe the function and advantages of Cloud Service Provider (CSP) automation templates for instance and resource deployments.
Explain how CSP templates can be used for maintenance tasks in the cloud environment.
Discuss Third-Party Automation tools, how they can simplify deployment and maintenance tasks, and the constraints associated with them.
Discuss Scaling Solutions and Options for Cloud Environments.
Explain the Scaling Options in AWS.
Describe the workflow for configuring scaling solutions in AWS.
Discuss how ClusterXL operates and what elements work together to permit traffic failover.
Explain how ClusterXL functions differently in a Cloud Environment.
Describe how clusters are created and function in AWS.
Discuss the elements involved in Hybrid Data Center deployments, the advantages of them, and the constraints involved.
Explain the nature of a “Greenfield” deployment, the advantages of it, and the constraints involved.
Describe the components and constraint involved in deploying a Disaster Recovery Site in the cloud.
Discuss the steps required for troubleshooting automation in AWS.
Explain the steps required for troubleshooting Scaling Solution issues in AWS.
Describe the steps required for troubleshooting clusters in AWS.

CNSE-AZURE: Cloud Network Security Expert for Azure

27 Lessons
Intermediate

Course Description: Learn advanced concepts and develop skills needed to …

What you'll learn
Discuss Azure Platform Components and their relationship to Check Point CloudGuard Network Security.
Explain how to maintain a secure, efficient, and stable cloud environment.
Describe the components and constraints of a hub and spoke cloud security environment.
Describe the function of the Cloud Management Extension
Explain the purpose of identity and access controls and constraints in different cloud platforms.
Explain the steps required to configure Identity and Access controls in Azure.
Describe the purpose and function of the CloudGuard Controller, its processes, and how it is tied to the Identity Awareness feature.
Explain how to design and configure Cloud Adaptive Policies.
Discuss the purpose and function of Data Center Objects.
Describe the function and advantages of Cloud Service Provider (CSP) automation templates for instance and resource deployment.
Explain how CSP templates can be used for maintenance tasks in the cloud environment.
Discuss Third-Party Automation tools, how they can simplify deployment and maintenance tasks, and the constraints associated with them.
Discuss Scaling Solutions and Options for Cloud Environments.
Explain the Scaling Options in Azure.
Describe the workflow for configuring scaling solutions in Azure.
Discuss how ClusterXL operates and what elements work together to permit traffic failover.
Explain how ClusterXL functions differently in a Cloud Environment.
Describe how clusters are created and function in Azure.
Discuss the elements involved in Hybrid Data Center deployments, the advantages of them, and the constraints involved.
Explain the nature of a “Greenfield” deployment, the advantages of it, and the constraints involved.
Describe the components and constraint involved in deploying a Disaster
Recovery Site in the cloud.
Discuss the steps required for troubleshooting automation in Azure.
Explain the steps required for troubleshooting Scaling Solution issues in Azure.
Describe the steps required for troubleshooting clusters in Azure.

CCVS Check Point Certified VSX Specialist

15 Lessons
16 hours
Intermediate

Course Description: This course provides a comprehensive understanding of the …

What you'll learn
Explain the benefits of virtual network security.
Understand the basic functions, components, and advantages of VSX technology.
Examine the VSX management infrastructure and understand how traffic flows within a VSX network.
Discuss options for deploying VSX technology within various types of organizations.
Understand how to install and configure VSX Gateways and Virtual Systems.
Describe different routing schemes and features that are available to use within the VSX environment.
Understand how to deploy additional VSX networking configurations that may be required in the environment.
Understand the differences between deploying physical Security Gateway Clusters and VSX Gateway Clusters.
Understand how Virtual System Load Sharing works to enhance VSX network performance.
Understand how to use the VSX Provisioning Tool to add and remove virtual devices.
Recall how CoreXL technology enhances Security Gateway performance and recognize how to use the technology in a VSX environment.
Understand how to employ tools for optimizing resources allocated in a VSX environment.
Identify various VSX command line tools commonly used to retrieve information and perform configuration changes.
Understand how to use VSX utility commands to perform various maintenance tasks for the VSX environment.
Understand how to troubleshoot and debug issues that may occur in a VSX environment.

CCTE Check Point Troubleshooting Expert

24 Lessons
16 hours
Intermediate

Course Description: Provide advanced troubleshooting skills to investigate and resolve …

What you'll learn
Understand how to use Check Point diagnostic tools to determine the status of a network.
Understand how to use network packet analyzers and packet capturing tools to evaluate network traffic.
Become familiar with more advanced Linux system commands.
Obtain a deeper knowledge of the Security Management architecture.
Understand how the Management database is structured and how objects are represented in the database.
Understand key Security Management Server processes and their debugs.
Understand how GuiDBedit operates.
Understand how the kernel handles traffic and how to troubleshoot issues with chain modules.
Understand how to use the two main procedures for debugging the Firewall kernel and how they differ.
Recognize User mode prcesses and how to interpret their debugs.
Discuss how to enable and use core dumps.
Understand the processes and components used for policy installs and processing packets in Access Control policies.
Understand how to troubleshoot and debug issues that may occur with App Control and URLF.
Understand how to debug HTTPS Inspection-related issues.
Understand how to troubleshoot and debug Content Awareness issues.
Understand how IPS works and how to manage performance issues.
Understand how to troubleshoot Anti-Bot and Antivirus.
Recognize how to troubleshoot and debug Site-to-Site VPNrelated issues.
Understand how to troubleshoot and debug Remote Access VPNs.
Understand how troubleshoot Mobile Access VPN issues.
Recognize how to use SecureXL features and commands to enable and disable accelerated traffic.
Understand how the server hardware and operating system affects the performance of Security Gateways.
Understand how to evaluate hardware configurations for optimal performance

CCTA Check Point Troubleshooting Administration

19 Lessons
16 hours
Intermediate

Course Description: Provide an understanding of the concepts and skills …

What you'll learn
Understand how to use Check Point resources for support.
Understand how to perform packet captures using tcmdump and FW Monitor command tools.
Understand the basic process of kernel debugging, and how debug commands are structured.
Recognize how to use various Linux commands for troubleshooting system issues.
Recognize communication issues that may occur between SmartConsole and the SMS and how to resolve them.
Understand how to troubleshoot SmartConsole login and authentication issues.
Understand how to prevent and resolve licensing and contract issues.
Understand how to troubleshoot issues that may occur during policy installation.
Understand communication issues that may occur when collecting logs and how to resolve them.
Recall various tools to use when analyzing issues with logs.
Understand how to restore interrupted communications during heavy logging.
Understand how NAT works and how to troubleshoot issues.
Understand Client Side and Server Side NAT.
Understand how the Access Control Policy functions and how the access control applications work together.
Understand how to troubleshoot issues that may occur with Application Control and URL Filtering.
Understand how the HTTPS Inspection process works and how to resolve issues that may occur during the process.
Understand how to troubleshoot Content Awareness issues.
Recognize how to troubleshoot VPN-related issues.
Understand how to monitor cluster status and work with critical devices.
Recognize how to troubleshoot State Synchronization.
Understand how to troubleshoot communication issues between Identity Sources and Security Gateways.
Understand how to troubleshoot and debug issues with internal Identity Awareness processes.

CCSE Check Point Certified Security Expert

13 Lessons
Intermediate

Course Description: Validate and enhance your skills and optimally manage …

What you'll learn
Articulate Gaia system management procedures.
Explain how to perform database migration procedures.
Articulate the purpose and function of Management High Availability.
Describe how to use Check Point API tools to perform management functions.
Articulate an understanding of Security Gateway cluster upgrade methods.
Discuss the process of Stateful Traffic inspection.
Articulate an understanding of the Check Point Firewall processes and debug procedures.
Describe advanced ClusterXL functions and deployment options.
Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance.
Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance.
Articulate how utilizing multiple traffic queues can make traffic handling more efficient.
Describe different Check Point Threat Prevention solutions for network attacks.
Explain how SandBlast, Threat Emulation, and Threat Extraction help to prevent security incidents.
Recognize alternative Check Point Site-to-Site deployment options.
Recognize Check Point Remote Access solutions and how they differ from each other.
Describe Mobile Access deployment options.

CCMS Check Point Certified Multi-Domain Security Management Specialist

14 Lessons
16 hours
Intermediate

Course Description: Provide a comprehensive understanding of the Check Point …

What you'll learn
Discuss challenges associated with securing large-scale business organizations with distributed network environments.
Describe the Check Point Multi-Domain Security Management solution and its benefits.
Understand the components of MDSM and how they work together to help administrators manage multiple network security environments within a single management framework.
Understand how to install and configure the Multi-Domain Security Management environment.
Describe how to implement Management High Availability within the MDSM environment.
Discuss the two types of log server options used to store logs in the Multi-Domain Security Management environment, and how they differ.
Understand how to manage and view Multi-Domain activity logs in SmartConsole.
Understand how to configure and implement Global Policy to manage rules for multiple domains.
Identify various MDSM command line tools commonly used to retrieve information and perform configuration changes on a MDSM Server.
Describe troubleshooting tools to use for addressing MDSM Server issues.
Understand how VSX works and how to integrate the technology within the MDSM environment.

CCES Check Point Certified Endpoint Specialist

14 Lessons
16 hours
Intermediate

Course Description: The goal of this course is to provide …

What you'll learn
Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices.
Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management.
Identify and describe key elements of the SmartEndpoint Management console.
Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console.
Explain how to create and assign security policies for Endpoint clients using Endpoint Security.
Understand deployment methods and server considerations for Endpoint Security Management installation.
Identify the different ways to install and configure Endpoint clients.
Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources.
Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server.
Describe additional server configurations that are available to help manage Endpoint clients.
Recognize the different types of data security protections available to deploy on end user machines.
Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers.
Understand how to secure removable media devices.
Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues.
Recognize the types of threats that target Endpoint computers.
Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment.
Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources.
Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events.
Understand how to troubleshoot and debug issues