Facebook

Cybersecurity Courses

Most popular
Trending

All Cybersecurity Courses

Cybersecurity Online Training Courses - Live

Cybersecurity is an ongoing challenge for today’s businesses. With new threats emerging every day, companies need a proactive approach towards identifying potential risks and vulnerabilities. It’s imperative IT professionals have the necessary skills to safeguard their organization against all security breaches. Our vast cybersecurity training portfolio can help you and your team develops cybersecurity skills at every level. We also offer prep courses for top industry-recognized certifications and product-specific courses targeting distinct skills. You and your team learn to approach cybersecurity offensively and defensively through real-world examples and exercises, hands-on labs, and expert instruction. You gain knowledge to close skill gaps, meet and maintain mandates, and sustain and retain a highly qualified workforce. CCS Learning Academy offers CISSP, CHFI, CEH, CCSP, Security +, and many more cybersecurity-related courses.
ISACA_partnerlogo

We found 7 courses available for you
See
Featured

CC – Certified in Cybersecurity Training

24 Lessons
8 hours
All Levels

Things you will get to learn in our CC – …

CCVS Check Point Certified VSX Specialist

15 Lessons
16 hours
Intermediate

Course Description: This course provides a comprehensive understanding of the …

What you'll learn
Explain the benefits of virtual network security.
Understand the basic functions, components, and advantages of VSX technology.
Examine the VSX management infrastructure and understand how traffic flows within a VSX network.
Discuss options for deploying VSX technology within various types of organizations.
Understand how to install and configure VSX Gateways and Virtual Systems.
Describe different routing schemes and features that are available to use within the VSX environment.
Understand how to deploy additional VSX networking configurations that may be required in the environment.
Understand the differences between deploying physical Security Gateway Clusters and VSX Gateway Clusters.
Understand how Virtual System Load Sharing works to enhance VSX network performance.
Understand how to use the VSX Provisioning Tool to add and remove virtual devices.
Recall how CoreXL technology enhances Security Gateway performance and recognize how to use the technology in a VSX environment.
Understand how to employ tools for optimizing resources allocated in a VSX environment.
Identify various VSX command line tools commonly used to retrieve information and perform configuration changes.
Understand how to use VSX utility commands to perform various maintenance tasks for the VSX environment.
Understand how to troubleshoot and debug issues that may occur in a VSX environment.

CCTE Check Point Troubleshooting Expert

24 Lessons
16 hours
Intermediate

Course Description: Provide advanced troubleshooting skills to investigate and resolve …

What you'll learn
Understand how to use Check Point diagnostic tools to determine the status of a network.
Understand how to use network packet analyzers and packet capturing tools to evaluate network traffic.
Become familiar with more advanced Linux system commands.
Obtain a deeper knowledge of the Security Management architecture.
Understand how the Management database is structured and how objects are represented in the database.
Understand key Security Management Server processes and their debugs.
Understand how GuiDBedit operates.
Understand how the kernel handles traffic and how to troubleshoot issues with chain modules.
Understand how to use the two main procedures for debugging the Firewall kernel and how they differ.
Recognize User mode prcesses and how to interpret their debugs.
Discuss how to enable and use core dumps.
Understand the processes and components used for policy installs and processing packets in Access Control policies.
Understand how to troubleshoot and debug issues that may occur with App Control and URLF.
Understand how to debug HTTPS Inspection-related issues.
Understand how to troubleshoot and debug Content Awareness issues.
Understand how IPS works and how to manage performance issues.
Understand how to troubleshoot Anti-Bot and Antivirus.
Recognize how to troubleshoot and debug Site-to-Site VPNrelated issues.
Understand how to troubleshoot and debug Remote Access VPNs.
Understand how troubleshoot Mobile Access VPN issues.
Recognize how to use SecureXL features and commands to enable and disable accelerated traffic.
Understand how the server hardware and operating system affects the performance of Security Gateways.
Understand how to evaluate hardware configurations for optimal performance

CCTA Check Point Troubleshooting Administration

19 Lessons
16 hours
Intermediate

Course Description: Provide an understanding of the concepts and skills …

What you'll learn
Understand how to use Check Point resources for support.
Understand how to perform packet captures using tcmdump and FW Monitor command tools.
Understand the basic process of kernel debugging, and how debug commands are structured.
Recognize how to use various Linux commands for troubleshooting system issues.
Recognize communication issues that may occur between SmartConsole and the SMS and how to resolve them.
Understand how to troubleshoot SmartConsole login and authentication issues.
Understand how to prevent and resolve licensing and contract issues.
Understand how to troubleshoot issues that may occur during policy installation.
Understand communication issues that may occur when collecting logs and how to resolve them.
Recall various tools to use when analyzing issues with logs.
Understand how to restore interrupted communications during heavy logging.
Understand how NAT works and how to troubleshoot issues.
Understand Client Side and Server Side NAT.
Understand how the Access Control Policy functions and how the access control applications work together.
Understand how to troubleshoot issues that may occur with Application Control and URL Filtering.
Understand how the HTTPS Inspection process works and how to resolve issues that may occur during the process.
Understand how to troubleshoot Content Awareness issues.
Recognize how to troubleshoot VPN-related issues.
Understand how to monitor cluster status and work with critical devices.
Recognize how to troubleshoot State Synchronization.
Understand how to troubleshoot communication issues between Identity Sources and Security Gateways.
Understand how to troubleshoot and debug issues with internal Identity Awareness processes.

CCMS Check Point Certified Multi-Domain Security Management Specialist

14 Lessons
16 hours
Intermediate

Course Description: Provide a comprehensive understanding of the Check Point …

What you'll learn
Discuss challenges associated with securing large-scale business organizations with distributed network environments.
Describe the Check Point Multi-Domain Security Management solution and its benefits.
Understand the components of MDSM and how they work together to help administrators manage multiple network security environments within a single management framework.
Understand how to install and configure the Multi-Domain Security Management environment.
Describe how to implement Management High Availability within the MDSM environment.
Discuss the two types of log server options used to store logs in the Multi-Domain Security Management environment, and how they differ.
Understand how to manage and view Multi-Domain activity logs in SmartConsole.
Understand how to configure and implement Global Policy to manage rules for multiple domains.
Identify various MDSM command line tools commonly used to retrieve information and perform configuration changes on a MDSM Server.
Describe troubleshooting tools to use for addressing MDSM Server issues.
Understand how VSX works and how to integrate the technology within the MDSM environment.

CCES Check Point Certified Endpoint Specialist

14 Lessons
16 hours
Intermediate

Course Description: The goal of this course is to provide …

What you'll learn
Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices.
Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management.
Identify and describe key elements of the SmartEndpoint Management console.
Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console.
Explain how to create and assign security policies for Endpoint clients using Endpoint Security.
Understand deployment methods and server considerations for Endpoint Security Management installation.
Identify the different ways to install and configure Endpoint clients.
Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources.
Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server.
Describe additional server configurations that are available to help manage Endpoint clients.
Recognize the different types of data security protections available to deploy on end user machines.
Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers.
Understand how to secure removable media devices.
Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues.
Recognize the types of threats that target Endpoint computers.
Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment.
Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources.
Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events.
Understand how to troubleshoot and debug issues

CCAS Check Point Certified Automation Specialist

13 Lessons
16 hours
Intermediate

CCAS Check Point Certified Automation Specialist Online Training Course Description: …

What you'll learn
Explain how automation and orchestration work together
Understand the key drivers for incorporating automation and orchestration into security management
Execute a shell script that demonstrates how to build a comprehensive Security Policy.
Recognize how the Check Point API framework integrates with R80 Security Management to support automation and orchestration of daily tasks
Describe Check Point API tools and demonstrate how they are used to manage Check Point Security Management solutions
Demonstrate how to define new objects and modify existing ones by using the Check Point API
Demonstrate how to create API commands to efficiently maintain the Check Point Security Management Server database
Demonstrate how to use different methods to update the database with API commands
Become familiar with client-side and server-side scripting and scripting languages
Understand how to use the Bash shell to develop APIs
Recognize and describe many of the open source tools that are available to assist with API development
Demonstrate how to use a custom REST application to update the database of a Security Management Server
Demonstrate how to use Postman to manage the Security Policy database through the Check Point API
Understand what steps to take to troubleshoot and debug API scripts
Demonstrate basic troubleshooting techniques by reviewing debugging messages in various forms
Understand how to use self-service portal capabilities to provide general IT services
Recognize how automation tools work with Check Point APIs to automate security management tasks and orchestrate workflow behind service portals
Demonstrate common tasks that are automated in a Web portal to manage the Security Policy