Companies Home Search Profile

Check Point Firewall CCSA R80.40 Training Part2/2

Focused View

Ahmad Ali

11:01:15

232 View
  • 1.1 CCSA-Part-2-Workbook.zip
  • 1.2 Checkpoint.zip
  • 1.3 EVE-NG Images Links.txt
  • 1. Introduction.mp4
    03:41
  • 1. Introduction to Administrator Accounts.mp4
    19:26
  • 2. Verify Administrator Accounts.mp4
    21:46
  • 3. Admin Accounts Advanced Options.mp4
    11:41
  • 4. Certificate Based Login Administrator.mp4
    10:18
  • 1. HTTPS Inspection Theory.mp4
    11:46
  • 2. HTTPS Inspection Lab.mp4
    14:13
  • 3. Install Certificate in Client PC.mp4
    09:04
  • 4. Test & Verification HTTPS Inspection.mp4
    07:28
  • 1. Security Zones.mp4
    15:50
  • 2. Security Policy.mp4
    11:52
  • 3. Unified Access Control Policy.mp4
    08:17
  • 4. Introduction to Implied Rules.mp4
    12:35
  • 5. Verify Implied Rules Lab.mp4
    19:12
  • 6. Explicit, Stealth, Cleanup & Mgmt Rules.mp4
    13:27
  • 7. Access Control Policy Lab.mp4
    15:19
  • 8. Access Control Policy Sections.mp4
    05:16
  • 9. Access Control Policy UserCheck.mp4
    17:18
  • 10. ACP Order Layers.mp4
    16:49
  • 11. ACP Inline Layers.mp4
    13:50
  • 12. Application Control.mp4
    08:08
  • 13. Application Control Lab.mp4
    13:03
  • 14. Threat Prevention Theory.mp4
    11:58
  • 15. Threat Prevention IP Lab.mp4
    11:17
  • 16. IP Spoofing Anti-Spoofing.mp4
    07:07
  • 1. Cryptography Concepts.mp4
    15:11
  • 2. Symmetric and Asymmetric.mp4
    18:11
  • 3. Hashing.mp4
    20:06
  • 4. Diffie-Hellman DH.mp4
    17:56
  • 5. IPsec Protocols.mp4
    22:09
  • 6. IPsec Protocols ESP and AH.mp4
    25:45
  • 7. IKE Internet Key Exchange.mp4
    36:21
  • 8. VPN Virtual Private Network.mp4
    15:30
  • 9. VPN Terminologies.mp4
    10:18
  • 1. Site-to-Site VPN Lab Topology.mp4
    04:25
  • 2. HQ-SG First time Wizard.mp4
    05:44
  • 3. BR-SG First Time Wizard.mp4
    05:20
  • 4. SMS First Time Wizard.mp4
    03:21
  • 5. HQ-SG Interfaces & Static Route.mp4
    02:06
  • 6. BR-SG Interfaces & Static Route.mp4
    01:31
  • 7. SmartConsole and SMS.mp4
    05:06
  • 8. Add Security Gateways to SMS.mp4
    05:43
  • 9. Assign Interface to Security Zone.mp4
    03:33
  • 10. Site to Site VPN Configuration.mp4
    08:08
  • 11. NAT and ACP Configuration.mp4
    07:08
  • 12. Configure Hosts and ISP Router.mp4
    06:20
  • 13. Updating Gateway Topology.mp4
    02:58
  • 14. VPN Testing & Verification.mp4
    07:18
  • 1. Introduction to Clustering.mp4
    11:13
  • 2. Load Sharing & High Availability.mp4
    30:04
  • 3. ClusterXL Lab Topology.mp4
    03:51
  • 4. SG-1 First Time Wizard.mp4
    04:23
  • 5. SG-2 First Time Wizard.mp4
    03:43
  • 6. SMS First Time Wizard.mp4
    03:47
  • 7. SG-1 Network Interfaces & Route.mp4
    02:18
  • 8. SG-2 Network Interfaces & Route.mp4
    01:59
  • 9. SmartConsole and SMS.mp4
    06:46
  • 10. Cluster Configuration.mp4
    10:02
  • 11. Security Policy.mp4
    03:18
  • 12. Configure Hosts.mp4
    02:11
  • 13. HA Testing & Verfication.mp4
    07:04
  • 14. Load Sharing Lab.mp4
    09:47
  • Description


    Learn CheckPoint Firewall CCSA R80.40 with Step by Step Lab Workbook

    What You'll Learn?


    • Configure and Manage CheckPoint Firewall
    • How to setup a Lab Environment
    • Understand how to deploy Checkpoint Firewalls in EVE NG
    • Configure and Manage CheckPoint User and Group
    • Configure and Verify Administrator Accounts
    • HTTPS Inspection
    • Unified Access Control Policy
    • Explicit, Stealth, Cleanup & Mgmt Rules

    Who is this for?


  • This course is for students trying to obtain the CCSA
  • This course is for students trying to learn the Check Point Firewall.
  • Any Network or Security Engineer want to learn or polish their Skills.
  • System Administrators and Information Security Analysts
  • Network Engineers and Security Engineers
  • More details


    Description

    Check Point CCSA certification is the very important for IT admins who manage day to day operations of Checkpoint solutions. Here you will get expertise in startup, manage and configure day to day Check Point installations with R80. Course covers how to install R80 security gateway in a distributed environment, configure rules and defines a policy for security, how to work with multiple administrators and how to define permission profiles. After completion of this certification you will be expert in to keep your network secure, you will be expert in evaluating existing security policy, you will be able to manage multiple user access to organization LANs, you will be expert in to monitor any suspicious activities over the internet and you can analyze security attacks better, implement backup for Check Point.

    Prerequisites:

    You should have basic level knowledge of networking, you should have 6 months to 1-year experience with Check Point products and this is mandatory.

    Check Point Primary Products:

    Network Security, Software Defined Protection, Public and Private Cloud Security, Zero Trust Remote Access, Data Security, IoT Security, ThreatCloud, ThreatCloud IntelliStore, Virtual Systems, Endpoint Security, Mobile Security, Security Management, Document Security (Capsule Docs product line), Zero-day Protection (SandBlast appliance product line) and Mobile Security (Mobile Threat Prevention product line).


    The following course includes lectures on how Check Point features work and the walk-through of the configuration in the lab/production environment. From the very beginning following step-by-step approach you will be able to grasp advanced concepts and step on the next level.

    The course is structured in an easy to follow manner starting from the very basic to advanced topics. The topics that are covered are: Installing Check Point in a lab environment, understanding general principles of Firewalling.

    THE COURSE INCLUDES:

    Introduction to CheckPoint Technology

    Building the Lab in EVE-NG

    Objects

    Admin Accounts

    Users and Groups

    Site to Site VPN

    HA, Load Sharing

    Monitoring

    Threat

    Access Policy


    Who this course is for:

    • This course is for students trying to obtain the CCSA
    • This course is for students trying to learn the Check Point Firewall.
    • Any Network or Security Engineer want to learn or polish their Skills.
    • System Administrators and Information Security Analysts
    • Network Engineers and Security Engineers

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    I am Cyber Security Consultant and Cisco Certified Trainer with several years of experience. Teaching part time for more than 10 years’ providing classroom, on-site and online training on various network, security topics and Certifications like CCNA R&S,  CCNA, CCNA Security, CCNP R&S, CCNP Security, VPN, Firewalls etc. My utmost desire as an instructor is to bring my field experience into classroom in order to give my students' a feel of real-world hands-on. Certifications:CCIE Routing and SwitchingCisco Certified Specialist - Web Content Security CertificateCisco Certified Specialist - Security Identity Management Implementation CertificateCisco Certified Specialist - Security Core CertificateCisco Certified Specialist - Network Security VPN Implementation Cisco Certified Specialist - Network Security Firepower CertificateCisco Certified Specialist - Enterprise Core CertificateCisco Certified Specialist - Enterprise Advanced Infrastructure Implementation CertificateCisco Certified Network Professional CCNP (Routing & Switching)Cisco Certified Network Associate CCNA (Routing & Switching)Cisco Certified Network Professional CCNP (Security)Cisco Certified Network Associate CCNA (Security)Cisco Certified Academy Instructor CCAIMicrosoft Certified Solutions Associate MCSA Server 2012Microsoft Certified Solutions Associate MCSA Server 2008Microsoft Certified IT Professional MCITP Server 2008Microsoft Certified Technology Specialist MCTS Windows 7Microsoft Certified Technology Specialist MCTS  2008Microsoft Technology Associate MTAEC-Council Certified Secure Computer User CSCUPalo Alto Networks Certified Network Security Engineer (PCNSE)Palo Alto Accredited Configuration Engineer (ACE)EC-Council Certified, Certified Ethical Hacker (CEH) Fortinet NSE1, NSE2, NSE3 , NSE4 and NSE7F5 Certified BIG-IP Administrator
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 62
    • duration 11:01:15
    • Release Date 2023/05/12