Takaisin

Check Point Certified Admin (CCSA) R80.10

The goal of this course is to provide an understanding of basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.

Target audience: Technical professionals who support, install, deploy or administer Check Point Software Blades.

Prerequisites: General knowledge of TCP/IP, working knowledge of Windows and/or UNIX, network technology and the Internet

Language: English

Agenda:

  • Introduction to Check Point Technology
  • Security Policy Management
  • Policy Layers
  • Check Point Security Solutions and Licensing
  • Traffic Visibility
  • Basic Concepts of VPN
  • Managing User Access
  • Working with ClusterXL
  • Administrator Task Implementation
  • Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic.
  • Describe the key elements of Check Point’s unified Security Management Architecture.
  • Recognize SmartConsole features, functions and tools.
  • Understand Check Point deployment options.
  • Describe the basic functions of Gaia.
  • Describe the essential elements of a Security Policy.
  • Understand how traffic inspection takes place in a unified Security Policy.
  • Summarize how administration roles and permissions assist in managing policy.
  • Recall how to implement backup techniques.
  • Understand the Check Point policy layer concept.
  • Recognize Check Point security solutions and products and how they work to protect your network.
  • Understand licensing and contract requirements for Check Point security products.
  • Identify tools designed to monitor data, determine threats and recognize performance improvements.
  • Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.
  • Understand Site-to -Site and Remote Access VPN deployments and communities.
  • Understand how to analyze and interpret VPN traffic.
  • Recognize how to define users and user groups.
  • Understand how to manage user access for internal and external users.
  • Understand the basic concepts of ClusterXL technology and its advantages.
  • Understand how to perform periodic administrator tasks as specified in administrator job descriptions.
ArrowECS

ArrowECS vastaa kurssin järjestämisestä.

Ilmoittaudu kurssille

Tietosuoja

Palvelussa voidaan käsitellä Elisan tietosuojaperiaatteissa kuvattuja henkilötietoja, kuten esimerkiksi nimi, yhteystiedot ja palvelun käyttöön liittyvät tiedot. Elisa on palvelussa käsiteltävien henkilötietojen osalta tietosuojalainsäädännössä tarkoitettu henkilötietojen rekisterinpitäjä.

Elisa käsittelee rekisterinpitäjänä henkilötietoja kulloinkin voimassaolevien tietosuojaperiaatteiden mukaisesti (https://elisa.fi/sopimusehdot) ja (https://elisa.fi/tietosuoja).

Elisalla on oikeus käyttää palveluiden tuottamisessa ja henkilötietojen käsittelyssä alihankkijoita.

English:

When using the service, the following types of personal information may be handled; name and contact information, employee information and other information from the client company, end user information, information related to use of the service and customer satisfaction information. This information is needed for the maintenance and development of the service. In terms of the personal information being handled, the customer is the controller as intended in information protection legislation and the service provider is the handler.

The customer's personal information is to be handled in the manner outlined in the agreement and this service description in order to provide and develop the services. Any other handling of the customer's personal information and its effect on costs in accordance with the General Data Protection Regulation are to be agreed upon separately between the parties to the agreement.

The provider or their subcontractor may collect data for the maintenance, improvement or analysis of the service. The provider reserves the right to use subcontractors in the production of their services and sub-handlers in the handling of personal information. The customer has the right to receive information on the provider's subcontractors and sub-handlers upon request.