Takaisin

Check Point Certified Security Master (CCSM) R80.10

Advanced training to manage virtualized security in high-end networks and advanced security optimization techniques.

This course is for customers and partners who want to learn the advanced skills to troubleshoot and configure Check Point Security Gateway and Management Software Blades:

  • System Administrators
  • Security Engineers
  • Network Engineers
  • CCSEs seeking higher certification

Prerequisites:

  • CCSE
  • General knowledge of TCP/IP
  • Working knowledge of Windows and UNIX
  • Working knowledge of network technology
  • Working knowledge of the Internet

Language: English

Agenda:

Chapter 1: Introduction to Security Master
Chapter 2: Chain Modules
Chapter 3: NAT
Chapter 4: ClusterXL
Chapter 5: VPN Troubleshooting
Chapter 6: SecureXL Acceleration Debugging
Chapter 7: Hardware Optimization
Chapter 8: Software Tuning
Chapter 9: Enable CoreXL
Chapter 10: IPS
Chapter 11: IPv6
Chapter 12: Advanced VPN

  • Firewall-1 administration and infrastructure review
  • How policy changes impact chain module behavior
  • Identify management issues and problems with commands
  • Use commands to troubleshoot NAT stages
  • Configure Manual NAT to define specific rules
  • Use commands to review and clear connections table
  • Modify files to allow traffic through a specific cluster member
  • Locate the source of encryption failures using commands
  • Use commands to verify VPN connectivity
  • Identify any potentially mis-configured VPNs
  • Tune NIC performance
  • Increase size and improve hardware performance
  • Improve load capacity
  • Tune the firewall rule base
  • Reduce load on Rule Base application
  • Improve network performance
  • Improve logging efficiency
  • Use IPS Bypass to manage performance
  • Deploy IPv6 in a local envrionment
  • Identify differences between VPNs
  • Configure VPN Tunnel Interface (VTI)
  • Configure Open Shortest Path First (OSPF)
  • Identify the wire mode function by testing a VPN failover
ArrowECS

ArrowECS vastaa kurssin järjestämisestä.

Ilmoittaudu kurssille

Tietosuoja

Palvelussa voidaan käsitellä Elisan tietosuojaperiaatteissa kuvattuja henkilötietoja, kuten esimerkiksi nimi, yhteystiedot ja palvelun käyttöön liittyvät tiedot. Elisa on palvelussa käsiteltävien henkilötietojen osalta tietosuojalainsäädännössä tarkoitettu henkilötietojen rekisterinpitäjä.

Elisa käsittelee rekisterinpitäjänä henkilötietoja kulloinkin voimassaolevien tietosuojaperiaatteiden mukaisesti (https://elisa.fi/sopimusehdot) ja (https://elisa.fi/tietosuoja).

Elisalla on oikeus käyttää palveluiden tuottamisessa ja henkilötietojen käsittelyssä alihankkijoita.

English:

When using the service, the following types of personal information may be handled; name and contact information, employee information and other information from the client company, end user information, information related to use of the service and customer satisfaction information. This information is needed for the maintenance and development of the service. In terms of the personal information being handled, the customer is the controller as intended in information protection legislation and the service provider is the handler.

The customer's personal information is to be handled in the manner outlined in the agreement and this service description in order to provide and develop the services. Any other handling of the customer's personal information and its effect on costs in accordance with the General Data Protection Regulation are to be agreed upon separately between the parties to the agreement.

The provider or their subcontractor may collect data for the maintenance, improvement or analysis of the service. The provider reserves the right to use subcontractors in the production of their services and sub-handlers in the handling of personal information. The customer has the right to receive information on the provider's subcontractors and sub-handlers upon request.