stener("DOMContentLoaded",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,initializeOnLoaded:function(o){gform.domLoaded&&gform.scriptsLoaded?o():!gform.domLoaded&&gform.scriptsLoaded?window.addEventListener("DOMContentLoaded",o):document.addEventListener("gform_main_scripts_loaded",o)},hooks:{action:{},filter:{}},addAction:function(o,n,r,t){gform.addHook("action",o,n,r,t)},addFilter:function(o,n,r,t){gform.addHook("filter",o,n,r,t)},doAction:function(o){gform.doHook("action",o,arguments)},applyFilters:function(o){return gform.doHook("filter",o,arguments)},removeAction:function(o,n){gform.removeHook("action",o,n)},removeFilter:function(o,n,r){gform.removeHook("filter",o,n,r)},addHook:function(o,n,r,t,i){null==gform.hooks[o][n]&&(gform.hooks[o][n]=[]);var e=gform.hooks[o][n];null==i&&(i=n+"_"+e.length),gform.hooks[o][n].push({tag:i,callable:r,priority:t=null==t?10:t})},doHook:function(n,o,r){var t;if(r=Array.prototype.slice.call(r,1),null!=gform.hooks[n][o]&&((o=gform.hooks[n][o]).sort(function(o,n){return o.priority-n.priority}),o.forEach(function(o){"function"!=typeof(t=o.callable)&&(t=window[t]),"action"==n?t.apply(null,r):r[0]=t.apply(null,r)})),"filter"==n)return r[0]},removeHook:function(o,n,t,i){var r;null!=gform.hooks[o][n]&&(r=(r=gform.hooks[o][n]).filter(function(o,n,r){return!!(null!=i&&i!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][n]=r)}});/*]]>*/
CCSE R80.20 Check Point Cyber Security Engineering CCSE | Check Point Cyber Security Engineering (R81.x)
Date: Sep 11 - Sep 13 EDT
Time: 10:00 am - 6:00 pm
Cost: $3000.00
Learn basic concepts and develop skills necessary to administer IT security fundamental tasks.
Course Objectives:
- Provide an overview of the upgrade service and options available
- Explain how to perform management upgrade and migration
- Articulate the process using CPUSE features
- Articulate the purpose and function of Management High Availability
- Explain Primary vs Secondary, Active vs Standby and Synchronization
- Explain disaster recovery steps in case the primary management server becomes unavailable
- Provide overview of Central Deployment in SmartConsole
- Articulate an understanding of Security Gateway cluster upgrade methods
- Explain about Multi Version Cluster (MVC) upgrades
- Discuss Gaia Commands and how they are used
- Explain the main processes on s and s
- Describe how to work with scripts and SmartTasks to configure automatic actions
- Explain the Management Data Plane Separation (MDPS)
- Explain kernel operations and traffic flow
- Articulate Dynamic and Updatable Objects in Security Gateways
- Explain the policy installation flow and files used
- Describe the use of policy installation history
- Explain concurrent and accelerated install policy
- Describe an overview of APIs and ways to use and authenticate
- Explain how to make changes in GAIA and management configuration
- Explain how to install policy using API
- Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance
- Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance
- Articulate how utilizing multiple traffic queues can make traffic handling more efficient
- Discuss Site-to-Site VPN basics, deployment and communities
- Describe how to analyze and interpret VPN tunnel traffic
- Explain Link Selection and ISP Redundancy options
- Explain tunnel management features
- Discuss Check Point Remote Access solutions and how they differ from each other
- Describe how client security can be provided by Remote Access
- xplain authentication methods including machine authentication
- Explain Multiple Entry Point (MEP)
- Discuss the Mobile Access Software Blade and how it secures communication and data exchange during remote connections
- Describe Mobile Access deployment options
- Discuss various features in Mobile Access like Portals, Link Translation, running Native Applications, Reverse Proxy and more
- Explain basic concepts of Clustering and ClusterXL
- Explain about Cluster Control Protocol (CCP) and synchronization
- Describe advanced ClusterXL functions and modes like Load Sharing, Active-Active, VMAC mode etc.
- Discuss Cluster Correction Layer (CCL) to provide connection stickyness
- Advanced Logs and Monitoring
- Explain how to determine if the configuration is compliant with the best practices
- Explain how to set action items to meet the compliance
- Discuss how SmartEvent functions to identify critical security issues
- Describe the components of SmartEvent and their deployment options
- Discuss how SmartEvent can assist in reporting security threats
- Explain how to customize event definitions and set an Event Policy
Click CCSE | R81.10 | Course Overview for the complete course outline.
Register for this course below: