This 5 day bundle course covers the following two Check Point training courses:
Check Point Certified Security Expert (CCSE) R81.10 - 3 days
and
Check Point Certified Troubleshooting Expert (CCTE) R81.10 - 2 days
This advanced CCSE part of the course (Monday to Wednesday) teaches how to build, modify, deploy and troubleshoot Check Point Security Systems on the GAiA operating system. Hands-on lab exercises teach how to debug firewall processes, optimize VPN performance and upgrade Management Servers.
The CCTE of the course (Thursday to Friday) provides advanced troubleshooting skills to investigate and resolve more complex issues that may occur while managing your Check Point Security environment.
CCSE -
Topics:
โขManagement Maintenance
โขManagement Migration
โขManagement
โขHigh Availability
โขPolicy Automation
โขGateway Maintenance
โขThe Firewall Kernel
โขUser-Mode Processes
โขClusterXL
โขTraffic Acceleration
โขCore Acceleration
โขInterface Acceleration
โขThreat Prevention
โขThreat Emulation
โขAdvanced Site-to-Site VPN
โขRemote Access VPN
โขMobile Access
Lab Exercises:
โขPerform an upgrade of a Security Management server in a distributed environment
โขUse the migrate_export command to prepare to migrate a Security Management Server
โขDeploy a Secondary Management Server
โขDemonstrate how to define new network and group objects using the Check Point API
โขPerform an upgrade of Security Gateways in a clustered environment
โขUse Kernel table commands to evaluate the condition of a Security Gateway
โขUse common commands to evaluate the condition of a Security Gateway
โขConfigure Virtual MAC
โขDemonstrate how SecureXL affects traffic flow
โขDescribe how the CoreXL acceleration technology enhances and improves Security Gateway performance
โขDemonstrate how to monitor and adjust interface traffic queues
โขIdentify specific threat protections used by Check Point Threat Prevention
โขDemonstrate how to enable Mobile Access for remote users
CCTE -
Course Topics:
โขAdvanced Troubleshooting
โขManagement Database and Processes
โขAdvanced Kernel Debugging
โขUser Mode Troubleshooting
โขAdvanced Access Control
โขUnderstanding Threat Prevention
โขAdvanced VPN Troubleshooting
โขAcceleration and Performance Tuning
Lab Exercises:
โขMonitoring Network Traffic
โขDebugging Management Processes
โขExploring the Postgres and Solr Databases
โขTroubleshooting Management Synchronization
โขAnalyzing Traffic Issues Using Kernel Debugs
โขDebugging User Mode Processes
โขTroubleshooting Application Control and URL Filtering
โขTroubleshooting IPS
โขEvaluating Threat Prevention Products
โขDebugging Site-to-Site VPN
โขTroubleshooting Remote Access VPN
โขTesting Mobile Access VPN
โขEvaluating SecureXL
โขModifying CoreXL
โขEvaluating Hardware-related Performance
โขTuning and Software Optimization
CCSE:
โข Articulate Gaia system management procedures
โข Explain how to perform database migration procedures
โข Articulate the purpose and function of Management High Availability
โข Describe how to use Check Point API tools to perform management functions
โข Articulate an understanding of Security Gateway cluster upgrade methods
โข Discuss the process of Stateful Traffic inspection
โข Articulate an understanding of the Check Point Firewall processes and debug procedures
โข Describe advanced ClusterXL functions and deployment options
โข Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance
โข Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance
โข Articulate how utilizing multiple traffic queues can make traffic handling more efficient
โข Describe different Check Point Threat Prevention solutions for network attacks
โข Explain how SandBlast, Threat Emulation, and Threat Extraction help to prevent security incidents
โข Recognize alternative Check Point Site-to-Site deployment options
โข Recognize Check Point Remote Access solutions and how they differ from each other
โข Describe Mobile Access deployment options
CCTE:
โข Understand how to use Check Point diagnostic tools to determine the status of a network.
โข Understand how to use network packet analyzers and packet capturing tools to evaluate network traffic.
โข Become familiar with more advanced Linux system commands.
โข Obtain a deeper knowledge of the Security Management architecture.
โข Understand how the Management database is structured and how objects are represented in the database.
โข Understand key Security Management Server processes and their debugs.
โข Understand how GuiDBedit operates.
โข Understand how the kernel handles traffic and how to troubleshoot issues with chain modules.
โข Understand how to use the two main procedures for debugging the Firewall kernel and how they differ.
โข Recognize User mode processes and how to interpret their debugs.
โข Discuss how to enable and use core dumps.
โข Understand the processes and components used for policy installs and processing packets in Access Control policies.
โข Understand how to troubleshoot and debug issues that may occur with App Control and URLF.
โข Understand how to debug HTTPS Inspection-related issues.
โข Understand how to troubleshoot and debug Content Awareness issues.
โข Understand how IPS works and how to manage performance issues.
โข Understand how to troubleshoot Anti-Bot and Antivirus.
โข Recognize how to troubleshoot and debug Site-to-Site VPNrelated issues.
โข Understand how to troubleshoot and debug Remote Access VPNs.
โข Understand how troubleshoot Mobile Access VPN issues.
โข Recognize how to use SecureXL features and commands to enable and disable accelerated traffic.
โข Understand how the server hardware and operating system affects the performance of Security Gateways.
โข Understand how to evaluate hardware configurations for optimal performance.
CCSA training and/or certification with a working knowledge of Windows and/or UNIX, networking technology, the Internet and TCP/IP, and advanced knowledge of Check Point Security products.
Technical professionals who perform advanced deployment configurations of Check Point products. Security experts and Check Point resellers who desire to obtain the necessary knowledge required to perform more advanced troubleshooting skills while managing their security environments.
COURSE CONTENT: Chapter 1: Setting Up the BIG-IP System โข Introducing the BIG-IP System โข Initially Setting Up the BIG-IP System โข Archiving the BIG-IP System Configuration Chapter 2:…
COURSE CONTENT: Module 1 โข Working with external parties โข LAB: Installing ADFS in Forest/Domain trust environment โข LAB (optional): Install ADFS in 2003 domain-level environment โข LAB: Testing…
COURSE CONTENT: Module 1: Describe Cisco Umbrella โข What is Umbrella โข Enforcement โข DNS Overview โข Why DNS? โข Co-occurrence Model โข Spike Rank Model โข Predictive IP…