COURSE OBJECTIVE:
• Identify online resources for Check Point security products and solutions. • Demonstrate understanding of capture packet technologies. • Demonstrate understanding of Firewall chain modules, Kernel and User Mode, and Kernel and User Space. • Use Linux and Check Point utilities to review processes and system information. • Troubleshoot log collection issues and interrupted communications. • Monitor network activity and traffic flow. • Demonstrate understanding of Check Point SmartConsole and Policy installation. • Investigate and troubleshoot issues with Check Point SmartConsole and Policy installation. • Demonstrate understanding of Check Point Identity Awareness. • Investigate and troubleshoot issues with Check Point Identity Awareness. • Demonstrate understanding of Check Point Application Control and URL Filtering. • Investigate and troubleshoot issues with Check Point Application Control and URL Filtering. • Demonstrate understanding of Check Point Network Address Translation. • Investigate and troubleshoot issues with Check Point Network Address Translation. • Demonstrate understanding of Check Point Threat Prevention. • Investigate and troubleshoot issues with Check Point Threat Prevention. • Demonstrate understanding of Check Point licenses and contracts. • Investigate and troubleshoot Check Point licenses and contracts.
TARGET AUDIENCE:
This course is designed for security administrators and Check Point resellers who need to manage and monitor issues that may occur within their Security Management environment.
COURSE PREREQUISITES:
• Working knowledge of UNIX and/or Windows operating systems. • Working knowledge of Networking TCP/IP. • CCSA training/certification. • Advanced knowledge of Check Point Security products.
COURSE CONTENT:
Topics• Introduction to Troubleshooting Fundamentals • Fundamentals of Traffic Monitoring • SmartConsole and Policy Management Troubleshooting • Identity Awareness Troubleshooting • Access Control Troubleshooting • Troubleshooting Issues with NAT • Understanding Threat Prevention • License and Contract Troubleshooting
Exercises
• Using tcpdump and Wireshark • Viewing Firewall Chain Modules • Using Basic Linux and Check Point Commands • Troubleshooting Logging Communication Issues • Analyzing Traffic Captures • Troubleshooting SmartConsole and Using SmartConsole Tools • Troubleshooting Identity Awareness • Troubleshooting Application Control and URL Filtering • Investigating Network Address Translation Issues • Evaluating Advanced Threat Prevention Products • Verifying Licenses
FOLLOW ON COURSES:
Attend two Infinity Specialization courses and pass their exams to automatically become a Check Point Certified Security Master (CCSM).Attend four Infinity Specialization courses and pass their exams to automatically become a Check Point Certified Security Master Elite (CCSM Elite).Choose from the following Infinity Specialization courses:• Check Point Certified Endpoint Specialist (CCES)• Check Point Certified Troubleshooting Administrator (CCTA)• Check Point Certified Automation Specialist (CCAS)• Check Point Certified Cloud Specialist (CCCS)• Check Point Certified MDSM Specialist (CCMS) • Check Point Certified VSX Specialist (CCVS)• Check Point Certified Troubleshooting Expert (CCTE)• Check Point Certified Maestro Expert (CCME)• Check Point Certified Cloud Network Security Expert for AWS (CNSE-AWS) • Check Point Certified Cloud Network Security Expert for Azure (CNSE-AZURE)