Uddannelsestilbud

Check Point Certified Security Master (CCSM) R80.10

Information

Pris kr 15.000  Ekskl. moms
Varighed: 3 Dage
Ref: CKT_CCSM_R80.10
Delivery Type

Sessionsdatoer

Se sessioner for andre lande
Dato Sted
  • København - Ballerup
    kr 15.000  Ekskl. moms
  • Århus - Viby
    kr 15.000  Ekskl. moms
  • Virtual Classroom
    kr 15.000  Ekskl. moms
  • København - Ballerup
    kr 15.000  Ekskl. moms
  • Århus - Viby
    kr 15.000  Ekskl. moms
  • Virtual Classroom (CET / UTC +1)
    kr 15.000  Ekskl. moms
  • København - Ballerup
    kr 15.000  Ekskl. moms
  • Århus - Viby
    kr 15.000  Ekskl. moms
  • Virtual Classroom (CET / UTC +1)
    kr 15.000  Ekskl. moms
Disse oplysninger findes også beregnet for intra-virksomhedsuddannelsen. Tøv ikke med at kontakte os for at få flere oplysninger

Beskrivelse

Advanced training to manage virtualized security in high-end networks and advanced security optimization techniques.

Formål

Chapter 1: Introduction to Security Master
Chapter 2: Chain Modules
Chapter 3: NAT
Chapter 4: ClusterXL
Chapter 5: VPN Troubleshooting
Chapter 6: SecureXL Acceleration Debugging
Chapter 7: Hardware Optimization
Chapter 8:  Software Tuning
Chapter 9:  Enable CoreXL
Chapter 10:  IPS
Chapter 11:  IPv6
Chapter 12: Advanced VPN

Målgruppe

This course is for customers and partners who want to learn the advanced skills to troubleshoot and configure Check Point Security Gateway and Management Software Blades:



  • System Administrators

  • Security Engineers

  • Network Engineers

  • CCSEs seeking higher certification

Forudsætninger


  • CCSE

  • General knowledge of TCP/IP

  • Working knowledge of Windows and UNIX

  • Working knowledge of network technology

  • Working knowledge of the Internet

Program


  • Firewall-1 administration and infrastructure review

  • How policy changes impact chain module behavior

  • Identify management issues and problems with commands

  • Use commands to troubleshoot NAT stages

  • Configure Manual NAT to define specific rules

  • Use commands to review and clear connections table

  • Modify files to allow traffic through a specific cluster member

  • Locate the source of encryption failures using commands

  • Use commands to verify VPN connectivity

  • Identify any potentially mis-configured VPNs

  • Tune     NIC     performance    

  • Increase size and improve hardware performance

  • Improve load capacity

  • Tune the firewall rule base

  • Reduce load on Rule Base application

  • Improve network performance 

  • Improve     logging     efficiency    

  • Use IPS Bypass to manage performance

  • Deploy IPv6 in a local envrionment

  • Identify differences between VPNs

  • Configure VPN Tunnel Interface (VTI) 

  • Configure Open Shortest Path First (OSPF)

  • Identify the wire mode function by testing a VPN failover

© 2018 VALit Aps - Arrow ECS. All rights reserved.