Facebook

Checkpoint Courses

Most popular
Trending

All Checkpoint Courses

Checkpoint Online Training Courses - Live



We found 11 courses available for you
See

CNSE-AWS Cloud Network Security Expert for AWS

26 Lessons
Intermediate

Course Description: Learn advanced concepts and develop skills needed to …

What you'll learn
Discuss AWS Platform Components and their relationship to Check Point CloudGuard Network Security.
Explain how to maintain a secure, efficient, and stable cloud environment.
Describe the components and constraints of a hub and spoke security environment.
Describe the function of the Cloud Management Extension.
Explain the purpose of identity and access controls and constraints in different cloud platforms.
Explain the steps required to configure Identity and Access controls in AWS.
Describe the purpose and function of the CloudGuard Controller, its processes, and how it is tied to the Identity Awareness feature.
Explain how to design and configure Cloud Adaptive Policies.
Discuss the purpose and function of Data Center Objects.
Describe the function and advantages of Cloud Service Provider (CSP) automation templates for instance and resource deployments.
Explain how CSP templates can be used for maintenance tasks in the cloud environment.
Discuss Third-Party Automation tools, how they can simplify deployment and maintenance tasks, and the constraints associated with them.
Discuss Scaling Solutions and Options for Cloud Environments.
Explain the Scaling Options in AWS.
Describe the workflow for configuring scaling solutions in AWS.
Discuss how ClusterXL operates and what elements work together to permit traffic failover.
Explain how ClusterXL functions differently in a Cloud Environment.
Describe how clusters are created and function in AWS.
Discuss the elements involved in Hybrid Data Center deployments, the advantages of them, and the constraints involved.
Explain the nature of a “Greenfield” deployment, the advantages of it, and the constraints involved.
Describe the components and constraint involved in deploying a Disaster Recovery Site in the cloud.
Discuss the steps required for troubleshooting automation in AWS.
Explain the steps required for troubleshooting Scaling Solution issues in AWS.
Describe the steps required for troubleshooting clusters in AWS.

CNSE-AZURE: Cloud Network Security Expert for Azure

27 Lessons
Intermediate

Course Description: Learn advanced concepts and develop skills needed to …

What you'll learn
Discuss Azure Platform Components and their relationship to Check Point CloudGuard Network Security.
Explain how to maintain a secure, efficient, and stable cloud environment.
Describe the components and constraints of a hub and spoke cloud security environment.
Describe the function of the Cloud Management Extension
Explain the purpose of identity and access controls and constraints in different cloud platforms.
Explain the steps required to configure Identity and Access controls in Azure.
Describe the purpose and function of the CloudGuard Controller, its processes, and how it is tied to the Identity Awareness feature.
Explain how to design and configure Cloud Adaptive Policies.
Discuss the purpose and function of Data Center Objects.
Describe the function and advantages of Cloud Service Provider (CSP) automation templates for instance and resource deployment.
Explain how CSP templates can be used for maintenance tasks in the cloud environment.
Discuss Third-Party Automation tools, how they can simplify deployment and maintenance tasks, and the constraints associated with them.
Discuss Scaling Solutions and Options for Cloud Environments.
Explain the Scaling Options in Azure.
Describe the workflow for configuring scaling solutions in Azure.
Discuss how ClusterXL operates and what elements work together to permit traffic failover.
Explain how ClusterXL functions differently in a Cloud Environment.
Describe how clusters are created and function in Azure.
Discuss the elements involved in Hybrid Data Center deployments, the advantages of them, and the constraints involved.
Explain the nature of a “Greenfield” deployment, the advantages of it, and the constraints involved.
Describe the components and constraint involved in deploying a Disaster
Recovery Site in the cloud.
Discuss the steps required for troubleshooting automation in Azure.
Explain the steps required for troubleshooting Scaling Solution issues in Azure.
Describe the steps required for troubleshooting clusters in Azure.

CCCS Check Point Certified Cloud Specialist – Administrator

18 Lessons
48 hours
Intermediate

Course Description Learn basic concepts and develop skills necessary to …

What you'll learn
Explain the nature of the cloud environment
Describe the five pillars of cloud architecture
Explain the Basics of Cloud Infrastructure
Explain the Basics of Cloud Automation
Explain Check Point Security Management and How it Applies to CloudGuard
Describe CloudGuard Security Gateway offerings
Describe Cloud Load Balancers
Explain CloudGuard Licensing
Explain the different Deployment options and architectures for CloudGuard
Explain how and why CloudGuard is automated
Describe the functions of CloudGuard that can be automated
Describe the tools used to automate CloudGuard
Explain CloudGuard Automation Requirements
Explain basic troubleshooting techniques specific to Check Point Security Management Servers and Security Gateways
Describe the steps for Troubleshooting CloudGuard Network Installation
Explain the tools and techniques used to troubleshoot CloudGuard Network Automation
Explain the need for Cloud Security Posture Management
Describe the posture management tools available in CloudGuard
Explain methods for correcting Cloud Security Posture Management issues

CCVS Check Point Certified VSX Specialist

15 Lessons
16 hours
Intermediate

Course Description: This course provides a comprehensive understanding of the …

What you'll learn
Explain the benefits of virtual network security.
Understand the basic functions, components, and advantages of VSX technology.
Examine the VSX management infrastructure and understand how traffic flows within a VSX network.
Discuss options for deploying VSX technology within various types of organizations.
Understand how to install and configure VSX Gateways and Virtual Systems.
Describe different routing schemes and features that are available to use within the VSX environment.
Understand how to deploy additional VSX networking configurations that may be required in the environment.
Understand the differences between deploying physical Security Gateway Clusters and VSX Gateway Clusters.
Understand how Virtual System Load Sharing works to enhance VSX network performance.
Understand how to use the VSX Provisioning Tool to add and remove virtual devices.
Recall how CoreXL technology enhances Security Gateway performance and recognize how to use the technology in a VSX environment.
Understand how to employ tools for optimizing resources allocated in a VSX environment.
Identify various VSX command line tools commonly used to retrieve information and perform configuration changes.
Understand how to use VSX utility commands to perform various maintenance tasks for the VSX environment.
Understand how to troubleshoot and debug issues that may occur in a VSX environment.

CCTE Check Point Troubleshooting Expert

24 Lessons
16 hours
Intermediate

Course Description: Provide advanced troubleshooting skills to investigate and resolve …

What you'll learn
Understand how to use Check Point diagnostic tools to determine the status of a network.
Understand how to use network packet analyzers and packet capturing tools to evaluate network traffic.
Become familiar with more advanced Linux system commands.
Obtain a deeper knowledge of the Security Management architecture.
Understand how the Management database is structured and how objects are represented in the database.
Understand key Security Management Server processes and their debugs.
Understand how GuiDBedit operates.
Understand how the kernel handles traffic and how to troubleshoot issues with chain modules.
Understand how to use the two main procedures for debugging the Firewall kernel and how they differ.
Recognize User mode prcesses and how to interpret their debugs.
Discuss how to enable and use core dumps.
Understand the processes and components used for policy installs and processing packets in Access Control policies.
Understand how to troubleshoot and debug issues that may occur with App Control and URLF.
Understand how to debug HTTPS Inspection-related issues.
Understand how to troubleshoot and debug Content Awareness issues.
Understand how IPS works and how to manage performance issues.
Understand how to troubleshoot Anti-Bot and Antivirus.
Recognize how to troubleshoot and debug Site-to-Site VPNrelated issues.
Understand how to troubleshoot and debug Remote Access VPNs.
Understand how troubleshoot Mobile Access VPN issues.
Recognize how to use SecureXL features and commands to enable and disable accelerated traffic.
Understand how the server hardware and operating system affects the performance of Security Gateways.
Understand how to evaluate hardware configurations for optimal performance

CCTA Check Point Troubleshooting Administration

19 Lessons
16 hours
Intermediate

Course Description: Provide an understanding of the concepts and skills …

What you'll learn
Understand how to use Check Point resources for support.
Understand how to perform packet captures using tcmdump and FW Monitor command tools.
Understand the basic process of kernel debugging, and how debug commands are structured.
Recognize how to use various Linux commands for troubleshooting system issues.
Recognize communication issues that may occur between SmartConsole and the SMS and how to resolve them.
Understand how to troubleshoot SmartConsole login and authentication issues.
Understand how to prevent and resolve licensing and contract issues.
Understand how to troubleshoot issues that may occur during policy installation.
Understand communication issues that may occur when collecting logs and how to resolve them.
Recall various tools to use when analyzing issues with logs.
Understand how to restore interrupted communications during heavy logging.
Understand how NAT works and how to troubleshoot issues.
Understand Client Side and Server Side NAT.
Understand how the Access Control Policy functions and how the access control applications work together.
Understand how to troubleshoot issues that may occur with Application Control and URL Filtering.
Understand how the HTTPS Inspection process works and how to resolve issues that may occur during the process.
Understand how to troubleshoot Content Awareness issues.
Recognize how to troubleshoot VPN-related issues.
Understand how to monitor cluster status and work with critical devices.
Recognize how to troubleshoot State Synchronization.
Understand how to troubleshoot communication issues between Identity Sources and Security Gateways.
Understand how to troubleshoot and debug issues with internal Identity Awareness processes.

CCSE Check Point Certified Security Expert

13 Lessons
Intermediate

Course Description: Validate and enhance your skills and optimally manage …

What you'll learn
Articulate Gaia system management procedures.
Explain how to perform database migration procedures.
Articulate the purpose and function of Management High Availability.
Describe how to use Check Point API tools to perform management functions.
Articulate an understanding of Security Gateway cluster upgrade methods.
Discuss the process of Stateful Traffic inspection.
Articulate an understanding of the Check Point Firewall processes and debug procedures.
Describe advanced ClusterXL functions and deployment options.
Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance.
Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance.
Articulate how utilizing multiple traffic queues can make traffic handling more efficient.
Describe different Check Point Threat Prevention solutions for network attacks.
Explain how SandBlast, Threat Emulation, and Threat Extraction help to prevent security incidents.
Recognize alternative Check Point Site-to-Site deployment options.
Recognize Check Point Remote Access solutions and how they differ from each other.
Describe Mobile Access deployment options.

CCSA Check Point Certified Security Administrator

25 Lessons
24 hours
Intermediate

Course Description: Provide an understanding of basic concepts and skills …

What you'll learn
Interpret the concept of a Firewall and understand the mechanisms used for controlling network traffic.
Describe the key elements of Check Point’s unified Security Management Architecture.
Recognize SmartConsole features, functions and tools.
Understand Check Point deployment options.
Describe the basic functions of Gaia.
Describe the essential elements of a Security Policy.
Understand how traffic inspection takes place in a unified Security Policy.
Summarize how administration roles and permissions assist in managing policy.
Recall how to implement backup techniques.
Understand the Check Point policy layer concept.
Recognize Check Point security solutions and products and how they work to protect your network.
Understand licensing and contract requirements for Check Point security products.
Identify tools designed to monitor data, determine threats and recognize performance improvements.
Identify tools designed to respond quickly and efficiently to changes in gateways, tunnels, remote users, traffic flow patterns, and other activities.
Understand Site-to-Site and Remote Access VPN deployments and communities.
Understand how to analyze and interpret VPN traffic.
Recognize how to define users and user groups.
Understand how to manage user access for internal and external users.
Understand the basic concepts of ClusterXL technology and its advantages.
Understand how to perform periodic administrator tasks as specified in administrator job descriptions.
🚀 Boost Your Career with Premium Training at Unbeatable Prices! Limited-time Special Offer on Top Certifications.
This is default text for notification bar