Check Point Certified Security Administrator (CCSA) R82
4 590 zł netto
Ukończyło: 85 osób
Akceptujemy formy płatności: PayU, Faktura pro-forma, Faktura VAT po szkoleniu
Rozłóż na raty z
Czego się nauczysz?
Zakres szkolenia
Pobierz zakres w PDF• Identify the primary components of the Check Point Three-Tier Architecture and explain how they work together in the Check Point environment.
Lab Tasks
• Explore Gaia on the Security Management Server
• Explore Gaia on the Dedicated Log Server
• Explore Gaia on the Security Gateway Cluster Members
• Connect to SmartConsole
• Navigate GATEWAYS & SERVERS Views
• Navigate SECURITY POLICIES Views
• Navigate LOGS & EVENTS Views
• Navigate MANAGE & SETTINGS Views
• Explain the purpose of SmartConsole administrator accounts.
• Identify useful features for administrator collaboration, such as session management, concurrent administration, and concurrent policy installation.
Lab Tasks
• Create New Administrators and Assign Profiles
• Test Administrator Profile Assignments
• Manage Concurrent Administrator Sessions
• Take Over Another Session and Verify Session Status
• Explain the purpose of SmartConsole Objects.
• Give examples of SmartConsole Physical and Logical Objects.
Lab Tasks
• View and Modify GATEWAYS & SERVERS Objects
• View and Modify Network Objects
• View and Modify Service Objects
• Explain the purpose of Security Policies.
• Identify the essential elements of a Security Policy.
• Identify features and capabilities that enhance the configuration and management of the Security Policy.
Lab Tasks
• Verify the Security Policy
• Modify Security Policies
• Install the Standard Security Policy
• Test the Security Policy
• Demonstrate an understanding of the Check Point policy layer concept.
• Explain how policy layers affect traffic inspection.
Lab Tasks
• Add an Ordered Layer
• Configure and Deploy the Ordered Layer Rules
• Test the Ordered Layer Policy
• Create an Inline DMZ Layer
• Test the Inline DMZ Layer
• Explain the purpose of Security Operations Monitoring.
• Tune the Log Server configuration.
• Use predefined and custom queries to filter the logging results.
• Monitor the state of Check Point systems.
Lab Tasks
• Configure Log Management
• Enhance Rulebase View, Rules, and Logging
• Review Logs and Search for Data
• Configure the Monitoring Blade
• Monitor the Status of the Systems
• Explain the purpose of the Identity Awareness solution.
• Identify the essential elements of Identity Awareness.
Lab Tasks
• Adjust the Security Policy for Identity Awareness
• Configure the Identity Collector
• Define the User Access Role
• Test Identity Awareness
• Explain the purpose of the HTTPS Inspection solution.
• Identify the essential elements of HTTPS Inspection.
Lab Tasks
• Enable HTTPS Inspection
• Adjust Access Control Rules
• Deploy the Security Gateway Certificate
• Test and Analyze Policy with HTTPS Inspection
• Explain the purpose of the Application Control and URL Filtering solutions.
• Identify the essential elements of Application Control and URL Filtering.
Lab Tasks
• Adjust the Access Control Policy
• Create and Adjust Application Control and URL
• Test and Adjust the Application Control and URL Filtering Rules
• Explain the purpose of the Threat Prevention solution.
• Identify the essential elements of Autonomous Threat Prevention.
Lab Tasks
• Enable Autonomous Threat Prevention
• Test Autonomous Threat Prevention
Opinie firm i użytkowników
Co otrzymujesz w cenie?
Termin
Sprawdź nasz blog
ChatGPT, Microsoft 365 Copilot, Google Gemini – porównanie najpopularniejszych aplikacji AI
Wykorzystaj budżet z 2025
Sprawdź vouchery na 2026