Enforcing Network Security Policy using Check Point Quantum Spark Appliance (SMB)

What you will learn

This course introduces you to Check Point’s Quantum Spark Pro Next Generation Firewalls for Small and Medium Business (SMB) networks.

You will learn how to deploy, configure, manage, and monitor network security policy on the Quantum Spark Pro Next Generation Firewalls.

The Check Point Quantum Spark security gateway family delivers enterprise-grade security to protect small business networks

Quantum Spark models with Wi-Fi, and Wi-Fi with an embedded 5G modem fit seamlessly into your home and branch office networks.

Description

Check Point Quantum Spark (SMB) Appliances are high-performance, integrated devices offering optional WiFi and LTE support. Standard Check Point Network Security features such as Firewall, VPN, Anti-Virus, Application Control, URL Filtering, Email Security, and SandBlast Zero-Day Protection are supported.

This course includes these modules:

1. Introduction

2. Installation

3. WebUI Overview

4. Out-of-the-Box State

5. Policy Customization

6. Smart Accel

7. VoIP Wizard

8. Local Management

9. Centrally Managed

10. SMP

11. Active Directory Sync

12. Threat Prevention

13. SSL Inspection

14. Configure Interface

15. Configure Wireless Networks


Get Instant Notification of New Courses on our Telegram channel.


16. Enable cellular

17. Reach My Device

18. Reuse Token

19. Configure Watchtower

20. Automatic and Manual Upgrade

21. Site-to-Site VPN

22. Remote Access VPN

23. Monitoring

24. Troubleshooting Overview

25. Backup and Restore

26. Configure OSPF

This course is suitable for new Check Point customers with prior experience configuring or administrating Check Point Network Security products.

Check Point Company Overview

Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry-leading catch rate of malware, ransomware, and other types of attacks. Check Point offers multilevel security architecture, β€œInfinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network, and mobile device-held information. Check Point provides the most comprehensive and intuitive one-point-of-control security management system. Check Point protects over 100,000 organizations of all sizes.

With Check Point Infinity, the only consolidated cyber security solution across cloud, networks, endpoints, mobile, and IoT, we are continuously pioneering cyber security innovation with the most advanced AI-based threat Intelligence and prevention technologies, unified security management, and cloud security automation to help protect organizations from 6th generation of cyber attacks.

With over 3,500 security experts, a world-acclaimed research and intelligence unit, and the broadest ecosystem of business and technology partners, we protect over 100,000 organizations of all sizes across all industry verticals in 88 countries to allow better experiences in a safer digital world.

English
language

Content

Introduction

Introduction

Installation

Installation

WebUI

WebUI Overview

Policy

Out of the Box State
Policy Customization
Smartaccel
VoIP Wizard

Management

Local
Central
SMP

User Management

Active Directory Sync

Threat Prevention

TP Out of the Box State
SSL Inspection by asset type

Networking

Configure Interfaces
Configure Wireless Networks
Enable cellular

Reach my Device

Reach my Device
Reuse Token

Mobile

Configure watchtower

Upgrade

Manual and automatic

VPN

Site to Site
Remote Access

Monitoring

Monitoring

Troubleshooting

Overview
Backups

Dynamic Routing

Configure OSPF