• Post category:Udemy (July 2022)
  • Reading time:10 mins read


Learn CheckPoint Firewall CCSA R80.40 with Step by Step Lab Workbook

What you will learn

Configure and Manage CheckPoint Firewall

Understand Checkpoint Firewalls Deployment Methods

How to setup a Lab Environment

Understand how to deploy Checkpoint Firewalls in EVE NG

Understand Security Gateway Firewalls NAT configuration

Understand User ID Integration

Configure Captive Portal to authenticate users

How to Add Evaluation License in SG.

Introduction to Command Line Interface CLI.

Install and Configure Active Directory (AD) for IA.

Introduction to Backup and Restore in CheckPoint.

Description

Check Point CCSA certification is the very important for IT admins who manage day to day operations of Checkpoint solutions. Here you will get expertise in startup, manage and configure day to day Check Point installations with R80. Course covers how to install R80 security gateway in a distributed environment, configure rules and defines a policy for security, how to work with multiple administrators and how to define permission profiles. After completion of this certification you will be expert in to keep your network secure, you will be expert in evaluating existing security policy, you will be able to manage multiple user access to organization LANs, you will be expert in to monitor any suspicious activities over the internet and you can analyze security attacks better, implement backup for Check Point.

Prerequisites:

You should have basic level knowledge of networking, you should have 6 months to 1-year experience with Check Point products and this is mandatory.

Check Point Primary Products:

Network Security, Software Defined Protection, Public and Private Cloud Security, Zero Trust Remote Access, Data Security, IoT Security, ThreatCloud, ThreatCloud IntelliStore, Virtual Systems, Endpoint Security, Mobile Security, Security Management, Document Security (Capsule Docs product line), Zero-day Protection (SandBlast appliance product line) and Mobile Security (Mobile Threat Prevention product line).

The following course includes lectures on how Check Point features work and the walk-through of the configuration in the lab/production environment. From the very beginning following step-by-step approach you will be able to grasp advanced concepts and step on the next level.

The course is structured in an easy to follow manner starting from the very basic to advanced topics. The topics that are covered are: Installing Check Point in a lab environment, understanding general principles of Firewalling.

THE COURSE INCLUDES:

Introduction to CheckPoint Technology

Building the Lab


Subscribe to latest coupons on our Telegram channel.

Installing OS / Configuration

Overview of the products

Licensing

Backups

NAT

Deployment Options

Command Line Interface

Identity Awareness

Terminologies

Three Tier Architecture

English
language

Content

Introduction to the Technology

Common Network Security Terms.
Introduction to Firewall Technologies.
Introduction to Web Application Firewall.
Introduction to Next-Generation Firewall.
Introduction to Check Point Software Company.
Introduction to Check Point CCSA R80 Certificate.
Introduction to Check Point Terminologies.

Check Point Installation

Install Check Point Firewall on VMware Workstation.
Download and Install Smart Console (GUI Client).
Upload and Install Check Point Firewall in EVE NG.
Upload readymade Check Point Firewall Image to EVE NG.

About Check Point

Introduction and Theory of Check Point Gaia OS.
Check Point Firewall Gaia Portal Walkthrough.
Check Point Firewall Tour of Smart Console GUI Client.
Introduction to Check Point Three Tier Architecture.
Introduction to Check Point Deployment Options.

Standalone Deployment

Standalone Deployment Part-1 Create Topology.
Standalone Deployment Part-2 First Time Wizard.
Standalone Deployment Part-3 Network Interfaces.
Standalone Deployment Part-4 Static Default Route.
Standalone Deployment Part-5 Configure Hosts.
Standalone Deployment Part-6 Smart Console.
Standalone Deployment Part-7 Security Policy.
Standalone Deployment Part-8 NAT Policy.
Standalone Deployment Part-9 Verification.

Distributed Deployment

Distributed Deployment Part-1 Create Topology.
Distributed Deployment Part-2 SG Configuration.
Distributed Deployment Part-3 SMS Configuration.
Distributed Deployment Part-4 Network Interface SG.
Distributed Deployment Part-5 Smart Console GUI.
Distributed Deployment Part-6 Add Security Gateway.
Distributed Deployment Part-7 Security Policy.
Distributed Deployment Part-8 Configure Hosts.
Distributed Deployment Part-9 Verification.

VLAN Deployment

VLAN Deployment Part-1 Create Lab Topology.
VLAN Deployment Part-2 First Time Wizard.
VLAN Deployment Part-3 Network Interfaces.
VLAN Deployment Part-4 Static Default Route.
VLAN Deployment Part-5 Configure the Hosts.
VLAN Deployment Part-6 Switch Configuration.
VLAN Deployment Part-7 SmartConsole GUI.
VLAN Deployment Part-8 Security Policy.
VLAN Deployment Part-9 The NAT Policy.
VLAN Deployment Part-10 Verification.

Bridge Mode

Check Point Bridge Mode Theory and Lab.
Introduction to Bond Theory in Check Point.

License.

How to Request Evaluation
How to Add Evaluation License in SG.
How to Configure Network Messages and Banners.

Command Line Interface CLI

Introduction to Command Line Interface CLI.
Command Line Interface Main and Other Operations.
Command Line Interface Keystroke and Commands.
Command Line Interface CLI Clish More Commands.
Command Line Interface CLI More Advance Commands.
Configuration Lock in Command Line Interface CLI.
Command Line Interface CLI Expert Mode and Commands.

Network Address Translation

Introduction to Network Address Translation NAT.
Type of NAT in Check Point Firewall Security Gateway.
Introduction to Network Address Translation Topology.
Configure and Verify Automatic Hide NAT in Firewall.
Configure and Verify Automatic Static NAT in Firewall.
Configure and Verify Manual Hide NAT in Firewall.
Configure and Verify Manual Static NAT in Firewall.
Introduction of Hairpin NAT in Security Gateway.
Configure and Verify Hairpin NAT in Firewall.
Introduction, Configure and Verify No-NAT in Firewall.

Identity Awareness

Introduction to Identity Awareness (IA) in Checkpoint.
Install and Configure Active Directory (AD) for IA.
Install and Configure Domain Name System DNS for IA.
Configure Users and Groups in Active Directory AD.
Join Windows Machine to Domain Controller AD.
Configure and Enable Identity Awareness Blade.
Configure and Verify Access Roles and Policies.
Configure and Verify Browser-Based Authentication.

Backup and Restore

Introduction to Backup and Restore in CheckPoint.
Configure and Verify System Backup & Restore GUI Lab.
Configure and Verify System Backup & Restore CLI Lab.
Configure and Verify Show & Saving Configuration Lab.
Configure and Verify Snapshot Management GUI & CLI.