Sunteți pe pagina 1din 1

CHECK POINT CYBER SECURITY ENGINEERING (CCSE) R80.

10
WHO SHOULD ATTEND?
Expert users and resellers who need to perform advanced deployment configurations of Check Point Software Blades.
COURSE GOAL:
Validate your understanding and skills necessary to configure and optimally manage Check Point Next Generation Firewalls.
PREREQUISITES:
• CCSA training/certification
• Working knowledge of Windows, UNIX, networking, TCP/IP, and the Internet.

COURSE TOPICS COURSE OBJECTIVES


• System Management • Identify advanced CLI commands.
• Automation and Orchestration • Understand system management procedures, including
• Redundancy how to perform system upgrades and apply patches
and hotfixes.
• Acceleration
• Describe the Check Point Firewall infrastructure.
• SmartEvent
• Describe advanced methods of gathering important
• Mobile and Remote Access
gateway data using CPView and CPInfo.
• Threat Prevention
• Recognize how Check Point’s flexible API architecture
supports automation and orchestration.
LAB EXERCISES • Discuss advanced ClusterXL functions.
• Upgrading a Security Management Server to R80.10 • Describe VRRP network redundancy advantages.
• Applying Check Point Hotfixes • Undersand how SecureXL acceleration technology is
• Configuring a New Security Gateway Cluster used to enhance and improve performance.
• Core CLI Elements of Firewall Administration • Understand how CoreXL acceleration technology is
used to enhance and improve performance.
• Configuring Manual Network Address Translation
• Identify the SmartEvent components that store network
• Managing Objects Using the Check Point API
activity logs and identify events.
• Enabling Check Point VRRP
• Discuss the SmartEvent process that determines which
• Deploying a Secondary Security Management Server network activities may lead to security issues.
• Viewing the Chain Modules • Understand how SmartEvent can assist in detecting,
• Working with SecureXL remediating, and preventing security threats.
• Working with CoreXL • Discuss the Mobile Access Software Blace and how it
• Evaluating Threats with SmartEvent secures communication and data.
• Managing Mobile Access • Understand Mobile Access deployment options.
• Understanding IPS Protections • Recognize Check Point Remote Access solutions.
• Deploying IPS Geo Protection • Discuss Check Point Capsule components and how
they protect mobile devices and business documents.
• Reviewing Threat Prevention Settings and Protections
• Discuss diferent Check Point Solutions for attacks such
• Deploying Threat Emulation and Threat Extraction
as zero-day and Advanced Persistent Threats.

CCSE
Understand how SandBlast, Threat Emulation, and
CERTIFICATION Threat Extraction prevent security incidents.
INFORMATION
• Identify how Check Point Mobile Threat Prevention can
Prepare for exam #156-315.80 at VUE.com/checkpoint
help protect data accessed on company-issued
smartphones and tablets.

©2017 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non-confidential content
March 9, 2017

S-ar putea să vă placă și