Check Point Certified Security Administrator (CCSA) R77
Check Point Security Administration R77 provides an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades. During this course you will configure a Security Policy and learn about managing and monitoring a secure network, upgrading and configuring a Security Gateway and implementing a virtual private network.
Target Audience
- System Administrators
- Support Analysts
- Security Managers
- Network Engineers
- Anyone seeking CCSA certification
Course Content
Introduction to Check Point Technology
- Describe Check Point’s unified approach to network management and the key elements ofthis architecture
- Design a distributed environment
- Install the Security Gateway in a distributed environment
Deployment Platform
- Perform a backup and restore the current Gateway installationfrom the command line
- Identify critical files needed to purge or backup, import and export users and groups and addor delete administrators from the command line
- Deploy Gateways using the Gaia web interface
- Deploy Gateways using the sysconfig and cpconfig from the Gateway command line
Introduction to Security Policy
- Create and configure network, host and gateway objects
- Verify SIC establishment between the Security Management Server and the Gateway using SmartDashboard
- Create a basic Rule Base in SmartDashboard that includes permissions for administrative users, external services, and LAN outbound use
- Configure NAT rules on Web and Gateway servers
- Evaluate existing policies and optimize the rules based on current corporate requirements
- Maintain the Security Management Server with scheduled backups and policy versions to ensure seamless upgrades with minimal downtime
Monitoring Traffic and Connections
- Use Queries in SmartView Tracker to monitor IPS and common network traffic and troubleshoot events using packet data
- Using packet data on a given corporate network, generate reports, troubleshoot system and security issues and ensure network functionality
- Using SmartView Monitor, configure alerts and traffic counters, view a Gateway’s status, monitor suspicious activity rules, analyze tunnel activity and monitor remote user access
Using SmartUpdate
- Monitor remote Gateways using SmartUpdate to evaluate the need for upgrades, new installations, and license modifications
- Use SmartUpdate to apply upgrade packages to single or multiple VPN-1 Gateways
- Upgrade and attach product licenses using SmartUpdate
User Management and Authentication
- Centrally manage users to ensure only authenticated users securely access the corporate network either locally or remotely
- Manage users to access the corporate LAN by using external databases
Identity Awareness
- Use Identity Awareness to provide granular level access to network resources
- Acquire user information used by the Security Gateway to control access
- Define Access Roles for use in an Identity Awareness rule
- Implement Identity Awareness in the Firewall Rule Base
Introduction to Check Point VPNs
- Implement Identity Awareness in the Firewall Rule Base
- Configure a pre-shared secret site-to-site VPN with partner sites
- Configure permanent tunnels for remote access to corporate resources
- Configure VPN tunnel sharing, given the difference between host-based, subunit-based and gateway-based tunnels
Responses