Overview
The Check Point Security Administration R81.20 course provides an in-depth introduction to the essential skills needed to configure and manage Check Point Security Gateways and Management Software Blades. Designed for IT professionals, this course equips participants with a solid foundation in network security management, policy creation, and troubleshooting within Check Point’s robust architecture.
Objectives
By the end of this course, participants will:
Prerequisites
- Basic knowledge of networking concepts, including TCP/IP.
- Familiarity with Windows and UNIX/Linux operating systems.
- Experience with internet and network security fundamentals is recommended.
Course Outline
- Overview of Check Point security solutions.
- Understanding Check Point deployment options.
- Introduction to Security Management Architecture (SMA).
- Defining and managing security policies.
- Rulebase and rule priorities.
- Configuring layers and inline rules.
- Introduction to NAT.
- Configuring and troubleshooting NAT rules.
- Practical use cases for NAT.
- Utilizing SmartConsole monitoring tools.
- Configuring logs and alerts.
- Understanding Check Point’s threat prevention logs.
- Tools and techniques for troubleshooting.
- Identifying and resolving connectivity issues.
- Debugging and log analysis.