CCSA
Firewall

CCSA

COURSE OBJECTIVE
0
LAB
0
INSTRUCTOR KNOWLEDGE
0
COURSE CONTENT PLAN
0
Summary rating from 0 user's marks. You can set own marks for this article - just click on stars above and press "Accept".
0

This course is designed for students who are new to Checkpoint firewall and looking to expand their skill sets in network and secuirty domain. Candidates should have basic understaing on ip addressing, routing and switching technoilogies.

Upon completion of this course, students will be able to:

  • Explain the features and advantages of the checkpoint firewall architecture
  • Perform the basic & advance configuration of the firewall including:
    • Checkpoint three tier Architecture
    • Understating packet flow with NAT, policy , VPN operation
    • Configuring interfaces, security policies
    • Setting up detailed operation of NAT
    • Overview of IPsec VPN technology
    • Understating various tools including smart dashboard, smart view tracker, monitor, update etc..
    • Authentication with identity awareness

Course content

Module 0 – Security basics & firewall technologies overview

  • Network security concepts explained
  • Enterprise security architecture – defense in depth / layered security architecture
  • Understanding various firewall technologies likes of :
    • Packet filter firewall
    • Application gateway firewall
    • Stateful Inspection
    • Next generation firewall
  • Basic understanding on Various application protocols including HTTP, FTP, DNS & DHCP

Module 1 – Checkpoint platform Architecture

  • Understanding on 3-tier architecture
    • Security Gateway
    • Security Management
    • Smart Console tools
  • Secure internal communication (SIC)
  • Understating Anti spoofing and topology configuration in checkpoint
  • Design consideration with checkpoint security solution
  • Detailed checkpoint Packet flow

Module2 – Installation and Administration in virtual environment

  • Understanding standalone and distributed deployment architecture
  • Understanding IP address spoofing and security gateway topology
  • Understating checkpoint security rule base
    • Implicit security policies
    • Explicit security policies
    • Rule base order
    • Security policy designing best practices
  • Controlling multiple policy packages via single Security Management

Module3 – Network Address Translation

  • Overview on NAT requirements
  • Network address translation
    • Source NAT
    • Destination NAT
    • Static NAT
    • Dual NAT
  • Understating and implementation of NAT policies

Module 4 – Introduction of VPN

  • Overview of VPN technologies
    • SSL VPN
    • IPsec VPN
  • Understating on policy based vpn and its limitations
  • Route based VPN

Module 5 – Advanced administration & Configuration

  • Backup of Security gateway and Security management
    • Crating snapshots
    • Import export tool
    • Database revision control
  • Understating checkpoint licensing using smart update
  • Understating checkpoint auditing and reporting tools
    • Smart view tracker
    • Smart event
    • Smart reporter
  • Upgrade a clustered security gateway deployment
  • Consolidate multiple firewalls to single management platform
  • Understating basic checkpoint command line operation

Module 6 – Identity Awareness

  • Overview of Identity awareness to configure network access rules
  • Integration with Active Directory/ LDAP
  • Understanding on different Identity Awareness scenarios
  • Acquiring identities for AD users
  • Acquiring identities with Browser based authentication
  • Acquiring identities with Endpoint identity Agents

 

Book Your Course
devashish.jpg

I

t always gives an pleasure and amazing feeling when someone ask me “Hey, I wanna learn more security stuff” and I say ” why don’t you go there..” And response is always “do you mean Dwarka or troika or vikas and govil..?? I always add by saying proudly that whatever I am or where ever I’ll go is all because of them. No alternatives no confusions just go and grow.

deepak.jpg

T

roika is the place where the guidance and learning given is completely extempore and in depth. A topic is covered till even a single person is able to answer almost everything about it with confidence. So I like the way a topic is chased and learned to everyone with exposure to real time industry scenarios.

(Redington gulf)

Deepak Mishra
naveen.jpg

T

roika is certainly a tremendous approach to master the information security aspects and technologies. It helped upgrading my signature from technical support to It security Specialist and ensures more upgrades in near future.

amit1.jpg

I

worked with an MNC for last 3 years in a track which has no growth and career options. So started my Hunt and of course Search engine is the first that we use. Some of my friends recommended to go with IT/Network security as a first Go and suggested me to Join troika. The very first day in Troika gave me a lot of learning, confidence, opportunities, reasons and most important Learning and growth is a priority.
It’s almost 1 year I have completed with troika and still thankful that I did not opt to use Search Engine optimization for a hunt of institutes.

Phone: +91 96540 16484
mobile: +91 958 290 7788
B-71, Shalimar Garden Extn-2, Sahibabad, Ghaziabad, Near Raj Bag Metro Station
IT Monteur
Style switcher RESET
Body styles
Color settings
Link color
Menu color
User color
Background pattern
Background image