
Course Description
Checkpoint is the Firm Which Introduced Stateful Packet Inspection (SPI)
Technology and it's a Pioneer Firm in the Field of Network Security
CCSA Will provide Network Administrator Comprehensive Knowledge of
Deploying , Configuring and Troubleshooting Checkpoint R.80 product
in the Real World
Intensive Training Approach is used by Creating a Complex Dual ISP
Redundant Topology. 30 Lab Developed by our Expert Trainer will be
co
nducted to ensure that You Receive highest Quality of Training
Horizon Computers is Expert in Advance Network Security Modules
CCSA Training is Provided in Vashi, Vile-Parle and Pune Centers
Course Audience:
- Security engineers
- Security administrators
- Security operations specialists
- Security analysts
- Network engineers
- Support staff
"Difficulty Level - Intermediate to Advance"
Course Pre-requisite:
- OSI and TCP/IP Reference model
- Data Encapsulation, Packet Format
- IPv4/IPv6 Addressing Basics
- L3 routing, Static, Dynamic
- L2 Switching, Vlans, Trunk, SVI
- Use of Packet Capture tools
- Access Control List
- NAT Basics
Lab Description:
Lab Scenerio will be Close to Real Deployment with Redundant Dual ISP topology, Multiple Security Segments and Servers with Various applications
CCSA OBJECTIVES:
Check Point technology is designed to address network exploitation, administrative flexibility and critical accessibility. This Section introduces the basic concepts of network security and management based on Check Point’s three-tier structure, and provides the foundation for technologies involved in the Check Point Architecture.
CCSA R.80 is available in Horizon Computers Vashi, Vile Parle, Pune | |||
Sr.No. | Topic | Sub-Topic | Contents |
---|---|---|---|
1 | Introduction to Check Point Architecture | Performance-based |
|
Knowledge-based |
|
||
2 | Security Policy Management | Performance-based |
|
Knowledge-based |
|
||
3 | Check Point Security Solutions | Performance-based |
|
Knowledge-based |
|
||
4 | Traffic Visibility | Performance-based |
|
Knowledge-based |
|
||
5 | Basic Concepts of VPN | Performance-based |
|
Knowledge-based |
|
||
6 | Managing User’s Access | Performance-based |
|
Knowledge-based |
|
||
7 | Working with Cluster XL | Performance-based |
|
Knowledge-based |
|
||
8 | Administrator Task Implementation | Performance-based |
|
Knowledge-based |
|
||
9 | Smart Event Reports | Performance-based |
|
Knowledge-based |
|