Course Includes:
- Price: FREE
- Enrolled: 91 students
- Language: English
- Certificate: Yes
The 156-215.80: Check Point Security Administrator course is designed to provide IT professionals with the knowledge and skills necessary to configure and manage Check Point security products, focusing on the principles of configuring and managing Check Point Next-Generation Firewalls, VPNs, and security gateways. The course prepares candidates for the Check Point Security Administrator R80 certification, which validates the essential skills needed for configuring and managing Check Point solutions in a network environment.
Check Point is a global leader in cybersecurity, providing integrated security architecture for network, endpoint, cloud, mobile, and data center environments. This course focuses on the Check Point R80 Security Management Architecture, enabling organizations to secure their networks and infrastructure from cyber threats effectively. It covers essential concepts such as firewall configuration, VPN setup, user authentication, and monitoring security events.
Key Learning Outcomes:
Upon completing the 156-215.80: Check Point Security Administrator course, participants will be able to:
Understand Check Point Security Architecture: Gain a comprehensive understanding of Check Point’s security management platform, including how to configure, manage, and optimize the security of enterprise networks.
Configure and Manage Security Policies: Learn how to implement firewall policies, NAT (Network Address Translation), and access control rules. This includes setting up and managing security policies based on organizational needs.
VPN Configuration and Management: Learn how to configure secure VPN connections, including remote access and site-to-site VPNs, to ensure secure communications across remote offices, branch networks, or cloud infrastructures.
Monitoring and Managing Logs: Learn to use the Check Point SmartView tool to monitor network traffic, review logs, generate reports, and troubleshoot security issues to prevent potential security breaches.
Security Policy Best Practices: Understand security policy best practices, including how to create granular policies based on users, applications, and devices while maintaining high performance and security.
Security Gateway Configuration: Learn how to configure Check Point Security Gateways to filter network traffic, establish secure VPN tunnels, and enforce security policies efficiently.
Security Management with SmartCenter: Use the Check Point SmartCenter Management platform to manage firewalls, VPNs, and security appliances across your network.
Troubleshooting and Diagnosing Issues: Gain hands-on experience in troubleshooting issues, including connectivity problems, VPN errors, and security policy misconfigurations, using Check Point’s command-line tools and SmartView.
Optimize Network Security: Learn how to optimize network security performance by configuring intrusion prevention, anti-bot protections, and application control features to prevent security threats.
Understanding Threat Prevention Features: Learn about Check Point’s threat prevention features such as IPS (Intrusion Prevention System), URL filtering, Anti-Virus, and Anti-Bot to prevent security breaches from external and internal threats.
Course Outline:
Introduction to Check Point Security
Overview of Check Point products and solutions
The Security Management Architecture
Check Point R80 Security Gateways and Security Management Server
Configuring and Managing Security Policies
Understanding the Policy Layers and Rules
Configuring and implementing basic firewall rules
Network Address Translation (NAT) and VPN rules
VPN Configuration and Management
Site-to-site VPN
Remote Access VPN (Mobile Access VPN)
VPN troubleshooting and diagnostic tools
Monitoring and Logging
Understanding Check Point SmartView
Configuring logging and monitoring events
Troubleshooting issues using logs and reports
Check Point Security Gateways
Configuration and management of security gateways
Implementing high availability and clustering
Load balancing and redundancy configurations
User Authentication and Identity Awareness
Configuring user authentication methods (RADIUS, LDAP, etc.)
Understanding Identity Awareness and User Groups
Secure authentication mechanisms for remote users
Advanced Threat Prevention and Security Features
Implementing Intrusion Prevention System (IPS)
Configuring Anti-Bot and Anti-Virus protections
URL Filtering and Application Control
Performance Optimization
Fine-tuning firewall performance and security policy configurations
Preventing security breaches and reducing false positives
Troubleshooting and Diagnostics
Identifying and resolving common network issues
Diagnosing VPN connectivity problems
Using Check Point’s troubleshooting tools and commands
Preparing for Certification
Review of all course topics and knowledge areas
Tips and best practices for the 156-215.80 certification exam
Practice exam questions and review