Security Administrator & Engineering Bundle R80
-
Administrar redes seguras se debe aprender con profesionales como los profesores de este curso.
← | →
Capacitación laboral
En Miguel Hidalgo
*Precio estimado
Importe original en USD:
$ 5,092
¿Necesitas un coach de formación?
Te ayudará a comparar y elegir el mejor curso para ti y a financiarlo en cómodas cuotas mensuales.
Aprende a administrar y monitorear una red segura
-
Tipología
Capacitación laboral
-
Nivel
Nivel avanzado
-
Lugar
Miguel hidalgo
-
Horas lectivas
45h
-
Duración
5 Días
-
Inicio
Fechas disponibles
Five days course covers everything you need to start up, configure and manage daily operationd of Check Point Security and Management Software Blades Systems on the GAIA operating system.
Sedes y fechas disponibles
Ubicación
Inicio
Inicio
Acerca de este curso
Los participantes aprenderán a instalar y configurar un Security Gateway, conocerán las Politicas de Seguridad y podrán administrar y monitorear una red segura.
Conceptos avanzados del Firewall, Conceptos Avanzados de Alta Disponibilidad, Conceptos Avanzados de Reporte y Auditoria.
A personas que administran los productos de Check Point, Administradores de Sistemas, Administradores de Seguridad, quienes se preparan para las certificaciones CCSA y CCSE.
•Basic knowledge of networking
•Windows Server and/or UNIX skills
•Internet and TCP/IP experience
Al terminar el curso se les proporciona un diploma con valor curricular.
Somos el único centro autorizado en México para impartir los cursos. Al tomar el curso entenderán los conceptos de alta disponibilidad, conceptos de reporte y auditoria, conceptos avanzados de migración y respaldos.
Se enviará la información por correo y se les llamará para confirmar que hayan recibido la información, es muy importante que proporcionen un número telefónico celular o fijo, esto es para darle seguimiento a la solicitud
Opiniones
-
Administrar redes seguras se debe aprender con profesionales como los profesores de este curso.
← | →
Valoración del curso
Lo recomiendan
Valoración del Centro
Juan Hernández
Materias
- Backup your Security Gateway and Management Server
- •Upgrade and troubleshoot a Management Server
- Gateways
- Firewall
- Seguridad de redes
- Seguridad informática
- Check Point
- Clustering
- Informática
- Informática avanzada
- Ingeniería informática
- Unix
- Windows
Profesores
Hector Solis
Gerente de TI
Programa académico
COURSE TOPICS
▪ Course Layout
▪ Prerequisites
▪ Certification Title
▪ Course Chapters and Learning Objectives
▪ Sample Setup for Labs
Introduction to Check Point Technology
▪ Concept of a Firewall
Open Systems Interconnect Model
Transmission Control Protocol/ Internet Protocol Model
▪ Controlling Network Traffic
Packet Filtering
Stateful Inspection
Application Layer Firewall
▪ Network Communication
Secure Internal Communication
▪ The Check Point Security Management Architecture
SmartConsole
Security Management Server
Security Gateway
▪ The SmartConsole
Gateways & Servers View
Security Policies View
Logs & Monitor View
Manage & Setting View
▪ SmartConsole Applications
SmartEvent (Advanced Events and Reports)
SmartView Monitor ( Tunel & User Monitoring)
SmartUpdate
SmartDashboard
▪ Deployment Platforms
Check Point Appliances
Open Servers
▪ Deployment Considerations
Standalone
Distributed
Bridge Mode
▪ Introduction to the Gaia Operating System
Command Line Interface
WebUI
Users
Updates
Security Policy Management
▪ Introduction to the Security Policy
Rules
Objects
Anti- Spoofing
The Rule Base
Global Properties
Sections
Publish Policy
▪ Policy Packages
Policy Types
Unified Policies
Shared Policies
Additional Policy Management Tools
▪ Install Policy
Install Policy Package
▪ Network Address Translation
Hide NAT
Static NAT
▪ Administration
Permission Profiles
Sessions
Data Revisions
Concurrent Administration
▪ Managing Remote Gateways
▪ Backups
Performing Backups
Policy Layers
▪ Policy Layer Concept
Policy Layers
Access Control Policy Layers
Threat Prevention Policy Layers
Layers and Policy Packages Example
Best Practices
▪ Managing the Application Control Policy Layer
Application Control Software Blade
URL Filtering Software Blade
Creating an Application Control and URL Filtering Policy
▪ Review Questions
Check Point Security Solutions and Licensing
Check Point Software Blade Architecture
Security Gateway Software Blades
Advanced Threat Prevention Software Blades
Management Software Blades for Policy Management
Management Software Blades for Monitoring Analysis
Management Software Blades for Operations and Workflow
Endpoint Software Blades
Software Blade Packages
▪ Licensing Overview
Components of a Licenses
Perpetual versus Subscription Blades
Central and Local Licenses
License Activation
Hardware Licenses
▪ SmartUpdate
SmartUpdate Architecture
Using SmartUpdate
Package Repository
▪ Managing Licenses
Add and Install Licenses
Attaching and Detaching Licenses
New Licenses
View Licenses Properties
Export a License
License Status
Service Contracts
▪ License Reports
Traffic Visibility
▪ Analyzing Logs
Collecting Information
Deploy Logging
Configure Logging
SmartConsole Logs View
Tracking Rules
Examining Logs
Predefined Logs Queries
Query Language Overview
▪ Monitoring Traffic and Conections
SmartView Monitor and SmartConsole
Monitoring and Handling Alerts
Monitoring Suspicious Activity Rules
Monitoring Gateway Status
Users View
System Counters View
Tunnels View
Cooperative Enforcement View
Traffic View
Basic Concepts of VPN
▪ Introduction to VPN
IPSec VPN
VPN Components
▪ VPN Deployments
SITE-TO-Site VPN Deployments
N Communities
Meshed VPN Community
Star VPN Community
Combination VPN Communities
Remote Access VPN Community Object
▪ Access Control for VPN Connections
Allow All Connections
Allow All Site-to-Site VPN Connections
Allow Specific VPN Communities
Site-to-Site Communities- Allow All Encrypted Traffic
▪ Tunnel Management and Monitoring
Permanent VPN Tunnels
Tunnel Testing
Monitoring VPN Tunnels
Managing User Access
▪ Overview of User Management Components
User Directory
Identity Awareness
▪ Managing Users
SmartConsole and User Database
LDAP and User Directory
▪ Authenticating Users
Authentication Schemes
▪ Managing User Access
Access Roles
Rule Bse
Captive Portal for Guest Access
Working with Cluster XL
▪ Overview of Cluster XL
▪ ClusterXL Deployments
High Availability Deployment
▪ Failovers
Performing a Manual Failover
▪ Synchronizing Cluster Connections
Securing the Sync Interface
Clock Synchronization
▪ Monitoring a Cluster
SmartView Monitor
Administrator Task Implementation
▪ Compliance Software Blade
Best Practices
Continuous Compliance Monitoring
▪ CPView
User Interface
▪ Appendix
¿Necesitas un coach de formación?
Te ayudará a comparar y elegir el mejor curso para ti y a financiarlo en cómodas cuotas mensuales.
Security Administrator & Engineering Bundle R80
*Precio estimado
Importe original en USD:
$ 5,092