CHECK POINT

In recent years, electronic devices and handheld applications have become an indispensible part of daily life, backed by the rapid development of internet technologies. At the same time, the widespread adoption of these technologies has led to incidents involving unauthorised access or leakage of sensitive information and private data. This has raised public awareness of the importance of information security.

NetG India plays a vital role in providing professional training in the fields of computer networking and information security. Our programmes are designed for professionals in the IT industry seeking professional training in networking and security, and covers theory as well as practical hands-on training. Industry-standard equipment and software simulators are provided in practical laboratory sessions to enhance the learning experience.


Course Outline


Fundamentals of Packet flow with and without Firewall OSI/TCP Model (specifically-Application, Presentation, Session and Transport Layers) Concept of Networking Model and Services Model of Network Concept of Firewalling Services Need of DMZ Network Design with Firewall


Firewall Deployment considerations

  • Device level Vs Interface level Deployments
  • L3 Vs L2 deployments
  • Standalone and Distributed Architecture
  • Firewall Gateway
  • Firewall Manager
  • Smart Console
  • Gia Administration
  • Different Types of Software blades
  • Managing Software blades

Managing Objects

  • Object Categories
  •      1. Network Objects
  •      2. Services
  •      3. Custom Applications/Sites
  •      4. VPN Communities
  •      5. Users
  •      6. Data Types
  •      7. Servers
  •      8. Time Object
  •      9. UserCheck Interactions
  •      10. Limits
  • Adding, Editing, Cloning, Deleting, and Replacing Objects
  • Object Tags
  • Network Object Types

Network Address Translation Concepts

  • Concept of Socket
  • Automatic NAT
  •      1. Hide NAT
  •      2. Hide NAT and Port Translation
  •      3. Static NAT
  • Manual NAT
  •      1. Manual Static NAT
  •      2. Manual Port address Translation
  • NAT and Anti-Spoofing
  • Automatic and Proxy ARP
  • NAT Priorities

Introducing the Unified Access Control Policy

  • Creating a Basic Access Control Policy
  • Creating Application Control and URL Filtering Rules
  • Ordered Layers and Inline Layers
  • The Columns of the Access Control Rule Base
  • Unified Rule Base Use Cases
  • Rule Matching in the Access Control Policy
  • Best Practices for Access Control Rules
  • Installing the Access Control Policy
  • Analyzing the Rule Base Hit Count
  • Preventing IP Spoofing

Threat Prevention Policy

  • Threat Prevention Components
  • Assigning Administrators for Threat Prevention
  • Analyzing Threats
  • Out-of-the-Box Protection from Threats
  • The Threat Prevention Policy
  • Creating Threat Prevention Rules
  • The Check Point ThreatCloud
  • Threat Prevention Scheduled Updates
  • Data loss prevention Policy

Profiles

  • Activation settings (prevent, detect, or inactive)
  • IPS Settings
  • Anti-Bot Settings
  • Anti-Virus Settings
  • Threat Emulation Settings
  • Threat Extraction Settings
  • Indicator configuration
  • Malware DNS Trap configuration
  • Links inside mail configuration

User Management

  • Users
  • Roles
  • Password Policy
  • Authentication Servers-AD/Radius/Tacacs+ Servers
  • System Groups
  • GUI Clients

High Availability

  • HA Concepts
  • Set Up Active/Passive HA
  • Set Up Active/Active HA

Cryptography

  • Symmetric Cryptography
  •      1. Stream based
  •      2. Block based
  • Asymmetric Cryptography
  • Public Key Infrastructure
  • Root CA and more
  • Data Encryption Services
  • Data Integrity
  • Authentication Methods

Tunnels

  •      1. Concepts
  •      2. Types
  • Site-Site VPN
  • Remote-Access VPN
  •      1. Client Based
  •      2. Clientless
  • IPsec Framework
  •      1. Data Plane – ESP and AH
  •      2. Control Plane – Phase 1 and Phase 2
  • SSL/TLS/DTLS
  •      1. Data Plane -Packet flow
  •      2. Control Plane – Handshaking

img

teachers

2000

img

studests

3000

img

Graduates

1500

img

countries

1000

our gallery

#

 

Sign Up for Newsletter

If you sign up for newsletter you’ll not fail to get our update.

Follow Us: