Ccsa_31 Dec Course
-
Upload
sachinkoenig -
Category
Documents
-
view
215 -
download
0
Transcript of Ccsa_31 Dec Course
-
8/7/2019 Ccsa_31 Dec Course
1/24
C
CSA
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
1
Check Point Certified Professional ProgramROOMAN is an authorized training centre for offering training on Checkpoint certificationcourses. The Check Point Certified
Professional Program provides students withthe necessary skills to maximize their company's investment in Check Point basednetwork security solutions. This program isstructured around product-focusedcertifications based on comprehensivecourses that offer students hands-onexperience with Check Point products.
-
8/7/2019 Ccsa_31 Dec Course
2/24
C
CSA
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
2
CCSACheck Point Certified Security Administrator
CCSA is a foundation level certification that validates acandidates ability to configure and managefundamental implementations of Check Point'sflagship product, FireWall-1, as an enterprise levelInternet security solution to protect corporatenetworks. As a CCSA, security professionals possessthe requisite skills to define and configure securitypolicies that enable secure access to information
across corporate networks. In addition to theseessential skills, CCSAs also have the ability to monitor network security activity and implement measures toblock intruder access to networks.
-
8/7/2019 Ccsa_31 Dec Course
3/24
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
3
To earn CCSA NG with Application Intelligencecertification, candidates must pass :
Ex am #156-210.4 : Check Point NG with ApplicationIntelligence - Management I1
-
8/7/2019 Ccsa_31 Dec Course
4/24
CCSA
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
4
SYSTEM ADMINISTRATORSSECURITY MANAGERS
NETWORK ENGINEERSANDINDIVIDUAL SEEKING CCSA
CERTIFICATION
Audience
-
8/7/2019 Ccsa_31 Dec Course
5/24
CCSA
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
5
WORKING KNOWL ED GE OFWindows NT/2000/2003
Or Any Flavor Of Unix
WithExpertise In TCP/IP & Routing
Prerequisites
-
8/7/2019 Ccsa_31 Dec Course
6/24
CCSA
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
6
Part Time : 12 DAYS (2 hrs/day)Full Time : 2 DAYS (8 hrs/day)
D uration of the course
-
8/7/2019 Ccsa_31 Dec Course
7/24
CCSA
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
7
As a CCSA, security professionals possessthe requisite skills to define and configuresecurity policies that enable secure access toinformation across corporate networks.
Key Benefits
-
8/7/2019 Ccsa_31 Dec Course
8/24
CCSA
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
8
Check Point Certified Professional Program
Ex am 156-210.4 : Check Point NG with Application Intelligence -Management I
Check Point NG with Application Intelligence -
Management I (156-210.4) covers the followingexam objectives :
1. Describe the purpose of a firewall2. Describe and compare firewall architecture3. Identify the different components of VPN-1/FireWall-1 NG
4. Explain the function and operation of a Security Policy5. Demonstrate the creation of network objects and groupsusing the SMARTClient
6. Demonstrate the setup of anti-spoofing on the firewall
Course contents
-
8/7/2019 Ccsa_31 Dec Course
9/24
CCSA
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
9
7. Demonstrate the setup and operation of an activeSecurity Policy
8. Demonstrate how to hide and unhide rules, viewhidden rules, define a rule mask and apply a rulemask
9. Show how to install and uninstall a SecurityPolicy
10.List the guidelines for improving VPN-1/FireWall-1 NG performance using a Security Policy
-
8/7/2019 Ccsa_31 Dec Course
10/24
CCSA
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
10
11.Identify the three display modes of the SmartViewTracker
12.Identify and define SmartView Status Icons13.Specify selection criteria and save log files14.Describe the steps needed to block an intruder 15.List three blocking scope options and their uses
-
8/7/2019 Ccsa_31 Dec Course
11/24
CCSA
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
11
16.Describe how block request is used
17.Understand Application Intelligence technologies18.Understand active-defense technologies19.Configure VPN-1/FireWall-1 NG to block common
categories of attacks20.Enable SmartDefense global protection
mechanisms
Course contents
-
8/7/2019 Ccsa_31 Dec Course
12/24
CCSA
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
12
21.Monitor the Security Policy with the SmartViewStatus
22.Demonstrate how to implement authentication23.Demonstrate the process for creating users and
groups24.Demonstrate the setup of authentication
parameters25.Demonstrate how to implement User
Authentication using various authenticationschemes
Course contents
-
8/7/2019 Ccsa_31 Dec Course
13/24
CCSA
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
13
26.List types of services supported by VPN-1/FireWall-1 NG requiring username and
password27.Demonstrate how to implement Client Authentication
28.Demonstrate how to implement Session Authentication
29.List the reasons and methods for Network Address Translation
Course contents
-
8/7/2019 Ccsa_31 Dec Course
14/24
CCSA
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
14
30.Demonstrate how to set up Static NAT31.Demonstrate how to set up Hide NAT32.Describe basic network configurations using NAT33.Describe the process of protecting your protected
network with backups
Course contents
-
8/7/2019 Ccsa_31 Dec Course
15/24
CCSA
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
15
34.Install and upgrade the VPN-1/FireWall-1 NGsoftware
35.Describe the process of licensing VPN-1/FireWall-1 NG
36.Describe how VPN-1/FireWall-1 NG licensingworks
Course contents
-
8/7/2019 Ccsa_31 Dec Course
16/24
CCSA
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
16
Introduction to Security1. Need for Security in a Information System2. Role of a Firewall in a Network
3. Types of a Firewall Technologies4. Check Point standard in Security
MODU LE 1
-
8/7/2019 Ccsa_31 Dec Course
17/24
CCSA
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
17
Check Point VPN-1/Firewall-11. How VPN-1/Firewall works2. VPN-1/Firewall-1 Architecture3. Components of VPN-1/Firewall-14. Distributed deployments
MODU LE 2
-
8/7/2019 Ccsa_31 Dec Course
18/24
CCSA
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
18
Working with the security policies1. Understanding security policies2. Using Smartdashboard3. Access control for administrators4. Creating rule base5. Implicit and Explicit Rules6. Security policy command line options7. Enabling and disabling a rule8. Uninstalling a security policy9. Inproving VPN-1/Firewall performance
MODU LE 3
-
8/7/2019 Ccsa_31 Dec Course
19/24
CCSA
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
19
Working with SmartViewUnderstanding the log architectureUsing SmartView tracker Filtering options inSmartView Tracker Blocking Intruder ConnectionsUsing SmartView StatusChecking the status of VPN-1/Firewall-1
MODU LE 4
-
8/7/2019 Ccsa_31 Dec Course
20/24
CCSA
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
20
Smart D efene1. Checkpoint Application Intelligence2. Understanding active-defence technologies3. Components and capabilities of
SmartDefence4. Configuring SmartDefence with Application
Intelligence
5. SmartDefence Storm Centre
MODU LE 5
-
8/7/2019 Ccsa_31 Dec Course
21/24
CCSA
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
21
Authentication1. User authentication and authentication
parameters2. Understanding the need for authentication
3. Deploying user authentication4. Stealth authentication5. Client and session authentication6. Sign on methods7. Deploying client authentication8. Additional features of single sign on and client
authentication9. Deploying session authentication
MODU LE 6
-
8/7/2019 Ccsa_31 Dec Course
22/24
CCSA
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
22
Network Address Translation1. Undestanding NAT2. Types of NAT3. Configuring dynamic and static NAT rules4. Packet Flow and NAT5. Troubleshooting and consideration for NAT
configuration
MODU LE 7
-
8/7/2019 Ccsa_31 Dec Course
23/24
CCSA
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
23
VPN-1/Firewall Backup and U pgrades1. Process of protecting and protected
network with backups2. Install and upgrade the VPN-1/Firewall
NG software3. Process of Licensing VPN-1/Firewall NG4. Understanding how VPN-1/Firewall NG
licensing works
MODU LE 8
-
8/7/2019 Ccsa_31 Dec Course
24/24
CCSA
Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
24
THANKS YOU