Ccsa_31 Dec Course

download Ccsa_31 Dec Course

of 24

Transcript of Ccsa_31 Dec Course

  • 8/7/2019 Ccsa_31 Dec Course

    1/24

    C

    CSA

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    1

    Check Point Certified Professional ProgramROOMAN is an authorized training centre for offering training on Checkpoint certificationcourses. The Check Point Certified

    Professional Program provides students withthe necessary skills to maximize their company's investment in Check Point basednetwork security solutions. This program isstructured around product-focusedcertifications based on comprehensivecourses that offer students hands-onexperience with Check Point products.

  • 8/7/2019 Ccsa_31 Dec Course

    2/24

    C

    CSA

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    2

    CCSACheck Point Certified Security Administrator

    CCSA is a foundation level certification that validates acandidates ability to configure and managefundamental implementations of Check Point'sflagship product, FireWall-1, as an enterprise levelInternet security solution to protect corporatenetworks. As a CCSA, security professionals possessthe requisite skills to define and configure securitypolicies that enable secure access to information

    across corporate networks. In addition to theseessential skills, CCSAs also have the ability to monitor network security activity and implement measures toblock intruder access to networks.

  • 8/7/2019 Ccsa_31 Dec Course

    3/24

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    3

    To earn CCSA NG with Application Intelligencecertification, candidates must pass :

    Ex am #156-210.4 : Check Point NG with ApplicationIntelligence - Management I1

  • 8/7/2019 Ccsa_31 Dec Course

    4/24

    CCSA

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    4

    SYSTEM ADMINISTRATORSSECURITY MANAGERS

    NETWORK ENGINEERSANDINDIVIDUAL SEEKING CCSA

    CERTIFICATION

    Audience

  • 8/7/2019 Ccsa_31 Dec Course

    5/24

    CCSA

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    5

    WORKING KNOWL ED GE OFWindows NT/2000/2003

    Or Any Flavor Of Unix

    WithExpertise In TCP/IP & Routing

    Prerequisites

  • 8/7/2019 Ccsa_31 Dec Course

    6/24

    CCSA

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    6

    Part Time : 12 DAYS (2 hrs/day)Full Time : 2 DAYS (8 hrs/day)

    D uration of the course

  • 8/7/2019 Ccsa_31 Dec Course

    7/24

    CCSA

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    7

    As a CCSA, security professionals possessthe requisite skills to define and configuresecurity policies that enable secure access toinformation across corporate networks.

    Key Benefits

  • 8/7/2019 Ccsa_31 Dec Course

    8/24

    CCSA

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    8

    Check Point Certified Professional Program

    Ex am 156-210.4 : Check Point NG with Application Intelligence -Management I

    Check Point NG with Application Intelligence -

    Management I (156-210.4) covers the followingexam objectives :

    1. Describe the purpose of a firewall2. Describe and compare firewall architecture3. Identify the different components of VPN-1/FireWall-1 NG

    4. Explain the function and operation of a Security Policy5. Demonstrate the creation of network objects and groupsusing the SMARTClient

    6. Demonstrate the setup of anti-spoofing on the firewall

    Course contents

  • 8/7/2019 Ccsa_31 Dec Course

    9/24

    CCSA

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    9

    7. Demonstrate the setup and operation of an activeSecurity Policy

    8. Demonstrate how to hide and unhide rules, viewhidden rules, define a rule mask and apply a rulemask

    9. Show how to install and uninstall a SecurityPolicy

    10.List the guidelines for improving VPN-1/FireWall-1 NG performance using a Security Policy

  • 8/7/2019 Ccsa_31 Dec Course

    10/24

    CCSA

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    10

    11.Identify the three display modes of the SmartViewTracker

    12.Identify and define SmartView Status Icons13.Specify selection criteria and save log files14.Describe the steps needed to block an intruder 15.List three blocking scope options and their uses

  • 8/7/2019 Ccsa_31 Dec Course

    11/24

    CCSA

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    11

    16.Describe how block request is used

    17.Understand Application Intelligence technologies18.Understand active-defense technologies19.Configure VPN-1/FireWall-1 NG to block common

    categories of attacks20.Enable SmartDefense global protection

    mechanisms

    Course contents

  • 8/7/2019 Ccsa_31 Dec Course

    12/24

    CCSA

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    12

    21.Monitor the Security Policy with the SmartViewStatus

    22.Demonstrate how to implement authentication23.Demonstrate the process for creating users and

    groups24.Demonstrate the setup of authentication

    parameters25.Demonstrate how to implement User

    Authentication using various authenticationschemes

    Course contents

  • 8/7/2019 Ccsa_31 Dec Course

    13/24

    CCSA

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    13

    26.List types of services supported by VPN-1/FireWall-1 NG requiring username and

    password27.Demonstrate how to implement Client Authentication

    28.Demonstrate how to implement Session Authentication

    29.List the reasons and methods for Network Address Translation

    Course contents

  • 8/7/2019 Ccsa_31 Dec Course

    14/24

    CCSA

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    14

    30.Demonstrate how to set up Static NAT31.Demonstrate how to set up Hide NAT32.Describe basic network configurations using NAT33.Describe the process of protecting your protected

    network with backups

    Course contents

  • 8/7/2019 Ccsa_31 Dec Course

    15/24

    CCSA

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    15

    34.Install and upgrade the VPN-1/FireWall-1 NGsoftware

    35.Describe the process of licensing VPN-1/FireWall-1 NG

    36.Describe how VPN-1/FireWall-1 NG licensingworks

    Course contents

  • 8/7/2019 Ccsa_31 Dec Course

    16/24

    CCSA

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    16

    Introduction to Security1. Need for Security in a Information System2. Role of a Firewall in a Network

    3. Types of a Firewall Technologies4. Check Point standard in Security

    MODU LE 1

  • 8/7/2019 Ccsa_31 Dec Course

    17/24

    CCSA

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    17

    Check Point VPN-1/Firewall-11. How VPN-1/Firewall works2. VPN-1/Firewall-1 Architecture3. Components of VPN-1/Firewall-14. Distributed deployments

    MODU LE 2

  • 8/7/2019 Ccsa_31 Dec Course

    18/24

    CCSA

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    18

    Working with the security policies1. Understanding security policies2. Using Smartdashboard3. Access control for administrators4. Creating rule base5. Implicit and Explicit Rules6. Security policy command line options7. Enabling and disabling a rule8. Uninstalling a security policy9. Inproving VPN-1/Firewall performance

    MODU LE 3

  • 8/7/2019 Ccsa_31 Dec Course

    19/24

    CCSA

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    19

    Working with SmartViewUnderstanding the log architectureUsing SmartView tracker Filtering options inSmartView Tracker Blocking Intruder ConnectionsUsing SmartView StatusChecking the status of VPN-1/Firewall-1

    MODU LE 4

  • 8/7/2019 Ccsa_31 Dec Course

    20/24

    CCSA

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    20

    Smart D efene1. Checkpoint Application Intelligence2. Understanding active-defence technologies3. Components and capabilities of

    SmartDefence4. Configuring SmartDefence with Application

    Intelligence

    5. SmartDefence Storm Centre

    MODU LE 5

  • 8/7/2019 Ccsa_31 Dec Course

    21/24

    CCSA

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    21

    Authentication1. User authentication and authentication

    parameters2. Understanding the need for authentication

    3. Deploying user authentication4. Stealth authentication5. Client and session authentication6. Sign on methods7. Deploying client authentication8. Additional features of single sign on and client

    authentication9. Deploying session authentication

    MODU LE 6

  • 8/7/2019 Ccsa_31 Dec Course

    22/24

    CCSA

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    22

    Network Address Translation1. Undestanding NAT2. Types of NAT3. Configuring dynamic and static NAT rules4. Packet Flow and NAT5. Troubleshooting and consideration for NAT

    configuration

    MODU LE 7

  • 8/7/2019 Ccsa_31 Dec Course

    23/24

    CCSA

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    23

    VPN-1/Firewall Backup and U pgrades1. Process of protecting and protected

    network with backups2. Install and upgrade the VPN-1/Firewall

    NG software3. Process of Licensing VPN-1/Firewall NG4. Understanding how VPN-1/Firewall NG

    licensing works

    MODU LE 8

  • 8/7/2019 Ccsa_31 Dec Course

    24/24

    CCSA

    Thursday, February 03, 2011 Created By : SACHIN GARGROOMAN INSTITUTE OF TECHNOLOGY,

    LAXMI NAGAR, NEW DELHI

    24

    THANKS YOU