Nothing Special   »   [go: up one dir, main page]

Check Point Cyber Security Engineering (Ccse) : Course Topics Course Objectives

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

CHECK POINT CYBER SECURITY ENGINEERING (CCSE)

(Supported Versions: R80.10 and above)

WHO SHOULD ATTEND?


Expert users and resellers who need to perform advanced deployment configurations of Check Point Software Blades.
COURSE GOAL:
Validate your understanding and skills necessary to configure and optimally manage Check Point Next Generation Firewalls.
PREREQUISITES:
 CCSA training/certification
 Working knowledge of Windows, UNIX, networking, TCP/IP, and the Internet.

COURSE TOPICS COURSE OBJECTIVES


 System Management  Identify advanced CLI commands.
 Automation and Orchestration  Understand system management procedures, including
 Redundancy how to perform system upgrades and apply patches
and hotfixes.
 Acceleration
 Describe the Check Point Firewall infrastructure.
 SmartEvent
 Describe advanced methods of gathering important
 Mobile and Remote Access
gateway data using CPView and CPInfo.
 Threat Prevention
 Recognize how Check Point’s flexible API architecture
supports automation and orchestration.
LAB EXERCISES  Discuss advanced ClusterXL functions.
 Upgrading a Security Management Server to R80.10  Describe VRRP network redundancy advantages.
 Applying Check Point Hotfixes  Undersand how SecureXL acceleration technology is
 Configuring a New Security Gateway Cluster used to enhance and improve performance.
 Core CLI Elements of Firewall Administration  Understand how CoreXL acceleration technology is
used to enhance and improve performance.
 Configuring Manual Network Address Translation
 Identify the SmartEvent components that store network
 Managing Objects Using the Check Point API
activity logs and identify events.
 Enabling Check Point VRRP
 Discuss the SmartEvent process that determines which
 Deploying a Secondary Security Management Server network activities may lead to security issues.
 Viewing the Chain Modules  Understand how SmartEvent can assist in detecting,
 Working with SecureXL remediating, and preventing security threats.
 Working with CoreXL  Discuss the Mobile Access Software Blace and how it
 Evaluating Threats with SmartEvent secures communication and data.
 Managing Mobile Access  Understand Mobile Access deployment options.
 Understanding IPS Protections  Recognize Check Point Remote Access solutions.
 Deploying IPS Geo Protection  Discuss Check Point Capsule components and how
they protect mobile devices and business documents.
 Reviewing Threat Prevention Settings and Protections
 Discuss diferent Check Point Solutions for attacks such
 Deploying Threat Emulation and Threat Extraction
as zero-day and Advanced Persistent Threats.
 Understand how SandBlast, Threat Emulation, and

CCSE
Threat Extraction prevent security incidents.
CERTIFICATION
 Identify how Check Point Mobile Threat Prevention can
INFORMATION
help protect data accessed on company-issued
Prepare for exam #156-315.80 at VUE.com/checkpoint smartphones and tablets.

©2019 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content
November 15, 2019

You might also like