Check Point Certified Security Administrator CCSA NGX

Vocational qualification

Online

£ 997 VAT inc.

Description

  • Type

    Vocational qualification

  • Methodology

    Online

  • Location

    Whyteleafe

  • Duration

    12 Months

The foundation of Check Point certifications, CCSA NGX certification validates a Security Administrator's ability to maintain day-to-day operation of Check Point security solutions and ensure secure access to information across the network. Proficiencies include creating and installing security policies, using logging and reporting features, and managing anti-spoofing, Network Address Translation (NAT), and OPSEC applications. Suitable for: This training would be beneficial for individuals looking for IT job positions such as; Network Security Specialist, Network Security Administrator, Senior Security Technician, Chief Security Officer, Security Technician, Information Security Specialist, Internet Security Specialist, Data Security Specialist, Computer Security Specialist, Security Auditor, or Security Specialist

Facilities

Location

Start date

Whyteleafe (Surrey)
See map
Bourne House, 475 Godstone Road, CR3 0BL

Start date

On request

About this course

IT Professionals with networking knowledge, including TCP/IP, Windows Server and/or UNIX.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Course programme

This Check Point Security Administrator CCSA NGX training course includes all you need to know to gain this in-demand Network Security Certification. You will cover subjects such as Architecture Operation and Installation, Security Policies, Network Address Translation and Traffic Monitoring, SmartDefense and Content Security, Authentication and LDAP User Management, VPN Configuration and Disaster Recovery. These skills will show employers that you can support and maintain Network Security and protect organisations essential IT processes and data. Course Contents: Stage 1: Architecture, Operation and Installation Stage 2: Security Policies Stage 3: Network Address Translation and Traffic Monitoring Stage 4: SmartDefense and Content Security Stage 5: Authentication and LDAP User Management Stage 6: VPN Configuration and Disaster Recovery Course Code: CHEK-1 Course Duration: 12 months Typical Study Hours: 30 - 40 hours Study Prerequisite: IT Professionals with networking knowledge, including TCP/IP, Windows Server and/or UNIX. Additional Information for Stage 1: • Architecture, Operation and Installation o Identify the Check Point NGX component to use in a given scenario o Recognise how the INSPECT engine operates in a given scenario o Determine how Check Point NGX is used to secure a network in a given scenario o Install Check Point VPN-1/Firewall-1 NGX on a Windows 2000 computer in a given scenario o Install Check Point VPN-1/Firewall-1 NG in a standalone environment, given a scenario o Recognise how Check Point VPN-1/Firewall-1 NGX operates in a distributed environment Additional information for Stage 2: • Security Policies o Identify how a Check Point NGX security policy is determined and verify ICA configuration in a given scenario o Create and view basic objects using SmartDashboard and SmartMap in a given scenario o Configure antispoofing and multicasting in Check Point NGX, given a scenario o Configure basic objects, antispoofing, and multicasting in Check Point NGX, given a scenario o Identify rule types and the Rule Base structures within Firewall-1/VPN-1, given a scenario o Define basic rules and a Rule Base in a given scenario o Create the Rule Base of a security policy in a given scenario Additional information for Stage 3: • Network Address Translation and Traffic Monitoring o Determine the NAT type and its configuration type in a given scenario o Configure and test automatic hide NAT mode in a given scenario o Configure and test automatic static network address translation (NAT) mode in a given scenario o Configure different types of NAT in a Check Point NGX environment, given a scenario o Use SmartView Monitor to block an attack and monitor security policy status in a given scenario o Use Eventia Reporter to generate a traffic audit report in a given scenario o Use traffic monitoring, tracking, and reporting tools in a given scenario o Determine network security using NAT and Check Point NGXs traffic monitoring and tracking tools, given a scenario Additional information for Stage 4: • SmartDefense and Content Security o Identify the SmartDefense feature to use against an attack in a given scenario o Configure SmartDefense to defend a network against an attack in a given scenario o Use SmartDefense to secure a network in a given scenario o Recognize how content security operates in a Check Point NGX environment, given a scenario o Implement content security in a given scenario o Configure URL screening in a given scenario o Use content security and URL screening in a given scenario o Determine network security using SmartDefense and content security in a given scenario Additional information for Stage 5: • Authentication and LDAP User Management o Identify the appropriate authentication scheme to use in a given scenario o Configure users and user authentication in a given scenario o Configure client authentication in a given scenario o Configure user and client authentication in a given scenario o Recognise how LDAP is integrated with Check Point NGX in a given scenario o Configure Check Point NGX SmartDirectory with Microsoft Active Directory in a given scenario o Integrate LDAP with Check Point NGX and SmartDirectory with Microsoft Active Directory in a given scenario o Determine authentication and LDAP user management for a network, given a scenario Additional information for Stage 6: • VPN Configuration and Disaster Recovery o Identify how a VPN should be deployed in a given scenario o Create a VPN between two networks using IKE shared secrets in a given scenario o Create a VPN between two networks using certificate encryption in a given scenario o Configure two-gateway encryption in a Check Point environment, given a scenario o Back up and restore Check Point NGX in a given scenario o Configure a backup and restore in a CheckPoint NGX environment, given a scenario o Determine VPN and disaster recovery for a network, given a scenario

Check Point Certified Security Administrator CCSA NGX

£ 997 VAT inc.