# # # #

Service Center

Grievance

Check Point Training NGX Security Administrator Course    

Check Point training and certification gives you the critical knowledge and skills you need to maximize security and ROI from Check Point solutions.

Training  Course Includes
 Full Multi Media Lessons
 Printable Transcripts of all Lessons
 Lab Exercises
 Review Questions to test one's understanding of the Material

Check Point NGX Training Course Covers

  • The components and operation of the Check Point NGX three-tiered architecture, to recognize how it is used to secure a network, and to perform stand-alone and distributed installations.
  • Basic security policy components and their functions, rule types and rule bases, and use SmartDashboard to create a basic security policy.
  • Secure a network using Network Address Translation and use SmartView Monitor, SmartView Tracker, and Eventia Reporter to monitor traffic, block attacks, and generate traffic audit reports.
  • Attack types and defend a network using SmartDefense, and use content security and URL screening to protect a network from potential attacks.
  • Configure authentication schemes, integrate LDAP with Check Point NGX and SmartDirectory with Microsoft Active Directory.
  • Vow VPNs are deployed, configure a VPN between networks, and back up and restore Check Point NGX.

Target Audience
Systems administrators, Security Managers, Network Engineers, people who want to obtain knowledge of Check Point's NGX Security

Prerequisites
Basic networking knowledge, knowledge of Windows Server and/or UNIX, experience with TCP/IP and the Internet

Course Content for Security Administrator
Check Point NGX Architecture, Operation, and Installation

  • identify the Check Point NGX component to use in a given scenario.
  • recognize how the INSPECT engine operates in a given scenario.
  • determine how Check Point NGX is used to secure a network in a given scenario.
  • install Check Point VPN-1/Firewall-1 NGX on a Windows 2000 computer in a given scenario.
  • install Check Point VPN-1/Firewall-1 NG in a standalone environment, given a scenario. recognize how Check
  • Point VPN-1/Firewall-1 NGX operates in a distributed environment.

 Security Policies

  • identify how a Check Point NGX security policy is determined and verify ICA configuration in a given scenario.
  • create and view basic objects using SmartDashboard and SmartMap in a given scenario.
  • configure antispoofing and multicasting in Check Point NGX, given a scenario.
  • configure basic objects, antispoofing, and multicasting in Check Point NGX, given a scenario.
  • identify rule types and the Rule Base structures within Firewall-1/VPN-1, given a scenario.
  • define basic rules and a Rule Base in a given scenario.
  • create the Rule Base of a security policy in a given scenario.

Network Address Translation and Traffic Monitoring

  • determine the NAT type and its configuration type in a given scenario.
  • configure and test automatic hide NAT mode in a given scenario.
  • configure and test automatic static network address translation (NAT) mode in a given scenario.
  • configure different types of NAT in a Check Point NGX environment, given a scenario.
  • use SmartView Monitor to block an attack and monitor security policy status in a given scenario.
  • use Eventia Reporter to generate a traffic audit report in a given scenario.
  • use traffic monitoring, tracking, and reporting tools in a given scenario.
  • determine network security using NAT and Check Point NGX's traffic monitoring and tracking tools, given a scenario.

SmartDefense and Content Security

  • identify the SmartDefense feature to use against an attack in a given scenario.
  • configure SmartDefense to defend a network against an attack in a given scenario.
  • use SmartDefense to secure a network in a given scenario.
  • recognize how content security operates in a Check Point NGX environment, given a scenario.
  • implement content security in a given scenario.
  • configure URL screening in a given scenario.
  • use content security and URL screening in a given scenario.
  • determine network security using SmartDefense and content security in a given scenario.

Authentication and LDAP User Management

  • identify the appropriate authentication scheme to use in a given scenario.
  • configure users and user authentication in a given scenario.
  • configure client authentication in a given scenario.
  • configure user and client authentication in a given scenario.
  • recognize how LDAP is integrated with Check Point NGX in a given scenario.
  • configure Check Point NGX SmartDirectory with Microsoft Active Directory in a given scenario.
  • integrate LDAP with Check Point NGX and SmartDirectory with Microsoft Active Directory in a given scenario.
  • determine authentication and LDAP user management for a network, given a scenario.

VPN Configuration and Disaster Recovery

  • identify how a VPN should be deployed in a given scenario.
  • create a VPN between two networks using IKE shared secrets in a given scenario.
  • create a VPN between two networks using certificate encryption in a given scenario.
  • configure two-gateway encryption in a Check Point environment, given a scenario.
  • back up and restore Check Point NGX in a given scenario.
  • configure a backup and restore in a CheckPoint NGX environment, given a scenario.
  • determine VPN and disaster recovery for a network, given a scenario.