Check Point Software - Check Point Certified Security Expert R80.20 (CCSE)


E-Learning
Description
The growing frequency and sophistication of security threats makes protecting your organization more difficult every year. Check Point’s integrated products provide end-to-end security from the enterprise to the cloud to your mobile worker’s personal devices. They prevent and mitigate cyberattacks and limit the data theft that often results from these threats.
The growing frequency and sophistication of security threats makes protecting your organization more difficult every year. Check Point’s integrated products provide end-to-end security from the enterprise to the cloud to your mobile worker’s personal devices. They prevent and mitigate cyberattacks and limit the data theft that often results from these threats.
Upon completion of this course, students will be able to:
Deploy gateways using the Gaia web interface
Configure a Security Policy
Learn about managing and monitoring a secure network
Upgrade and configure a Security Gateway to implement a virtual private network for both internal and external, remote users
Security Engineers
Network Engineers
| Lesson Id | Title | Description |
|---|---|---|
| 1 | Introduction to Check Point Technology | |
| 2 | Deployment Platforms | |
| 3 | Introduction to the Security Policy | |
| 4 | Monitoring Traffic & Connections | |
| 5 | Network Address Translation | |
| 6 | Using SmartUpdate | |
| 7 | User Management & Authentication | |
| 8 | Identity Awareness | |
| 9 | Introduction to Check Point VPNs | |
| 10 | SmartLog |
Self-Paced
Free
This course includes: :
Full lifetime access