156-215.80: Check Point Security Administrator Professional

abdulrhmansayed


What
You’ll Learn
  • “Introduction to Check Point Security Architecture Understanding Check Points Security Management and Gateway products”
  • nstalling and Configuring Security Gateway Installation and configuration of the Security Gateway appliance or software
  • Security Policies and Rulebase Management Creating and managing firewall rules
  • objects
  • and policies
  • VPN (Virtual Private Network) Configuring Site-to-Site VPN and Remote Access VPN

Requirements

  • Basic understanding of networking concepts such as TCP/IP
  • DNS
  • NAT
  • VPNs
  • and firewall operations.
  • Familiarity with general security principles like access control
  • encryption
  • and intrusion detection systems (IDS).
  • Prior knowledge of networking fundamentals (preferably CCNA or equivalent certification) is recommended.

Description

The 156-215.80: Check Point Security Administrator course is designed to provide IT professionals with the knowledge and skills necessary to configure and manage Check Point security products, focusing on the principles of configuring and managing Check Point Next-Generation Firewalls, VPNs, and security gateways. The course prepares candidates for the Check Point Security Administrator R80 certification, which validates the essential skills needed for configuring and managing Check Point solutions in a network environment.

Check Point is a global leader in cybersecurity, providing integrated security architecture for network, endpoint, cloud, mobile, and data center environments. This course focuses on the Check Point R80 Security Management Architecture, enabling organizations to secure their networks and infrastructure from cyber threats effectively. It covers essential concepts such as firewall configuration, VPN setup, user authentication, and monitoring security events.

Key Learning Outcomes:

Upon completing the 156-215.80: Check Point Security Administrator course, participants will be able to:

  • Understand Check Point Security Architecture: Gain a comprehensive understanding of Check Point’s security management platform, including how to configure, manage, and optimize the security of enterprise networks.

  • Configure and Manage Security Policies: Learn how to implement firewall policies, NAT (Network Address Translation), and access control rules. This includes setting up and managing security policies based on organizational needs.

  • VPN Configuration and Management: Learn how to configure secure VPN connections, including remote access and site-to-site VPNs, to ensure secure communications across remote offices, branch networks, or cloud infrastructures.

  • Monitoring and Managing Logs: Learn to use the Check Point SmartView tool to monitor network traffic, review logs, generate reports, and troubleshoot security issues to prevent potential security breaches.

  • Security Policy Best Practices: Understand security policy best practices, including how to create granular policies based on users, applications, and devices while maintaining high performance and security.

  • Security Gateway Configuration: Learn how to configure Check Point Security Gateways to filter network traffic, establish secure VPN tunnels, and enforce security policies efficiently.

  • Security Management with SmartCenter: Use the Check Point SmartCenter Management platform to manage firewalls, VPNs, and security appliances across your network.

  • Troubleshooting and Diagnosing Issues: Gain hands-on experience in troubleshooting issues, including connectivity problems, VPN errors, and security policy misconfigurations, using Check Point’s command-line tools and SmartView.

  • Optimize Network Security: Learn how to optimize network security performance by configuring intrusion prevention, anti-bot protections, and application control features to prevent security threats.

  • Understanding Threat Prevention Features: Learn about Check Point’s threat prevention features such as IPS (Intrusion Prevention System), URL filtering, Anti-Virus, and Anti-Bot to prevent security breaches from external and internal threats.

Course Outline:

  1. Introduction to Check Point Security

    • Overview of Check Point products and solutions

    • The Security Management Architecture

    • Check Point R80 Security Gateways and Security Management Server

  2. Configuring and Managing Security Policies

    • Understanding the Policy Layers and Rules

    • Configuring and implementing basic firewall rules

    • Network Address Translation (NAT) and VPN rules

  3. VPN Configuration and Management

    • Site-to-site VPN

    • Remote Access VPN (Mobile Access VPN)

    • VPN troubleshooting and diagnostic tools

  4. Monitoring and Logging

    • Understanding Check Point SmartView

    • Configuring logging and monitoring events

    • Troubleshooting issues using logs and reports

  5. Check Point Security Gateways

    • Configuration and management of security gateways

    • Implementing high availability and clustering

    • Load balancing and redundancy configurations

  6. User Authentication and Identity Awareness

    • Configuring user authentication methods (RADIUS, LDAP, etc.)

    • Understanding Identity Awareness and User Groups

    • Secure authentication mechanisms for remote users

  7. Advanced Threat Prevention and Security Features

    • Implementing Intrusion Prevention System (IPS)

    • Configuring Anti-Bot and Anti-Virus protections

    • URL Filtering and Application Control

  8. Performance Optimization

    • Fine-tuning firewall performance and security policy configurations

    • Preventing security breaches and reducing false positives

  9. Troubleshooting and Diagnostics

    • Identifying and resolving common network issues

    • Diagnosing VPN connectivity problems

    • Using Check Point’s troubleshooting tools and commands

  10. Preparing for Certification

  • Review of all course topics and knowledge areas

  • Tips and best practices for the 156-215.80 certification exam

  • Practice exam questions and review

Who this course is for:

  • Security administrators
  • Network engineers
  • Systems engineers

Get on Udemy

Share This Article
Leave a comment