Check Point Security Master Training (CCSM)

Check Point Security Master Training (CCSM)

Course Delivery

This Course is available in the following format:

Request this course in a different delivery format

GSA Schedule 70 Saving for Government Customers

Course Overview:

Check Point Security Master Training (CCSM) – Hands-on

Check Point Security Master Training (CCSM) is an advanced technical 3-day course which teaches how to use advanced commands to configure and troubleshoot Check Point Security Systems.

Audience / Target Group:

The target audience for this Check Point Security Master Training (CCSM) course:

• This course is recommended for Systems Administrators, Security Engineers, Network Engineers and CCSEs seeking higher certification. In addition, it is for customers and partners who want to learn the advanced skills to troubleshoot and configure Check Point Security Gateway and Management Software Blades.

Class Prerequisites:

The knowledge and skills that a learner must have before attending this Check Point Security Master Training (CCSM) course are:

• General knowledge of TCP/IP
• Working knowledge of Windows and UNIX
• Working knowledge of network technology
• Working knowledge of the Internet

What You Will Learn:

Upon completing this Check Point Security Master Training (CCSM) course, learners will be able to meet these objectives:

Upon completion of this course, students are able to:

• Identify issues and problems using commands
• Locate the source of encryption failures
• Identify potentially mis-configured VPNs
• Reduce IPS false positives
• Troubleshoot SecureXL and ClusterXL

Check Point Security Master Training (CCSM) – Course Syllabus

Firewall-1 administration and infrastructure review
How policy changes impact chain module behavior
Identify management issues and problems with commands
Use commands to troubleshoot NAT stages
Configure Manual NAT to define specific rules
Use commands to review and clear connections table
Modify files to allow traffic through a specific cluster member
Locate the source of encryption failures using commands
Use commands to verify VPN connectivity
Identify any potentially mis-configured VPNs
Tune NIC performance
Increase size and improve hardware performance
Improve load capacity
Tune the firewall rule base
Reduce load on Rule Base application
Improve network performance
Improve logging efficiency
Use IPS Bypass to manage performance
Deploy IPv6 in a local envrionment
Identify differences between VPNs
Configure VPN Tunnel Interface (VTI)
Configure Open Shortest Path First (OSPF)

Lab Exercises Include

Evaluate Chain Modules
Modify Security Policies
Examine how rules and objects affect optimization
Troubleshoot Secure Internal Communication issues
Identify a mis-configured rule
Identify the source of GUI client connectivity problems
Improve load capacity through optimization
Optimize network performance
Configure Manual NAT
Troubleshoot ClusterXL and SecureXL
Configure IPS to reduce false positives
Identify the speed of the system?s CPU
Identify connections in the ClusterXL debug file
Troubleshoot a mis-configured VPN
Identify VPN configuration problems
Identify acceleration status of current connections
Identify the source of an encryption failure

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Print Friendly, PDF & Email