Wednesday, September 16, 2009

Featured Course Category: Check Point Certified Security Administrator (CCSA)

With over 24,000 CCSA certified professionals worldwide, CCSA NGX certification is one of the most highly recognized and respected vendor-specific security certifications available.

The foundation of Check Point certifications, CCSA NGX R65 certification validates a Security Administrator's ability to maintain day-to-day operation of Check Point security solutions and ensure secure access to information across the network. Proficiencies include creating and installing Security Policies, using logging and reporting features, and managing anti-spoofing, Network Address Translation (NAT), and OPSEC applications.

More information on specific topics, skills, and competencies covered by CCSA NGX R65 certification is available in the course and exam details.

Exam #156-215.65

VPN-1, SmartCenter, SmartConsole, SmartDefense

Backup and restore, monitoring tools, object creation, Rule Base construction, VPNs, NAT, VoIP, authentication (including LDAP), user management

You will learn
  • How VPN-1 components and Check Point’s three-tier architecture works to secure your network
  • How to perform command-line operations using Check Point’s SecurePlatform operating system
  • How to back up critical files and directories, for availability and timely recovery of Security Gateways and SmartCenter Servers
  • How to create objects and rules and modify a Security Policy’s properties
  • How to use monitoring tools to track, monitor, and account for all connections logged by Check Point components
  • How to configure network-bandwidth requirements and interpret the results
  • How to use Network Address Translation to overcome IP addressing limitations
  • How to verify the identity of users logging in to VPN-1 using authentication schemes
  • How to implement LDAP, and integrate it with a SmartCenter Server
  • How to protect organizations from known network attacks and entire categories of emerging or unknown attacks, using SmartDefense
  • How to configure Web-filtering and antivirus settings on a Gateway to ensure traffic content is inspected for specific conditions.

  • Installing and configuring the SmartCenter Server
  • Installing SecurePlatform Pro on the Security Gateway
  • Configuring the Security Gateway using the WebUI
  • Configure an interface as your management connection using the sysconfig utility
  • Backing up a current configuration from the command line
  • Create network objects
  • Establish trust between a Gateway and SmartCenter Server
  • Develop a network model using SmartMap
  • Create a Policy Package to configure a Rule Base
  • Enable Static NAT on a network
  • Simulate a malicious network intrusion, and blocking the attack
  • Enforce the Suspicious Activity Rule with SmartView monitor
  • Create user templates and define users 
  • Test Client Authentication
  • Configure SmartDirectory using Microsoft Active directory to authenticate users
  • Configure QoS rules to support traffic-priority requirements
  • Configure SmartDefense to detect port scans and successive multiple-connection attempts
  • Configure Web Intelligence to detect a simple worm signaturr

No comments: