What do you need to learn today ? ™
    


MCSE Certification Boot camp. Why Vibrant ?
MCSE Training Course Fees
MCSE certification FAQ
MCSE Certification Contact US Contact US
MCSE certification camp Testimonials
MCSE Camp Site map
--------------------------

MCSE Certification UK MCSE Boot camp UK
MCSE Training camp Real CCNA Boot camp
MCSE CCNP Certification Real CCNP Boot camp
Payless MCSE Certification camp Payless MCSE Camp
MCSE Certification camp MCSE Certification
MCSE Boot camp Vibrant bootcamp



 
 Checkpoint CCSA Boot Camp :                                                        
 


Vibrant 3
Day  CCSA Boot Camp

Check Point Certification CCSA  Boot Camp :
When it comes to firewalls, Check Point is the most trusted name in the world. But a firewall is only valuable when a trained, capable firewall administrator manages it. CCSA certification that you will earn in our Check Point Certification Boot Camp will set you apart as a member of an elite group of professionals. Our accelerated course, using custom materials, allow you to train, prepares, and pass CCSA exam in a 3 day period-guaranteed!

Check Point Certified Security Administrator (CCSA) is a foundation level certification that validates a candidates ability to configure and manage fundamental implementations of Check Point's flagship product, FireWall-1, as an enterprise level Internet security solution to protect corporate networks. As a CCSA, security professionals possess the requisite skills to define and configure security policies that enable secure access to information across corporate networks. In addition to these essential skills, CCSAs also have the ability to monitor network security activity and implement measures to block intruder access to networks.

Course Objectives:

Check Point

  • VPN-1/FireWall-1 architecture and how to deploy its various modules and components
  • How to define a security policy using the VPN-1/FireWall-1 Security Dashboard, incorporating the Visual Policy Editor
  • How to deploy and manage distributed security gateways using Check Point’s Secure Update and Secure Internal Communications (SIC) capabilities
  • How to administer and troubleshoot VPN-1/FireWall-1 security policies
  • How to implement network address translation (NAT)
  • How to set up user authentication in a VPN-1/FireWall-1 environment
  • How to install and configure VPN-1/FireWall-1 for enterprise VPN deployment
  • How to configure and deploy VPN-1 SecuRemote and VPN-1 SecureClient for remote access VPNs
  • How to set up VPN desktop policies for VPN-1 SecureClient and how to use Security Configuration Verification to ensure VPN client security
  • How to use the VPN-1 SecureClient packaging tool for easy software configuration and deployment
  • How to employ digital certificates to establish trust relationships in VPN environments
  • Content security options, including URL filtering
  • General VPN0-1/FireWall-1 Security functions:
    SYNDefender to protect against denial of service (DOS) attacks

Prerequisites
The CCSA  program is targeted at professionals with at least 1 year of experience in the information systems. The student should have passed Network Plus or the MCSE or CCNA or an equivalent in job experience and should have strong knowledge of TCP/IP.

Benefits
The CCSA  program is designed to provide Information Technology Professions with the knowledge to configure and maintain Checkpoint firewalls. This program provides introductory and expert training on the skills required to maintain a highly secure Checkpoint firewall.

Boot camp  include the following:

  • Accommodation

  • Courseware and Use of Vibrant Softnet+ Test Software

  • Breakfast, Lunch, Dinner, Snacks and Beverages

  • Onsite Certification Testing with Included Vouchers

Our goal is to send you home with your CCSA Certification  - and your future - in your pocket!


 
 




 
©1998- 2004, Vibrant E-Technologies Ltd. All Rights Reserved.
     

Objectives:

  • Describe the purpose of a firewall
  • Describe and compare firewall architecture
  • Identify the different components of VPN-1/FireWall-1 NG
  • Explain the function and operation of a Security Policy
  • Demonstrate the creation of network objects and groups using the SmartDashboard
  • Demonstrate the setup of anti-spoofing on the firewall
  • Demonstrate the setup and operation of an active Security Policy
  • Demonstrate how to hide and unhide rules, view hidden rules, define a rule mask, and apply a rule mask
  • Show how to install and uninstall a Security Policy
  • List the guidelines for improving VPN-1/FireWall-1 NG performance using a Security Policy
  • Identify the three display modes of the SmartView Tracker
  • Identify and define SmartView Status Icons
  • Specify selection criteria and save log files
  • Describe the steps needed to block an intruder
  • List three blocking scope options and their uses
  • Describe how block request is used
  • Understand Application Intelligence technologies
  • Understand active-defense technologies
  • Configure VPN-1/FireWall-1 NG, to block common categories of attacks
  • Enable SmartDefense global protection mechanisms
  • Monitor the Security Policy with the SmartView Status
  • Demonstrate how to implement authentication
  • Demonstrate the process for creating users and groups
  • Demonstrate the setup of authentication parameters
  • Demonstrate how to implement User Authentication using various authentication schemes
  • List types of services supported by VPN-1/FireWall-1 NG requiring username and password
  • Demonstrate how to implement Client Authentication
  • Demonstrate how to implement Session Authentication
  • List the reasons and methods for Network Address Translation
  • Demonstrate how to set up Static NAT
  • Demonstrate how to set up Hide NAT
  • Describe basic network configurations using NAT
  • Describe the process of protecting your protected network with backups
  • Install and upgrade the VPN-1/FireWall-1 NG software
  • Describe the process of licensing VPN-1/FireWall-1 NG
  • Describe how VPN-1/FireWall-1 NG licensing works