You are on page 1of 24

C

C
Check Point Certified Professional Program S
ROOMAN is an authorized training centre for A
offering training on Checkpoint certification
courses. The Check Point Certified
Professional Program provides students with
the necessary skills to maximize their
company's investment in Check Point based
network security solutions. This program is
structured around product-focused
certifications based on comprehensive
courses that offer students hands-on
experience with Check Point products.

Wednesday, December 8, 2021 Created By : SACHIN GARG 1


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
C
CCSA C
Check Point Certified Security Administrator S
CCSA is a foundation level certification that validates A
a candidates ability to configure and manage
fundamental implementations of Check Point's
flagship product, FireWall-1, as an enterprise level
Internet security solution to protect corporate
networks. As a CCSA, security professionals possess
the requisite skills to define and configure security
policies that enable secure access to information
across corporate networks. In addition to these
essential skills, CCSAs also have the ability to monitor
network security activity and implement measures to
block intruder access to networks.

Wednesday, December 8, 2021 Created By : SACHIN GARG 2


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
To earn CCSA NG with Application Intelligence
certification, candidates must pass :

Exam #156-210.4 : Check Point NG with Application


Intelligence - Management I1

Wednesday, December 8, 2021 Created By : SACHIN GARG 3


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
C
Audience C
S
•SYSTEM ADMINISTRATORS A
•SECURITY MANAGERS
•NETWORK ENGINEERS
•AND
•INDIVIDUAL SEEKING CCSA
CERTIFICATION

Wednesday, December 8, 2021 Created By : SACHIN GARG 4


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
C
Prerequisites C
S
WORKING KNOWLEDGE OF A
•Windows NT/2000/2003
Or
•Any Flavor Of Unix
With
•Expertise In TCP/IP & Routing

Wednesday, December 8, 2021 Created By : SACHIN GARG 5


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
C
Duration of the course C
S
Part Time : 12 DAYS (2 hrs/day)
A
Full Time : 2 DAYS (8 hrs/day)

Wednesday, December 8, 2021 Created By : SACHIN GARG 6


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
C
Key Benefits C
S
A

As a CCSA, security professionals possess


the requisite skills to define and configure
security policies that enable secure access to
information across corporate networks.

Wednesday, December 8, 2021 Created By : SACHIN GARG 7


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
Course contents
C
C
Check Point Certified Professional Program
S
Exam 156-210.4 : Check Point NG with Application Intelligence - A
Management I
Check Point NG with Application Intelligence -
Management I (156-210.4) covers the following
exam objectives :
1. Describe the purpose of a firewall
2. Describe and compare firewall architecture
3. Identify the different components of VPN-1/FireWall-1 NG
4. Explain the function and operation of a Security Policy
5. Demonstrate the creation of network objects and groups
using the SMARTClient
6. Demonstrate the setup of anti-spoofing on the firewall

Wednesday, December 8, 2021 Created By : SACHIN GARG 8


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
C
C
7. Demonstrate the setup and operation of an active S
Security Policy A
8. Demonstrate how to hide and unhide rules, view
hidden rules, define a rule mask and apply a rule
mask
9. Show how to install and uninstall a Security
Policy
10.List the guidelines for improving VPN-1/FireWall-
1 NG performance using a Security Policy

Wednesday, December 8, 2021 Created By : SACHIN GARG 9


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
C
C
S
A
11.Identify the three display modes of the SmartView
Tracker
12.Identify and define SmartView Status Icons
13.Specify selection criteria and save log files
14.Describe the steps needed to block an intruder
15.List three blocking scope options and their uses

Wednesday, December 8, 2021 Created By : SACHIN GARG 10


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
C
Course contents
C
S
A
16.Describe how block request is used
17.Understand Application Intelligence technologies
18.Understand active-defense technologies
19.Configure VPN-1/FireWall-1 NG to block common
categories of attacks
20.Enable SmartDefense global protection
mechanisms

Wednesday, December 8, 2021 Created By : SACHIN GARG 11


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
Course contents
C
C
S
21.Monitor the Security Policy with the SmartView
A
Status
22.Demonstrate how to implement authentication
23.Demonstrate the process for creating users and
groups
24.Demonstrate the setup of authentication
parameters
25.Demonstrate how to implement User
Authentication using various authentication
schemes

Wednesday, December 8, 2021 Created By : SACHIN GARG 12


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
C
Course contents
C
S
A
26.List types of services supported by VPN-
1/FireWall-1 NG requiring username and
password
27.Demonstrate how to implement Client
Authentication
28.Demonstrate how to implement Session
Authentication
29.List the reasons and methods for Network
Address Translation

Wednesday, December 8, 2021 Created By : SACHIN GARG 13


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
C
Course contents
C
S
A

30.Demonstrate how to set up Static NAT


31.Demonstrate how to set up Hide NAT
32.Describe basic network configurations using NAT
33.Describe the process of protecting your protected
network with backups

Wednesday, December 8, 2021 Created By : SACHIN GARG 14


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
C
Course contents
C
S
A

34.Install and upgrade the VPN-1/FireWall-1 NG


software
35.Describe the process of licensing VPN-1/FireWall-
1 NG
36.Describe how VPN-1/FireWall-1 NG licensing
works

Wednesday, December 8, 2021 Created By : SACHIN GARG 15


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
MODULE 1
C
C
S
Introduction to Security A
1. Need for Security in a Information System
2. Role of a Firewall in a Network
3. Types of a Firewall Technologies
4. Check Point standard in Security

Wednesday, December 8, 2021 Created By : SACHIN GARG 16


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
MODULE 2
C
C
Check Point VPN-1/Firewall-1
S
1. How VPN-1/Firewall works A
2. VPN-1/Firewall-1 Architecture
3. Components of VPN-1/Firewall-1
4. Distributed deployments

Wednesday, December 8, 2021 Created By : SACHIN GARG 17


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
MODULE 3
C
Working with the security policies C
1. Understanding security policies
2. Using Smartdashboard
S
3. Access control for administrators A
4. Creating rule base
5. Implicit and Explicit Rules
6. Security policy command line options
7. Enabling and disabling a rule
8. Uninstalling a security policy
9. Inproving VPN-1/Firewall performance

Wednesday, December 8, 2021 Created By : SACHIN GARG 18


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
MODULE 4
C
C
S
Working with SmartView A
Understanding the log architecture
Using SmartView tracker
Filtering options inSmartView Tracker
Blocking Intruder Connections
Using SmartView Status
Checking the status of VPN-1/Firewall-1

Wednesday, December 8, 2021 Created By : SACHIN GARG 19


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
MODULE 5
C
C
S
SmartDefene A
1. Checkpoint Application Intelligence
2. Understanding active-defence technologies
3. Components and capabilities of
SmartDefence
4. Configuring SmartDefence with Application
Intelligence
5. SmartDefence Storm Centre

Wednesday, December 8, 2021 Created By : SACHIN GARG 20


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
MODULE 6
C
C
Authentication S
1. User authentication and authentication A
parameters
2. Understanding the need for authentication
3. Deploying user authentication
4. Stealth authentication
5. Client and session authentication
6. Sign on methods
7. Deploying client authentication
8. Additional features of single sign on and client
authentication
9. Deploying session authentication

Wednesday, December 8, 2021 Created By : SACHIN GARG 21


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
MODULE 7
C
C
S
A
Network Address Translation
1. Undestanding NAT
2. Types of NAT
3. Configuring dynamic and static NAT rules
4. Packet Flow and NAT
5. Troubleshooting and consideration for NAT
configuration

Wednesday, December 8, 2021 Created By : SACHIN GARG 22


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
MODULE 8
C
C
S
A
VPN-1/Firewall Backup and Upgrades
1. Process of protecting and protected
network with backups
2. Install and upgrade the VPN-1/Firewall
NG software
3. Process of Licensing VPN-1/Firewall NG
4. Understanding how VPN-1/Firewall NG
licensing works

Wednesday, December 8, 2021 Created By : SACHIN GARG 23


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI
C
C
S
A
THANKS YOU

Wednesday, December 8, 2021 Created By : SACHIN GARG 24


ROOMAN INSTITUTE OF TECHNOLOGY,
LAXMI NAGAR, NEW DELHI

You might also like