Check Point Certified Security Administrator NGX and Nokia Security Administrator I

GARUD INFOTECH
In Gurgaon

Price on request
You can also call the Study Centre
12423... More
Compare this course with other similar courses
See all

Important information

  • Course
  • Gurgaon
Description

Important information
Venues

Where and when

Starts Location
On request
Gurgaon
NM-23, Old DLF Colony, , Haryana, India
See map

Course programme

Check Point Certified Security Administrator NGX and Nokia Security Administrator I

Check Point NGX Security administration on Nokia IP Security Platform is a foundation course for Check Point'sflagship product, VPN-1 NGX (R65). This course providesan understanding of the basic concepts and skills necessaryto configure and deploy VPN-1 NGX on a Nokia IP Security Platform (NSP). This course is designed for technicians who will be responsible for configuring and deploying VPN-1 NGX and NSPs, and for those who seek NSA and/or CCSA certification.

You Will Learn

* How to identify overall features and benefits of the NSP line
* How to execute the initial setup process of an NSP
* How to manage and maintain an NSP
* How to configure SSH and SSL
* How VPN-1 components and Check Point's three-tier architecture works to secure your network
* How to create objects and rules, and modify a Security Policy's properties
* How to use monitoring tools to track, monitor, and account for all connections logged by Check Point components
* How to configure network-bandwidth requirements and interpret results
* How to use Network Address Translation to overcome IP addressing limitations
* How to verify the identity of users logged in to VPN-1 using authentication schemes
* How to protect organizations from known network attacks and emerging, unknown threats using SmartDefense
* How to configure Web-filtering and antivirus settings on a Gateway
* How to configure and deploy a Management High Availability solution

Exercises

* Configure and maintain the Nokia IP appliance (IPSO 4.2)
* Install and configure the SmartCenter Server
* Establish trust between a Gateway and SmartCenter Server
* Develop a network model useing SmartMap
* Create a Policy Package to configure a Rule Base
* Enable Static NAT on a network
* Simulate a malicious network intrusion, and block the attack
* Enforce the Suspicious Activity Rule with SmartView Monitor
* Create user templates and define users
* Test Client Authentication
* Configure QoS rules to support traffic-priority requirements
* Configure a SmartDefense to detect port scans and successive multiple-connection attempts
* Configure Web Intelligence to detect a simple worm signature


Compare this course with other similar courses
See all