MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 33 lectures (2h 26m) | Size: 1.92 GB
In this course, you can learn Check Point installation and management with lab applications through sample topology
What you’ll learn
Network Security
Check Point Firewall Installation
Check Point Firewall Management
Creating Security Policies
Creating Multiple Security Policies
URL Filtering
Application Control
NAT Configuration
IPsec Site to Site VPN
Identity Awareness
Https Inspection
Command Line Interface
Requirements
You must have a basic level of System, Network and Firewall knowledge.
If you do not have sufficient Network knowledge, I recommend that you take the Cisco CCNA training among my trainings before starting this training.
Description
Check Point Certified Security Administrator | In the CCSA R81 training, you will learn the installation and management of Check Point Management Server and Security Gateway (Firewall) with step-by-step lab applications over the sample topology.
By taking this course, you will be able to pass the Check Point Certified Security Administrator CCSA exam easily.
To attend the training, you must have basic system and network knowledge. I recommend that you have received Cisco CCNA training. If you have not received Cisco CCNA training, I recommend that you take this training first among my trainings.
In this training, we have a total of 8 sections and 33 lessons. In the first part of the training, we will talk about the training content and Check Point certificates. In the second part, we will cover the installation and basic settings issues. In the third part, we will make examples for security policies. In the fourth chapter, we will cover Network Address Translations. In the fifth chapter, we will cover topics such as URL Filtering, Application Control, Anti Spoofing, Multiple Policy creation and High Availability. In the sixth chapter, I will tell you about the identity control issues. In this section, I will explain how to add LDAP Server, Captive Portal and Agent software and how to do limit control. In the seventh chapter, we will deal with Virtual Private Network (VPN). In the last section, we will cover device management and maintenance. We will finish our course by explaining topics such as making Interface settings using CLI, changing the Secure Internal Communication password using CLI, Backup and Restore.
I tried to convey this training to you in the best way with my 24 years of experience in the sector. I had a lot of fun while preparing the training, I have no doubt that you will enjoy watching it too.
In order to provide you with the best sound and image quality, I used a quality microphone and HD camera while shooting.
Who this course is for
Network Experts
System Experts
Employees in the IT Industry
Those Who Want to Become a Cyber Security Expert
Those Who Want to Become a Network Security Specialist
Homepage
https://www.udemy.com/course/check-point-ccsa-course/
DOWNLOAD FROM HOT4SHARE.COM
DOWNLOAD FROM UPLOADGIG.COM
DOWNLOAD FROM RAPIDGATOR.NET
DOWNLOAD FROM NITROFLARE.COM