Check Point CCSA Training Course (R81) Training 課程
  Facebook: Check Point CCSA Training Course (R81) Training 課程
 
Check Point CCSA Training Course (R81) Training 課程
Check Point CCSA Training Course (R81) Training 課程 Check Point CCSA Training Course (R81) Training 課程 Check Point CCSA Training Course (R81) Training 課程 Check Point CCSA Training Course (R81) Training 課程 Check Point CCSA Training Course (R81) Training 課程 Check Point CCSA Training Course (R81) Training 課程 Check Point CCSA Training Course (R81) Training 課程 Check Point CCSA Training Course (R81) Training 課程 Check Point CCSA Training Course (R81) Training 課程 Check Point CCSA Training Course (R81) Training 課程 Check Point CCSA Training Course (R81) Training 課程  
Check Point CCSA Training Course (R81) Training 課程 Check Point CCSA Training Course (R81) Training 課程

想定期知道最新課程及優惠嗎?
免費訂閱本中心的課程通訊!

課堂錄影隨時睇 10 大優點之導師解答:您可於觀看某一課堂視像後提出相關問題,課程導師會樂意為學員以單對單的形式解答!

Check Point CCSA R81 國際認可證書課程
課程簡稱:Check Point CCSA Training Course (R81)


  • 課程時間
  • 課程簡介
  • 課程特點
  • 認證要求
  • 考試須知
  • 課程內容
  • 詳細內容

課程優惠!現凡同時報讀以下兩個課程:
即減 $820!

推介服務:課堂錄影隨時睇 (在家觀看 = 0%,在校觀看 = 100%)
學員使用電話或本網頁報名,待本中心確認已為學員留位後,即可使用 轉數快 繳付學費,過程簡便!
編號 地點 可預約星期及時間 學費低至 85 折  
OK2403MV 旺角 一至五:14:30 - 22:15   六:13:45 - 21:30   日:10:15 - 18:00 (公眾假期休息) 95 折後只需 $2,831 按此報名:Check Point CCSA Training Course (R81) Training 課程
OK2403OV 觀塘 一至五:14:15 - 22:00   六及日:12:15 - 20:00   (星期三及公眾假期休息) 9 折後只需 $2,682 按此報名:Check Point CCSA Training Course (R81) Training 課程
OK2403PV 北角 一至五:14:15 - 22:00   六及日:12:15 - 20:00   (星期三及公眾假期休息) 9 折後只需 $2,682 按此報名:Check Point CCSA Training Course (R81) Training 課程
OK2403SV 沙田 一至五:14:15 - 22:00   六及日:12:15 - 20:00   (星期三及公眾假期休息) 85 折後只需 $2,533 按此報名:Check Point CCSA Training Course (R81) Training 課程
OK2403YV 屯門 一至五:14:15 - 22:00   六及日:12:15 - 20:00   (星期一、三及公眾假期休息) 85 折後只需 $2,533 按此報名:Check Point CCSA Training Course (R81) Training 課程
* 各政府部門可使用 P Card 付款  
如使用 P Card 繳付考試費,考試費需另加 1.3% 附加費  
在校免費試睇: 首 1 小時,請致電與本中心職員預約。 查看各地點電話
旺角 2332-6544
觀塘 3563-8425
北角 3580-1893
沙田 2151-9360
屯門 3523-1560
在校免費重睇: 學員可於享用時期內於報讀地點不限次數地重看課堂錄影,從而可反覆重溫整個課程!
導師解答: 學員可於觀看某一課堂錄影後提出課堂直接相關的問題,課程導師會樂意為學員以單對單的形式解答!
課時: 18 小時
享用時期: 6 星期 (可於報讀日至 4 星期內觀看整個課程,另加 2 星期備用時期)。進度由您控制,可快可慢。
課堂錄影導師: Franco (任教課程清單)
在校觀看: 詳情及示範片段


地區 地址 電話 教育局註冊編號
旺角 九龍旺角亞皆老街 109 號,皆旺商業大廈 18 樓 1802 - 1807 室 2332-6544 533459
觀塘 九龍觀塘成業街 7 號寧晉中心 12 樓 G2 室 3563-8425 588571
北角 香港北角馬寶道 41-47 號華寶商業大廈 3 樓 01-02 號舖 3580-1893 591262
沙田 新界沙田石門安群街 3 號京瑞廣場 1 期 10 樓 M 室 2151-9360 604488
屯門 新界屯門屯喜路 2 號屯門柏麗廣場 17 樓 1708 室 3523-1560 592552
注意! 客戶必須查問報讀學校的教育局註冊編號,以確認該校為註冊學校,以免蒙受不必要的損失!


隨著網絡技術日益普及,大家都開始擔心網絡和資訊保安的問題。故此各大網絡硬件和軟件製造商紛紛推出多個保安產品以提升企業網絡保安水平。 Check Point 便是當中的翹楚。 Check Point 是著名的防火牆 (Firewall) 及虛擬私人網絡 (VPN) 的生產商,其產品遍佈全球。故此掌握 Check Point 技術乃是大勢所趨。

為證明您能掌握各項 Check Point 技術, Check Point 推出了一系列的認證。而最為普遍的有:

- CCSA R81 (Check Point Certified Security Administrator R81)

- CCSE R81 (Check Point Certified Security Expert R81)

CCSA R81 是 Check Point 入門級的認證,考過 CCSA R81 後,同學便可以考取更高級的 CCSE R81 認證。

本課程專為同學考取 CCSA R81 國際認可證書而設,導師將在課堂上使用 Check Point R81 示範和教授各項 Check Point 技術。修畢課程後,便可參加考試 156-215.81.20 (Check Point Security Administration R81),合格後便可成為 CCSA R81!


課程名稱: Check Point CCSA R81 國際認可證書課程
- 簡稱:Check Point CCSA Training Course (R81)
課程時數: 合共 18 小時
適合人士: 對防火牆及虛擬私人網絡技術有興趣的人士
授課語言: 以廣東話為主,輔以英語
課程筆記: 本中心導師親自編寫英文筆記

1. Franco 親自教授: Franco 善於控制學習節奏,深入淺出,令學員在輕鬆的氣氛下掌握知識。
2. Franco 親自編寫筆記: Franco 親自編寫筆記,絕對適合考試及實際操作 Check Point 器材之用,令你無須「死鋤」如字典般厚及不適合香港讀書格調的書本。
3. 理論與實習並重: Franco 的筆記不會紙上談兵,筆記內有大量商業實習。
4. 提供模擬考試題目: 本中心為學員提供模擬考試題目,每條考試題目均附有標準答案。
5. 提供 Check Point R81 (15-day Plug n Play license) 軟件: 提供 Check Point R81 (15-day Plug n Play license) 軟件,令學員可以自行安裝 Check Point R81。
6. 免費重讀: 傳統課堂學員可於課程結束後三個月內免費重看課堂錄影。

只要你於下列科目取得合格成績,便可獲 Check Point 頒發 CCSA R81 國際認可證書:

考試編號 科目名稱
156-215.81.20 Check Point Certified Security Administrator R81



本中心為 Check Point 指定的 CCSA R81 考試試場,報考時請致電本中心,登記欲報考之科目考試編號、考試日期及時間 ( 最快可即日報考 ) 。臨考試前要出示身份證及繳付考試費 HK$2,050。

臨考試前要繳付考試費 HK$2,050,及必須出示下列兩項有效之身份證明文件,否則考生不可進行考試,而已繳付之考試費亦不會退回:
1. 香港身份證 及
2. 附有考生姓名及簽名的證件 (如信用咭、香港特區護照、BNO等)


考試題目由澳洲考試中心傳送到你要應考的電腦,考試時以電腦作答。所有考試題目均為英文,而大多數的考試題目為單項選擇題 ( 意即 O) 或多項選擇題 ( 意即 口 ) 。作答完成後會立即出現你的分數,結果即考即知!考試不合格便可重新報考,不限次數。欲知道作答時間、題目總數、合格分數等詳細考試資料,可瀏覽本中心網頁
"各科考試分數資料"。





課程名稱:Check Point CCSA R81 國際認可證書課程
- 簡稱:Check Point CCSA Training Course (R81)

第 1 部份:Check Point Software Architecture

  • 教授 Gaia 在 Check Point solutions 的功能和角色,安裝及設定 [GUI (Graphical User Interface) + CLI (Command Line Interface)]

Check Point CCSA R81 Course Training 課程

Check Point CCSA R81 Course Training 課程

  • 教授 Security Management Server 在 Check Point solutions 的功能和角色,安裝及設定 Security Management Server。

Check Point CCSA R81 Course Training 課程


  • 教授 Security Gateway 在 Check Point solutions 的功能和角色,安裝及設定 Security Gateway。

Check Point CCSA R81 Course Training 課程

  • 教授 Smart Console 在 Check Point solutions 的功能和角色,安裝及設定 Smart Console。

Check Point CCSA R81 Course Training 課程

  • 教授 Distributed deployment。

Check Point CCSA R81 Course Training 課程

  • 其他相關知識包括 SIC、folder / file architecture 等等。

Check Point CCSA R81 Course Training 課程

第 2 部份:Firewall

  • 教授 Anti-spoofing 概念及設定。

Check Point CCSA R81 Course Training 課程

  • 教授基本 Packet filtering。

Check Point CCSA R81 Course Training 課程

  • 教授 Threat Prevention (IPS, Intrusion Prevention System),並以過濾過大的 ping packet 作示範。

Check Point CCSA R81 Course Training 課程

  • 教授 Application Inspection,並以過濾 HTTP GET 作示範。

Check Point CCSA R81 Course Training 課程

  • 教授 Geo Protection,並以過濾外國的 packets 作示範。

Check Point CCSA R81 Course Training 課程

  • 教授 Application Control 和 URL filtering,並以過濾 YouTube / Facebook 等網站作示範。

Check Point CCSA R81 Course Training 課程

Check Point CCSA R81 Course Training 課程

  • 教授 NAT 並作 dynamic 和 static NAT 的示範。

Check Point CCSA R81 Course Training 課程

  • 教授其他 Firewall 相關知識,例如 implied rules, policy management, sessions, publish 等概念。

Check Point CCSA R81 Course Training 課程

第 3 部份:Identity awareness, monitor and log management

  • 教授 Identity awareness 理論並教授如何將 Security Gateway連接 Microsoft Active Directory。

Check Point CCSA R81 Course Training 課程

  • 教授從 Check Point 產品內 browse Active Directory 結構。

Check Point CCSA R81 Course Training 課程

Check Point CCSA R81 Course Training 課程

  • 在記錄內顯示 Active Directory 的 computers 和 users。

Check Point CCSA R81 Course Training 課程

  • 在 Rule 上加上 Active Directory 的 users / machines。

Check Point CCSA R81 Course Training 課程

  • 教授 Check Point 的 monitor 和 logs 機制。

Check Point CCSA R81 Course Training 課程

  • 教授 Views 並顯示 Views。

Check Point CCSA R81 Course Training 課程

  • 教授如何產生 reports。

Check Point CCSA R81 Course Training 課程

  • 教授將記錄 export 為 csv 以便其他程式使用。

Check Point CCSA R81 Course Training 課程

  • 教授將記錄 security administrator 的活動,例如修改 Firewall rules。

Check Point CCSA R81 Course Training 課程

  • 教授了解 Check Point Security Management Server 及 Security Gateway 的情況。

Check Point CCSA R81 Course Training 課程

  • 教授如何處理 CPU 太高或 disk space 過少等問題。

Check Point CCSA R81 Course Training 課程

  • 教授 Block Suspicious Activity 的概念,應用時機並實踐出來。

Check Point CCSA R81 Course Training 課程

  • 教授其他 Identity awareness, monitor and log management 知識。

 

第 4 部份:VPN

  • 教授一般的 IPSec VPN 理論 (非常重要)。
  • 教授針對 Check Point的 IPSec VPN 概念。

Check Point CCSA R81 Course Training 課程

  • 教授同時管理多個 Security Gateways 以準備設定 VPN。

Check Point CCSA R81 Course Training 課程

  • 教授建立和監察 VPN。

Check Point CCSA R81 Course Training 課程

Check Point CCSA R81 Course Training 課程

 

第 5 部份:Miscellaneous

  • 教授在 Security Gateway 內 capture Wireshark 以便學習及解決問題。

Check Point CCSA R81 Course Training 課程

  • Administrations and disaster recovery concepts (e.g. Backup, restoration, account management, etc.)。
  • 其他話題。
  • 教授 Management High Availability。

Check Point CCSA R81 Course Training 課程

  • 教授 ClusterXL。

Check Point CCSA R81 Course Training 課程

  • 教授 QoS (Quality of service)。

Check Point CCSA R81 Course Training 課程

The course content above may change at any time without notice in order to better reflect the content of the examination.




1 Check Point Gaia
1.1 Introduction
1.2 Gaia GUI

2 Check Point Architectures
2.1 Overall Concepts of Check Point Architectures
2.1.1 Security Management Server
2.1.2 Security Gateway
2.1.3 SmartConsole
2.2 R81
2.3 Quick tour of SmartConsole
2.3.1 Log in
2.3.2 Gateways & Servers
2.3.3 Security Policies
2.3.3.1 Security Policies Access Control
2.3.3.2 Security Policies Threat Prevention
2.3.3.3 Shared Policies
2.3.4 Logs & Monitor
2.3.5 Manage & Settings
2.3.6 The main SmartConsole Menu
2.3.7 The Objects Menu
2.4 Secure Internal Communication (SIC)
2.4.1 SIC Overview
2.4.2 One-time password for initializing trust
2.4.3 SIC status
2.4.4 Internal Certificate Authority (ICA)
2.5 Deployment Options
2.5.1 Standalone Deployment
2.5.2 Distributed Deployment
2.5.3 Bridge Mode

3 Check Point Products
3.1 Security Gateways
3.2 Smart-1 Appliances

4 Installation and Initial Setup
4.1 Minimum System Requirements / Open Server Hardware Requirements
4.1.1 Security Management Server
4.1.2 Security Gateways
4.1.3 SmartConsole
4.1.4 Logging Requirements
4.2 Lab Topology
4.3 Demonstration: Security Management Server
4.3.1 Demonstration: Install Gaia for Security Management Server
4.3.2 Demonstration: Configure Gaia for Security Management Server
4.3.2.1 Demonstration: Gaia Login
4.3.2.2 Demonstration: IP addresses and MAC address
4.3.2.3 Demonstration: Default Gateway / Static Route
4.3.2.4 Demonstration: Hosts and DNS
4.3.2.5 Demonstration: Logout
4.3.3 Demonstration: Install Security Management Server on Gaia / First Time Configuration Wizard
4.4 Demonstration: Security Gateway
4.4.1 Demonstration: Install Gaia for Security Gateway
4.4.2 Demonstration: Configure Gaia for Security Gateway
4.4.2.1 Demonstration: Gaia Login
4.4.2.2 Demonstration: IP addresses and MAC address
4.4.2.3 Demonstration: Default Gateway / Static Route
4.4.2.4 Demonstration: Logout
4.4.3 Demonstration: Install Security Gateway on Gaia
4.4.4 Demonstration: SmartConsole
4.4.4.1 Install SmartConsole
4.5 Demonstration: Accessing to security management server through SmartConsole
4.6 Demonstration: Establishing SIC between the Management Server and Security Gateway

5 Firewall Policy
5.1 Demonstration: View License Status
5.2 Administrator Collaboration and Sessions
5.2.1 Purpose of Sessions and Session Start
5.2.2 Publishing
5.2.3 Disconnect and Take Over
5.3 Anti-spoofing
5.3.1 Anti-spoofing Concepts
5.3.2 Demonstration: Network Topology and Anti-spoofing
5.4 Create Objects
5.4.1 Demonstration: Create Objects
5.5 Demonstration: Create Access Control Policy
5.6 Demonstration: Verify Access Control Policy
5.7 Demonstration: Install Policy
5.8 Stealth rule and Cleanup rule (Best Practices for all Rule Bases)
5.8.1 Demonstration: Stealth rule and Cleanup rule
5.9 Implied Rules
5.9.1 Demonstration: Implied Rule
5.10 Policy management and version control
5.10.1 Policy Package Management and layers
5.10.1.1 Demonstration: View Existing Policy Package (Standard)
5.10.1.2 Demonstration: Create a New Policy Package and then policy install to the Security Gateway
5.10.1.3 Demonstration: Rollback to Default Policy Package (Standard)
5.10.1.4 Demonstration: Delete a Policy Package
5.10.2 Database Revision
5.10.2.1 Demonstration: Display Database Revisions
5.10.2.2 Demonstration: View Database Revisions’ Content
5.10.2.3 Purge Database Revisions
5.10.3 Policy Installation History
5.10.3.1 Demonstration: View Policy Installation History
5.10.3.2 Demonstration: Revert to specific history
5.11 More about Rules: Section, Disable, Negate, Hit Count
5.11.1 Demonstration: Section
5.11.2 Demonstration: Disabling a Rule
5.11.3 Demonstration: Negate
5.11.4 Demonstration: Hit Count

6 Logging and Monitoring
6.1 Preparation of this chapter
6.1.1 Demonstration: Confirming / Enabling Logging on the Security Management Server
6.1.2 Demonstration: Confirming / Enabling Logging and Monitoring on the Security Gateway
6.1.3 Demonstration: Enabling SmartEvent on the Security Management Server
6.2 Logging
6.2.1 Rules Tracking Options
6.2.2 Demonstration: View Logs with filtering
6.2.3 Demonstration: Rule Logs
6.3 Event Analysis and Reports
6.3.1 Events
6.3.2 From logs to events
6.3.3 Views and Reports
6.3.3.1 Demonstration: Views
6.3.3.2 Demonstration: Reports
6.4 Monitoring Traffic, Connections and Check Point Products status
6.4.1 SmartView Monitor
6.4.2 Defining Status Fetch Frequency
6.4.2.1 Demonstration: Open SmartView Monitoring
6.4.3 Suspicious Activity Rules (SAM)
6.4.3.1 Demonstration: Suspicious Activity Rules (SAM)
6.4.4 Demonstration: Real-time monitor Security Gateway Traffic
6.5 Demonstration: System Alerts and Thresholds (e.g. CPU usage, free disk space, etc.)
6.6 Demonstration: Audit Logs
6.7 Export logs to a Excel file
6.8 Demonstration: “ping” by “Logs & Monitor”

7 Network Address Translation (NAT)
7.1 Preparation of this chapter
7.2 Basic Concepts
7.3 Hide NAT
7.3.1 Overview of Hide NAT
7.3.2 Demonstration: Hide NAT
7.4 Static NAT
7.4.1 Overview of Static NAT
7.4.2 Demonstration: Static NAT
7.5 Automatic and Manual NAT Rules
7.5.1 Automatic NAT
7.5.2 Manual NAT
7.5.2.1 Overview of Manual NAT
7.5.2.2 Demonstration: Manual NAT

8 Threat Prevention
8.1 Preparation of this chapter
8.2 Overview of Threat Prevention
8.2.1 Threat Prevention Components
8.2.1.1 IPS
8.2.1.2 Anti-Bot
8.2.1.3 Anti-Virus
8.2.1.4 SandBlast
8.3 Elements of IPS protection
8.4 Demonstration: Enable Threat Prevention (IPS) in the Security Gateway
8.5 Profile
8.5.1 Overview of Profile
8.6 Demonstration: Create an IPS profile and attach it in the policy.
8.7 Demonstration: Block “Large Ping”
8.8 Demonstration: TTL Masking
8.9 Demonstration: HTTP Headers Pattern
8.10 IPS under heavy loading
8.11 Geo Policy
8.11.1 Overview of Geo Policy and Updatable Objects
8.11.2 Demonstration: Updatable Objects
8.11.3 Demonstration: Geo Policy
8.12 Demonstration: Final tasks

9 Application Control and URL Filtering
9.1 Preparation of this chapter
9.2 Demonstration: Enable Application Control and URL Filtering + adjust Policy Layer
9.3 Application Wiki
9.4 Demonstration: Blocking YouTube
9.5 Demonstration: Monitoring Facebook
9.6 Demonstration: Block “Social Networking” websites / Block website based on categories
9.7 Deep packet inspection
9.8 Demonstration: Block traffic by HTTP Methods

10 Identity and Access Management
10.1 Preparation of this chapter
10.2 Managing Administrator Accounts
10.2.1 Permission Profiles
10.2.1.1 Overview of Permission Profiles
10.2.1.2 Default Permission Profiles
10.2.1.3 Demonstration: Create a Custom Permission Profile
10.2.2 Demonstration: Create an Administrator with Custom Permission Profiles
10.3 Authentication
10.3.1 User Authentication
10.3.1.1 Overview of User Authentication
10.3.1.2 Demonstration: Part 1 of 2 - Create a User for User Authentication
10.3.1.3 Demonstration: Part 2 of 2 – Configure User Authentication
10.3.2 Client Authentication
10.3.2.1 Overview of Client Authentication
10.3.2.2 Demonstration: Client Authentication (Manual sign on by HTTP)
10.3.2.3 Demonstration: Client Authentication (Manual sign on by Telnet)
10.4 Introduction to Identity Awareness
10.4.1 Identity Sources with AD Query
10.4.1.1 Overview of Identity Sources with AD Query
10.4.1.2 Process of AD Query
10.4.1.3 Limitations of Identity Sources with AD Query
10.4.1.4 Demonstration: Identity Sources with AD Query
10.4.1.4.1 Demonstration: Identity Sources with AD Query (Check AD DS) [Optional]
10.4.1.4.2 Demonstration: Identity Sources with AD Query (Enable Identity Awareness with AD Query)
10.4.2 Browser-Based Authentication
10.4.2.1 Overview of Browser-Based Authentication
10.4.2.2 Demonstration: Browser-Based Authentication for Internal Users
10.4.2.3 Demonstration: Browser-Based Authentication for Guests

11 Virtual Private Network (VPN)
11.1 Overview of Virtual Private Network (VPN)
11.2 Encryption
11.3 Hashing
11.4 Internet Key Exchange (IKE)
11.4.1.1 IKE phase 1
11.4.1.2 IKE phase 2
11.5 VPN Communities
11.6 VPN Topologies
11.6.1 Meshed VPN Community
11.6.2 Star VPN Community
11.7 Demonstration: Site-to-Site VPN
11.7.1 Demonstration: Site-to-Site VPN (Part 1: Preparation)
11.7.1.1 Demonstration: Preparation in HQ’s Security Gateway
11.7.1.2 Demonstration: Install Gaia in Branch’s Security Gateway
11.7.1.3 Demonstration: Install Security Gateway in Branch
11.7.1.4 Demonstration: Establish SIC between the Management Server and Branch’s Security Gateway
11.7.2 Demonstration: Site-to-Site VPN (Part 2: Build VPN)
11.7.2.1 Demonstration: Create objects representing sites’ networks and enable VPN feature in Security Gateways
11.7.2.2 Demonstration: VPN Community and Access Rule Configurations
11.7.3 Demonstration: Site-to-Site VPN (Part 3: Monitor VPN)

12 Miscellaneous topics
12.1 Command Line Interface (CLI), Standard Mode and Expert Mode
12.1.1 Command Line Interface (CLI)
12.1.1.1 Default Settings
12.1.1.2 Demonstration: Command Line Interface (CLI)
12.1.2 Standard Mode and Expert Mode
12.1.2.1 Standard Mode
12.1.2.2 Expert Mode
12.1.2.3 Demonstration: Expert Mode (with initializing expert mode password)
12.2 Web Services APIs
12.2.1 Demonstration: Enable the API server
12.2.2 Demonstration: Connect to the API Server and get the access token
12.2.3 Demonstration: Use API to create a host object (192.168.0.150)
12.3 Network Traffic Capturing (Wireshark)
12.3.1 Introduction to FW Monitor
12.3.2 FW Monitor vs tcpdump / snoop
12.3.3 Inspection points
12.3.4 Demonstration: Capture “ALL” traffic
12.3.5 More examples of Capturing
12.3.5.1 Host-specific capture
12.3.5.2 Port-specific capture
12.3.5.3 Host-Port-specific capture
12.3.5.4 Protocol-specific capture
12.4 Maintenance
12.4.1 License Management
12.4.2 Snapshot
12.4.2.1 Snapshot Content
12.4.2.2 Snapshot’s Best Practices
12.4.2.3 Create a snapshot
12.4.3 System Configuration Backup / System Backup
12.4.3.1 System Configuration Backup Content
12.4.3.2 Perform System Configuration Backup
12.4.3.3 Schedule Perform System Configuration Backup
12.4.3.4 Restore from System Configuration Backup
12.5 Infinity Threat Prevention system
12.5.1 Infinity Threat Prevention Profiles
12.5.2 Deployment Dashboard
12.6 Network Security for IoT Devices
12.7 Group objects
12.8 Security Zones
12.9 Share a layer between Security Polices
12.10 Web SmartConsole

13 Setup Home Lab
13.1 Prerequisites
13.2 Install VMware WorkStation Player
13.3 Topology
13.4 Management Server
13.5 Windows Server (PC)
13.5.1 Install Windows Server
13.5.2 Install VMware Tools
13.6 Ubuntu (Internet)
13.7 Ubuntu (Branch)
13.8 Security Gateway (HQ)
13.9 Security Gateway (Branch)

14 Additional Reading
14.1 Reset SIC (Security Internal Communication)
14.1.1 Background information
14.1.2 Demonstration: Reset SIC (Security Internal Communication)
14.1.2.1 Reset SIC: Part 1 (from management servers)
14.1.2.2 Reset SIC: Part 2 (from security gateways)
14.1.2.3 Reset SIC: Part 3 (re-establish SIC between security management server and security gateway)
14.2 “Trick” to reset Check Point administrators’ passwords
14.2.1 Demonstration: “Trick” to reset Check Point administrators’ passwords
14.2.2 Emergendisk
14.3 Connection persistence when installing a new policy
14.3.1 Keep all connections
14.3.2 Keep data connections
14.3.3 Rematch connections
14.4 LDAP (Lightweight Directory Access Protocol)
14.4.1 Introduction to LDAP (Lightweight Directory Access Protocol)
14.4.2 Retrieving information from a LDAP Server
14.4.3 Demonstration: LDAP Authentication
14.4.3.1 Demonstration: Enable User Directory
14.4.3.2 Demonstration: Create a host object to represent LDAP server
14.4.3.3 Demonstration: Create a LDAP Account Unit
14.4.3.4 Browse LDAP objects from Check Point
14.4.3.5 Demonstration: Create a LDAP Group
14.4.3.6 Demonstration: Create a rule to “use LDAP”
14.4.3.7 Demonstration: Verification
14.5 Check Point Cluster / HA (High Availability) solutions
14.5.1 Management High Availability (Management HA) for management servers
14.5.1.1 Introduction to Management High Availability (Management HA)
14.5.1.2 Demonstration: Install Gaia + Secondary Management Server
14.5.1.3 Demonstration: Add Secondary Management Server in SmartConsole
14.5.1.4 Demonstration: Verify the Management HA status
14.5.1.5 Demonstration: Failover between primary and secondary server
14.5.1.6 Synchronization Status and Trapshooting
14.5.1.6.1 When connecting to “Active”
14.5.1.6.2 When connecting to “Standby”
14.5.1.6.3 Troubleshooting Management HA
14.5.1.6.3.1 Not communicating
14.5.1.6.3.2 Collision or HA Conflict
14.5.1.6.3.3 Sync Error
14.5.2 ClusterXL for security gateways
14.5.2.1 Introduction to ClusterXL
14.5.2.1.1 ClusterXL High Availability
14.5.2.1.2 ClusterXL Load Sharing
14.5.2.2 State Synchronization, Cluster Control Protocol (CCP), Synchronization Network and Non-Synchronized Services
14.5.2.2.1 State Synchronization and Cluster Control Protocol (CCP)
14.5.2.2.2 Synchronization Network
14.5.2.2.3 Non-Synchronized Services
14.5.2.2.4 Momentum to considering services not to be synchronized
14.5.2.3 ClusterXL Load Sharing Modes
14.5.2.3.1 Introduction to ClusterXL Load Sharing Modes
14.5.2.3.2 High Availability (ClusterXL)
14.5.2.3.3 Load Sharing
14.5.2.3.4 Active-Active
14.5.2.4 Demonstration: Install Gaia + Security Gateway with ClusterXL capability
14.5.2.5 Demonstration: Steps to create a cluster
14.5.2.6 Demonstration: Verify ClusterXL status
14.5.2.7 Miscellaneous topics in ClusterXL
14.5.2.7.1 Sticky connections and non-sticky connections
14.5.2.7.1.1 TCP 3-Way handshake of non-sticky connections
14.5.2.7.1.2 Sticky Decision Function
14.6 Enable cluster membership for this gateway
14.7 QoS
14.7.1 Introduction to QoS
14.7.2 Steps of configuring QoS
14.7.2.1 In SmartConsole
14.7.2.2 In SmartDashboard
14.7.3 Demonstration: QoS
14.7.3.1 Demonstration: Preparation
14.7.3.2 Demonstration: Enable QoS in Security Gateway
14.7.3.3 Demonstration: Configure Policy Layer for QoS
14.7.3.4 Demonstration: Configure a QoS rule
14.7.4 More about Check Point QoS
14.7.4.1 Bandwidth allocation and rules
14.7.4.1.1 Weight
14.7.4.1.2 Guarantees
14.7.4.1.3 Limit
14.7.4.2 Action types
14.7.4.2.1 Simple
14.7.4.2.2 Advanced
14.7.4.3 Sub-rules
14.7.4.4 Examples of rule design
14.7.4.4.1 Example 1: Weight
14.7.4.4.2 Example 2: Weight + Guarantee
14.7.4.4.3 Problematic QoS Rule 1
14.7.4.4.4 Problematic QoS Rule 2
14.7.4.4.5 Problematic QoS Rule 3
14.7.4.4.6 Problematic QoS Rule 4
14.8 More about clish and mgmt_cli
14.9 CoreXL / Dynamic Dispatcher and SecureXL
14.9.1 CoreXL / Dynamic Dispatcher
14.9.2 SecureXL
14.10 Default users and roles in Gaia.
14.11 Introduction to Mobile Access
14.12 Smart Event Automatic Reactions
14.13 CPUSE (Check Point Update Service Engine)
14.14 Check Point ThreatCloud
14.15 VRRP (Virtual Router Redundancy Protocol)

 

更多綜合課程
  攝影課程
  • 攝影初級
  • 攝影中級 (風景專題)
  英文課程
  • IPA 拼音:級別 1 2 3 4
  普通話課程
  • 基礎普通話拼音 (免費)
  • 進階普通話拼音
  • 普通話會話:級別 1 2 3
  西班牙語文課程
  • 級別 1 2 3
  中醫課程
  • 濕疹與皮膚敏感病
  • 暗瘡與色斑 | 鼻敏感與感冒
  • 脫髮與白髮 | 從五官看健康
  風水命理課程
  • 紫微斗數:級別 1 2 3
  • 子平八字:級別 1 2 3
  • 八字風水:級別 1 2 3
  • 奇門遁甲:級別 1 2 3