Logo

Check Point Certified Security Master Course

Ulearn System's Check Point Certified Security Master Course Certification Training Course .


The Check Point Security Master course provides a Review and Practice on a Sample of the Core Troubleshooting and Advanced Configuration skills the Certified Security Master is expected to demonstrate.

Enroll for Check Point Certified Security Master Course Certification Training Course

 

We deliver Check Point Certified Security Master Course Training in classroom and live online classroom modes.

 

Enroll for Check Point Certified Security Master Course Training veracious cities in


Key Features

Training executed completely by practitioners and led by our Principal Consultant and well-renowned information security expert. Case studies and real-life examples to explain key concepts. The trainers are highly certified as well as experienced in Security Assessments.

Course Description

  • What will you gain after this course?

    This course provides you how to troubleshoot the security issues, chain modules, hardware optimization, software tuning, IPv6, Enabling CoreXL and many more.

    Who can apply for this Course?

    System Administrator, System Engineer, Network Administrator

    Syllabus Covered:


    Module – 1: Troubleshoot Security Problems

    Given a Specific Internal or Client Problem, Replicate the Issues in a test environment.

    Given a Specific Internal or Client Problem, Troubleshoot and Correct the Issue.


    Module – 2: Chain Modules

    Use Command fwctl chain to study Chain Module Behavior. Observe how Policy Changesimpact the chain.

    Use the Command fw debug fwm on and Review the file fwm.elg to find such issues as SIC, Mis-Configured Rules, GUI Client Connectivity Problems, and improperly entered information.

    Given a specific Internal or Client need, Analyze and apply the appropriate Hot Fix and evaluate its effectiveness.

    Use Check Point Debugging Tools

    Reading and Identifying fwmonitor Outputs




    Module – 3: NAT

    Use Commands fwctl Debug and fw Monitor to Troubleshoot the NAT stages of Automatic Hide NAT and Automatic Static NAT.

    Configure Manual NAT to define specific rules in unique NAT environments.


    Module – 4:ClusterXL

    Using Commands fwctl Debug and fwctlkdebug Troubleshoot ClusterXL Connectionsfrom information displayed in debug file.

    Use Commands fw tab –t connections and fw tab –t connections –x to reviewand clear connections table.

    Modify file table.def to allow traffic through a specific cluster member. 


    Module – 5: VPN Troubleshooting

    Use Command vpn Debug to locate Source of Encryption Failures.

    Use Command fw Monitor to Verify VPN Connectivity and Identify Potentially Mis-ConfiguredVPN’s.


    Module – 6:SecureXLAcceleration Debugging

    Use Commands fw accel and kernel debug to view Acceleration Tables and Verify Accelerated Connections.


    Module – 7: Hardware Optimization

    Identify the Correct Check Point Hardware/Appliances for a given Scenario

    Performance Tuning and Evaluation of Complex Networks and Technologies

    Scope proper sizing of Hardware based on Customer Requirements

    Use Command ethtool to tune NIC Performance.

    Edit arp cache table to increase size to improve Performance.

    Use Command fwctlpstat to improve Load Capacity.

    Use the fwaccel stat and fwaccel stats outputs to tune the Firewall Rule Base.


    Module – 8: Software Tuning

    Deploy NAT Templates to reduce Load on Rule Base Application.

    Configure Cluster Synchronization Planning to improve Network Performance.

    Identify Performance Limiting Configurations

    Correct and Tune Different Scenarios

    Identify the causes of Performance Limiting Factors (Internal and External Factors)


    Module – 9: Enable CoreXL

    Configure CoreXL for Specific cpu Task Assignment.


    Module – 10: IPS

    Configure IPS to reduce false positives.

    Use Command fwctlzdebug to Improve Logging Efficiency.

    Use IPS Bypass to Improve Performance.



    Module – 11: IPV6

    Deploy IPV6 in a Local Environment


    Module – 12: Advanced VPN

    Identify differences between route-based VPNs and domain-based VPNs.

    Configure VTI for route-based VPN Gateways. 

    Check Point Security Master Study Guide

    Configure OSPF for Dynamic VPN Routing in a Community.

    Identify the Wire Mode Function by testing a VPN Failover.

    Configure Directional VPN Rule Match for Route-Based VPN.


    Module – 13: Dynamic Routing

    Diagnose and Solve Specific Routing Issues in a Network Environment.

    Multicast Design and Troubleshooting PIM Sparse mode and Dense Mode based on GateD and IPSRD

    Design/Troubleshoot OSPF/BGP in GateD and IPSO IPSRD Environments

    Static Routing and Network Topologies




Course Preview

This course covers you the topics with Troubleshooting Security Problems, Chain Modules, NAT, Cluster XL, VPN Troubleshooting, SecureXL Acceleration Debugging, Hardware Optimization, Software tuning, Enable CoreXL, IPS, IPv6, Advanced VPN & Dynamic Routing.+

1-800-102-9602

(Toll Free) Contact Us

Request more information