Head Office : 233 S. Wacker Drive 84th Floor Chicago.
Branch Office : 6th Floor, Astralheights
Panjagutta ,HYD.
+1 (312) 637-8777 ext:100
+91 7995243645
Home - Training- Online-Training- Checkpoint Firewall

Checkpoint Firewall

Checkpoint Firewall Training-online

"This is our premium online offering. The instructor will exclusively teach Online Premium students in a live Webex session. Course times are optimised for students from the USA, Europe, Australia and the Middle East. Online lab access is available to practice exercises and instructor will be on hand to help students through the exercises. Course timings and content can also be customised as per requirements (charges extra)."

With the evolution of the Internet, everyone is connected everywhere. This raises serious concerns for organizations trying to protect their confidential and critical data. Corporate Networks also need to be protected from various threats like Viruses, Malicious Software (Malware), Trojans, Spyware, Spam etc. A Network Administrator needs to be constant aware of the threats to the organization's network and data and protect these by proactive deployment of firewalls and intrusion prevention systems.
The Firewall Course offered by Zoom Technologies will enable you to handle these challenges with ease and protect your valuable data.

Course Outline

  •   Introduction to Checkpoint firewall
  •   Discussion on the modular nature of Checkpoint firewall
  •   Functionalities of Management, FW-1 & GUI modules
  •   Types of Checkpoint installation
  •   Hardware platform
  •   Checkpoint Rule base
  •   IP spoofing
  •   Installation of Checkpoint R77 GAIA
  •   Initial configuration of R77 GAIA
  •   Web access to Checkpoint
  •   Download & Installation of smart console
  •   Accessing Checkpoint through smart dashboard
  •   Checkpoint objects description
  •   Anti-spoofing configuration
  •   Network Address Translaion
  •   Hide NAT
  •   Static NAT
  •   Filter Configuration
  •   Monitoring Traffic and Connections
  •   URL Filtering
  •   Antivirus inspection
  •   Content Analysis
  •   Identity Awareness
  •   Reporting tools, deployment options and features
  •   User Management and Authentication User Authentication
  •   User Authentication
  •   Session Authentication
  •   Client Authentication
  •   Intrusion Prevention System
  •   Backup & Restore of configuration
  •   Advanced and in-depth explanation of Check Point firewall technology
  •   Key tips and techniques for troubleshooting Check Point firewall
  •   technology
  •   Advanced upgrading concepts and practices


My wishlist

Main Color

Body Layout

Body Background