Check Point Certified Security Master R80 (CCSM R80) – Outline

Detailed Course Outline

  • Firewall-1 administration and infrastructure review
  • How policy changes impact chain module behavior
  • Identify management issues and problems with commands
  • Use commands to troubleshoot NAT stages
  • Configure Manual NAT to define specific rules
  • Use commands to review and clear connections table
  • Modify files to allow traffic through a specific cluster member
  • Locate the source of encryption failures using commands
  • Use commands to verify VPN connectivity
  • Identify any potentially mis-configured VPNs
  • Tune NIC performance
  • Increase size and improve hardware performance
  • Improve load capacity
  • Tune the firewall rule base
  • Reduce load on Rule Base application
  • Improve network performance
  • Improve logging efficiency
  • Use IPS Bypass to manage performance
  • Deploy IPv6 in a local envrionment
  • Identify differences between VPNs
  • Configure VPN Tunnel Interface (VTI)
  • Configure Open Shortest Path First (OSPF)

Labs

  • Evaluate Chain Modules
  • Modify Security Policies
  • Examine how rules and objects affect optimization
  • Troubleshoot Secure Internal Communication issues
  • Identify a mis-configured rule
  • Identify the source of GUI client connectivity problems
  • Improve load capacity through optimization
  • Optimize network performance
  • Configure Manual NAT
  • Troubleshoot ClusterXL and SecureXL
  • Configure IPS to reduce false positives
  • Identify the speed of the system?s CPU
  • Identify connections in the ClusterXL debug file
  • Troubleshoot a mis-configured VPN
  • Identify VPN configuration problems
  • Identify acceleration status of current connections
  • Identify the source of an encryption failure