Check Point 2 – Check Point Security Administration NGX II

Enquire/Book this course

  • This field is for validation purposes and should be left unchanged.
Print this page
  • Code: Check Point 2
  • Duration: Days 3
  • Price per delegate: £1,850 +VAT

Trained over 60000 delegates

Course delivered by industry expert instructors

Highly competitive pricing

 

Course Prerequisites:

Check Point Security Administration NGX I, or equivalent knowledge and experience

Course Overview:

Check Point Security Administration NGX II is intended to provide an understanding of upgrading and advanced configuration of VPN-1 NGX, installing and managing VPN-1 NGX (on both internal and external networks), gaining the maximum security from Security Gateways, and resolving Security Gateway performance issues.

Take this class if:

You are a systems administrator, security manager, or network engineer implementing VPN-1 NGX for VPN deployments
Want to earn Check Point Certified Security Expert (CCSE NGX) NGX certification

You will learn:

  • How to use NGX tools to install VPN-1 NGX on Windows Server 2003 and SecurePlatform
  • How to use NGX tools to upgrade to VPN-1 NGX, from VPN-1/FireWall-1 NG or VPN-1 NG with Application Intelligence
  • How to distribute content security to Security Gateways, screen URLs and block suspicious Web data, and provide auditing capabilities and detailed reports
  • How to configure VPNs, using IKE encryption and Check Point's simplified VPN setup
  • How to use VPN-1 SecuRemote/SecureClient to configure remote access
  • How to configure VPN-1 NGX to allow VoIP traffic to pass through a corporate Security Gateway
  • How to allocate bandwidth, given a variety of Check Point QoS configurations
  • How to identify the features and limitations of Check Point High Availability solutions

Exercises:

  • Upgrading NG with AI R55 to VPN-1 NGX
  • Installing VPN-1 NGX in a distributed deployment
  • Installing VPN-1 Pro Gateway on SecurePlatform Pro
  • Screening a URL by file
  • Two-gateway IKE encryption configuration (using a shared secret)
  • Two-gateway IKE encryption configuration (using Certificates)
  • Configuring remote access in an IKE VPN
  • Installing VPN-1 SecuRemote
  • Using VPN-1 SecuRemote in an IKE VPN
  • Implementing Office Mode
  • Configuring a gateway for VoIP communications
  • Configuring a Check Point QoS Policy
  • Deploying Management High Availability
  • Deploying New Mode High Availability
  • Configuring Load Sharing