Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Checkpoint Firewall Selfpaced
Videos
Introduction of Checkpoint Firewall_1 (19:40)
Checkpoint Operating System_2 (31:50)
Default Behaviour of Firewall_1 (9:17)
Checkpoint Lap Part 1_2 (30:20)
Checkpoint Lap Part 2_3 (34:12)
Global properties & Anti-Spoofing_1 (16:33)
Task Revert to Revision_2 (21:12)
System Backup in Gala_3 (11:14)
Discussion (12:55)
Network Address Translation (NAT) & Suspicious Activity Monitoring (SAM) Database Part 1 (31:03)
Network Address Translation (NAT) & Suspicious Activity Monitoring (SAM) Database Part 2 (25:19)
1. URL Filtering (21:05)
1HTTPS Inspection (29:32)
2. How to Configure Inline Policies (21:03)
2. Secure Sockets Layer (SSL) (31:56)
1. Configure Firewall to Act as CA (31:13)
1. VPN Deployments (15:35)
2. Understanding VPN Components & Architecture (35:25)
1. How to configure Site to Site VPN Part-1 (34:28)
2. How to configure Site to Site VPN Part-2 (25:13)
1. Remote Access VPN & Identity Awareness (14:37)
1. Practical for user identification (32:00)
1. High Availability (25:37)
Virtual System (VSX), Threat Prevention, Secure XL & Core XL, Policy Based Routing (PBR) (18:47)
Troubleshooting (17:27)
1. Remote Access VPN & Identity Awareness
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock