Example Curriculum
Available in
days
days
after you enroll
- Introduction of Checkpoint Firewall_1 (19:40)
- Checkpoint Operating System_2 (31:50)
- Default Behaviour of Firewall_1 (9:17)
- Checkpoint Lap Part 1_2 (30:20)
- Checkpoint Lap Part 2_3 (34:12)
- Global properties & Anti-Spoofing_1 (16:33)
- Task Revert to Revision_2 (21:12)
- System Backup in Gala_3 (11:14)
- Discussion (12:55)
- Network Address Translation (NAT) & Suspicious Activity Monitoring (SAM) Database Part 1 (31:03)
- Network Address Translation (NAT) & Suspicious Activity Monitoring (SAM) Database Part 2 (25:19)
- 1. URL Filtering (21:05)
- 1HTTPS Inspection (29:32)
- 2. How to Configure Inline Policies (21:03)
- 2. Secure Sockets Layer (SSL) (31:56)
- 1. Configure Firewall to Act as CA (31:13)
- 1. VPN Deployments (15:35)
- 2. Understanding VPN Components & Architecture (35:25)
- 1. How to configure Site to Site VPN Part-1 (34:28)
- 2. How to configure Site to Site VPN Part-2 (25:13)
- 1. Remote Access VPN & Identity Awareness (14:37)
- 1. Practical for user identification (32:00)
- 1. High Availability (25:37)
- Virtual System (VSX), Threat Prevention, Secure XL & Core XL, Policy Based Routing (PBR) (18:47)
- Troubleshooting (17:27)
This Course includes In
Check your inbox to confirm your subscription