- Home
- Courses
- Курсове с Инструктор
- Check Point
- CCSE – Check Point Certified Security Expert (CCSE) R81.20
CCSE – Check Point Certified Security Expert (CCSE) R81.20
- 18 (Registered)
-
(0 Reviews)
Curriculum
- 14 Sections
- 94 Lessons
- 999 Weeks
Expand all sectionsCollapse all sections
- Preface: Check Point Certified Security Expert4
- Chapter 1: Management Upgrade and Migration10
- 2.1Upgrading Security Management ServersCopy
- 2.2Upgrade / Download WizardCopy
- 2.3Check Point Upgrade Service Engine (CPUSE)Copy
- 2.4CPUSE Upgrade MethodCopy
- 2.5Advanced Upgrade with Database MigrationCopy
- 2.6CPUSE Upgrade MethodCopy
- 2.7Advanced Upgrade with Database MigrationCopy
- 2.8Installing Hotfixes and Major Version UpgradesCopy
- 2.9Lab 1.1 Preparing for a Security Management Server UpgradeCopy
- 2.10Lab 1.2 Upgrading the Security Management ServerCopy
- Chapter 2: Management High Availability4
- Chapter 3: Security Gateway Upgrade5
- Chapter 4: Advanced Check Point Maintenance6
- Chapter 5: Security Gateway Operations7
- Chapter 6: Policy Installation3
- Chapter 7: Gaia and Management APIs4
- Chapter 8: Acceleration4
- Chapter 9: Site- to- Site VPN9
- 10.1369 Introduction to VPN 370 Internet Key Exchange (IKE)Copy
- 10.2Site- to- Site VPNCopy
- 10.3VPN CommunitiesCopy
- 10.4Domain Based VPNCopy
- 10.5Access Control for VPN TrafficCopy
- 10.6Configuring Site- to- Site VPNCopy
- 10.7Externally Managed Certificate AuthenticationCopy
- 10.8Lab 9.1 Configuring a Locally Managed Site- to- Site VPNCopy
- 10.9Lab 9.2 Configuring a Site- to- Site VPN with an Interoperable DeviceCopy
- Chapter 10: Remote Access VPN11
- 11.1Introduction to Remote Access VPNCopy
- 11.2AuthenticationCopy
- 11.3Remote Access ClientsCopy
- 11.4License RequirementsCopy
- 11.5Client to Gateway Communication ChallengesCopy
- 11.6Secure Configuration VerificationCopy
- 11.7Desktop SecurityCopy
- 11.8Multiple Entry Point (MEP) for Remote AccessCopy
- 11.9SSL Network ExtenderCopy
- 11.10Configuring Remote Access VPNCopy
- 11.11Lab 10.1 Configuring Remote Access VPNCopy
- Chapter 11: Mobile Access VPN6
- Chapter 12: Clustering13
- 13.1Introduction to Cluster and ClusterXLCopy
- 13.2ClusterXLCopy
- 13.3Virtual IP AddressesCopy
- 13.4Virtual MAC Addresses (VMAC)Copy
- 13.5Cluster SynchronizationCopy
- 13.6Cluster Failover and Status CommandsCopy
- 13.7Cluster Traffic FlowsCopy
- 13.8Cluster Control Protocol (CCP)Copy
- 13.9Sticky ConnectionsCopy
- 13.10Configuring a Security Gateway ClusterCopy
- 13.11NAT and Proxy ARP for ClustersCopy
- 13.12Lab 12.1 Configuring a High Availability ClusterCopy
- 13.13Lab 12.2 Working with ClusterXLCopy
- Chapter 13: Advanced Logs and Monitoring8
Lab 13.1 Configuring Policy ComplianceCopy
Prev