- Home
- Courses
- Курсове с Инструктор
- Check Point
- CheckPoint CCSA CCSE Bootcamp (CCSA-CCSE-Bootcamp) R81.10
CheckPoint CCSA CCSE Bootcamp (CCSA-CCSE-Bootcamp) R81.10
- 0 (Registered)
-
(0 Reviews)
Curriculum
- 25 Sections
- 148 Lessons
- 999 Weeks
Expand all sectionsCollapse all sections
- Chapter 1: Introduction to Check Point Technology3
- Chapter 2: Introduction to Check Point Deployment5
- Chapter 3: Check Point Security Management Operations6
- Chapter 4: Check Point Licensing4
- Chapter 5: Security Policy Management8
- Chapter 6: Policy Layers4
- Chapter 7: Application Control & URL Filtering6
- Chapter 8: User Access Management8
- Chapter 9: Network Address Translation3
- Chapter 10: Traffic Visibility3
- Chapter 11: Monitoring System States2
- Chapter 12: Threat Prevention7
- Chapter 13: Management Upgrade and Migration8
- 14.1Upgrading Security Management Servers
- 14.2Upgrade / Download Wizard
- 14.3Check Point Upgrade Service Engine (CPUSE)
- 14.4CPUSE Upgrade Method
- 14.5Advanced Upgrade with Database Migration
- 14.6Installing Hotfixes and Major Version Upgrades
- 14.7Lab 13.1: Preparing for a Security Management Server Upgrade
- 14.8Lab 13.2: Upgrading the Security Management Server
- Chapter 14: Management High Availability4
- Chapter 15: Security Gateway Upgrade5
- Chapter 16: Advanced Check Point Maintenance6
- Chapter 17: Security Gateway Operations7
- Chapter 18: Policy Installation3
- Chapter 19: Gaia and Management APIs4
- Chapter 20: Acceleration4
- Chapter 21: Site-to-Site VPN10
- 22.1Introduction to VPN
- 22.2Internet Key Exchange (IKE)
- 22.3Site-to-Site VPN
- 22.4VPN Communities
- 22.5Domain Based VPN
- 22.6Access Control for VPN Traffic
- 22.7Configuring Site-to-Site VPN
- 22.8Externally Managed Certificate Authentication
- 22.9Lab 21.1: Configuring a Locally Managed Site-to-Site
- 22.10Lab 21.2: Configuring a Site-to-Site VPN with an Interoperable Device
- Chapter 22: Remote Access VPN11
- 23.1Introduction to Remote Access VPN
- 23.2Authentication
- 23.3Remote Access Clients
- 23.4License Requirements
- 23.5Client to Gateway Communication Challenges
- 23.6Secure Configuration Verification
- 23.7Desktop Security
- 23.8Multiple Entry Point (MEP) for Remote Access
- 23.9SSL Network Extender
- 23.10Configuring Remote Access VPN
- 23.11Lab 22.1: Configuring Remote Access VPN
- Chapter 23: Mobile Access VPN6
- Chapter 24: Clustering13
- 25.1Introduction to Cluster and ClusterXL
- 25.2ClusterXL
- 25.3Virtual IP Addresses
- 25.4Virtual MAC Addresses (VMAC)
- 25.5Cluster Synchronization
- 25.6Cluster Failover and Status Commands
- 25.7Cluster Traffic Flows
- 25.8Cluster Control Protocol (CCP)
- 25.9Sticky Connections
- 25.10Configuring a Security Gateway Cluster
- 25.11NAT and Proxy ARP for Clusters
- 25.12Lab 24.1: Configuring a High Availability Cluster
- 25.13Lab 24.2: Working with ClusterXL
- Chapter 25: Advanced Logs and Monitoring8