Check Point Certified Security Expert (CCSE)andTroubleshooting Expert (CCTE) Bundle
This bundle course covers the following two Check Point training courses:
Check Point Certified Security Expert (CCSE) R81.x (3 days)
Check Point Certified Troubleshooting Expert (CCTE) R81.x (2 days)
- Technical professionals who support, install deploy or administer Check Point products.
- Security experts and Check Point resellers who desire to obtain the necessary knowledge required to perform more advanced troubleshooting skills while managing their security environments.
- Provide an overview of the upgrade service and options available.
- Explain how to perform management upgrade and migration.
- Articulate the process using CPUSE features.
- Articulate the purpose and function of Management High Availability.
- Explain Primary vs Secondary, Active vs Standby and Synchronization.
- Explain disaster recovery steps in case the primary management server becomes unavailable.
- Provide overview of Central Deployment in SmartConsole.
- Articulate an understanding of Security Gateway cluster upgrade methods.
- Explain about Multi Version Cluster (MVC) upgrades.
- Discuss Gaia Commands and how they are used.
- Explain the main processes on Security Management Servers and Security Gateways.
- Describe how to work with scripts and SmartTasks to configure automatic actions.
- Explain the Management Data Plane Separation (MDPS).
- Explain kernel operations and traffic flow.
- Articulate Dynamic and Updatable Objects in Security Gateways.
- Explain the policy installation flow and files used.
- Describe the use of policy installation history.
- Explain concurrent and accelerated install policy.
- Describe an overview of APIs and ways to use and authenticate.
- Explain how to make changes in GAIA and management configuration.
- Explain how to install policy using API.
- Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance.
- Describe how the CoreXL acceleration technology enhances and improves Security Gateway performance.
- Articulate how utilizing multiple traffic queues can make traffic handling more efficient.
- Discuss Site-to-Site VPN basics, deployment and communities.
- Describe how to analyze and interpret VPN tunnel traffic.
- Explain Link Selection and ISP Redundancy options.
- Explain tunnel management features.
- Discuss Check Point Remote Access solutions and how they differ from each other.
- Describe how client security can be provided by Remote Access.
- Explain authentication methods including machine authentication.
- Explain Multiple Entry Point (MEP).
- Discuss the Mobile Access Software Blade and how it secures communication and data exchange during remote connections.
- Describe Mobile Access deployment options.
- Discuss various features in Mobile Access like Portals, Link Translation, running Native Applications, Reverse Proxy and more.
- Explain basic concepts of Clustering and ClusterXL.
- Explain about Cluster Control Protocol (CCP) and synchronization.
- Describe advanced ClusterXL functions and modes like Load Sharing, Active-Active, VMAC mode etc.
- Discuss Cluster Correction Layer (CCL) to provide connection stickyness.
- Advanced Logs and Monitoring
- Explain how to determine if the configuration is compliant with the best practices.
- Explain how to set action items to meet the compliance.
- Discuss how SmartEvent functions to identify critical security issues.
- Demonstrate understanding how to use advanced troubleshooting ; tools and techniques including: Interpreting diagnostic data with ; CPInfo, Collecting and reading statistical data using CPView, and ; Advanced troubleshooting risks.
- Describe the use of Logs and SmartEvent in troubleshooting.
- Describe the log indexing system and issues that can occur.
- Discuss methods to troubleshoot log indexing in SmartLog and SmartEvent.
- Explain the databases used in Security Management operations.
- Identify common troubleshooting database issues.
- Discuss Management Processes.
- Demonstrate understanding of advance troubleshooting tools ;and techniques including: How the kernel handles traffic, How to troubleshoot issues using chain modules, How to use the two main procedures for debugging the Firewall kernel, and How the two main procedures for debugging the Firewall kernel differ.
- Demonstrate understanding of user mode debugging, including ; collecting and interpreting process debugs.Debug user mode processes.
- Discuss advanced Identity awareness troubleshooting.
- Learn to run debugs on Identity Awareness.
- Explain Unifed Access Control flow and processes.
- Explain Access Control kernel debugs.
- Describe Access Control process debugs.
- Explain basic and advanced Site-to-Site VPN troubleshooting tools and techniques, including: Packet captures, IKE debugs, and VPN process debugs.
- Explain Client-to-Site VPN troubleshooting tools and techniques, including: Remote access troubleshooting and Mobile access troubleshooting.