Les titulaires des certifications Check Point sont experts dans la technologie de sécurisation d’Internet des entreprises Fortune et Global 100. La certification Check Point vous permet notamment d’obtenir les compétences nécessaires pour vendre les produits Check Point et assurer leur support, d’accéder à la base de données SecureKnowledge pendant 2 ans et de consulter la documentation produit avancée..

Sélectionnez ci-dessous votre domaine de certification et consultez la liste des formations associées :

Quel parcours de certification choisir ?

Contactez-nous dès maintenant, nos conseillers en formation se feront un plaisir de vous aider.

Affiner la Refcherche

Cours

La formation Check Point Security Administration R80 est la première étape qui vous permettra d’acquérir la compréhension ainsi que les compétences nécessaires à la configuration des firewalls Check Point et de leurs fonctionnalités.Cette formation prépare à la certification CCSA.
L’objectif de cette formation et de valider votre compréhension et compétences nécessaires à la configuration et à l’administration des firewalls next génération Check Point.Cette formation fait suite à la formation CCSA et prépare à la certification CCSE.
This class continues the Art of Web Hacking series The class covers a wide range of offensive hacking techniques. The curriculum was written by real penetration testers with a world-wide reputation (BlackHat, AppSec, OWASP, Defcon). The Advanced Infrastructure Hacking class is designed for those who want to enrich their knowledge. The fast-paced class teaches: Hacking techniques to compromise operating systems and networking devices Advanced penetration techniques to achieve exploitation Hacking domain controllers to local root, VLAN hopping and VoIP hacking
This fastpaced class gives attendees an insight into advanced AppSec topics. The class curriculum is split into two: 3 days of Server Side Flaws. 2 days of Client Side Flaws
The ideal introductory/intermediate training class designed to teach the fundamentals of what pen testing is all about. This hands-on training was written to address the market need around the world for a real hands-on, practical and hack-lab experience that focuses on what is really needed when conducting a penetration test. Whilst a variety of tools are used, they are the key tools that should be in any penetration tester’s kit bag. This, when combined with a sharp focus on methodology will give you what is necessary to start or formalise your testing career.
This curriculum introduces you to Web Application Hacking.Practical focusLearn how web application security flaws are found. Discover leading industry standards and approachesUse this foundation to enhance your knowledge. Prepare for more advanced web application topics
Zero-day and advanced persistent threats use the element of surprise to bypass traditional security, making these threats difficult to protect against—and very popular with hackers. Traditional sandboxing was designed to help with these types of threats, but cybercriminals have evolved their techniques, creating evasive malware that can avoid detection by many sandbox solutions. As a result, many organizations find themselves taking reactive steps to counteract infection, rather than preventing it in the first place. To get ahead, enterprises need a multi-faceted prevention strategy that combines proactive protection that eliminates threats before they reach users, and state-of-the-art CPU-level exploit detection to expose even the most highly camouflaged threats.
Check Point Security Administration R77 explore les concepts et les compétences de base nécessaires pour configurer les passerelles Check Point Security Gateway et les lames logicielles (Software Blades) de gestion.
Check Point Security Engineering est une formation de niveau avancé, qui s’étend sur trois jours. Elle explique comment concevoir, modifier, déployer et dépanner efficacement des systèmes Check Point Security exécutés sous le système d’exploitation Gaia.
WHO SHOULD ATTENDThis course is for customers and partners who want to learn the advanced skills to troubleshoot and configure Check Point Security Gateway and Management Software Blades:System Administrators Security Engineers Network Engineers CCSEs seeking higher certification