Check Point: description

Courses

WHO SHOULD ATTEND? Technical professionals who support, install, deploy or administer Check Point Software Blades. COURSE GOAL: Provide an understanding of basic concepts and skills necessary to configure Check Point vSEC products for use in Amazon Web Services.
Join our advanced 3-day course that will cover everything you need to implement, configure and manage daily operations of Check Point 61000/41000 appliances. In this training, participants will acquire in-depth knowledge of the 61K/41K architecture, technologies used, and the methodologies and tools to implement it. The course also includes hands-on labs.
ADVANCED TROUBLESHOOTING FOR FIREWALL CORE: Provided by Check Point Professional Services Instructors Join our advanced 3-day course to learn how to effectively troubleshoot Check Point Software Security Systems. This course includes hands-on labs using real examples pulled from Check Point Software Support cases and Professional Services projects.
Join our advanced 3-day course that will cover everything you need to implement, configure and manage daily operations of Check Point Virtual System Extension environments. In this training, participants will acquire in-depth knowledge of VSX architecture, technologies used, and the methodologies and tools to implement it. The course also includes hands-on labs.
This exciting new offering is a 2-day Specialist course which provides a comprehensive understanding of automation and the Check Point’s Management API architecture. It presents advanced concepts in subjects such as how to create and execute automated scripts to perform R80 Security Management tasks. Students will experience how to use a variety of methods to execute API commands and how to use automation tools to create a self-service portal to enhance their Check Point security solution.The Check Point Automation Specialist course is the first of a series of Specialist-designated courses to be released. These courses serve to help build the student’s knowledge of Check Point products and services, and introduces emerging technologies and advanced concepts not covered in our core curriculum.
Expert users and resellers who need to perform advanced deployment configurations of Check Point Software Blades.Validate your understanding and skills necessary to configure and optimally manage Check Point Next Generation Firewalls.
Discover the world of Pen Testing Begin your journey with proven hacking techniques. This class trains IT professionals in the skills of Pen Testing. You will become familiar with the risks and vulnerabilities of corporate networks. You will learn hacking skills for: Systems Networks Web Applications Reverse software engineering
This class continues the Art of Web Hacking series The class covers a wide range of offensive hacking techniques. The curriculum was written by real penetration testers with a world-wide reputation (BlackHat, AppSec, OWASP, Defcon). The Advanced Infrastructure Hacking class is designed for those who want to enrich their knowledge. The fast-paced class teaches: Hacking techniques to compromise operating systems and networking devices Advanced penetration techniques to achieve exploitation Hacking domain controllers to local root, VLAN hopping and VoIP hacking
This fastpaced class gives attendees an insight into advanced AppSec topics. The class curriculum is split into two: 3 days of Server Side Flaws. 2 days of Client Side Flaws
The ideal introductory/intermediate training class designed to teach the fundamentals of what pen testing is all about. This hands-on training was written to address the market need around the world for a real hands-on, practical and hack-lab experience that focuses on what is really needed when conducting a penetration test. Whilst a variety of tools are used, they are the key tools that should be in any penetration tester’s kit bag. This, when combined with a sharp focus on methodology will give you what is necessary to start or formalise your testing career.
This curriculum covers the fundamentals of Malware AnalysisMalware is one the major challenges facing the security industry today. It plays a critical role in high profile targeted attacks, such as the breach at Sony entertainment, as well as large, indiscriminate outbreaks, such as WannaCry.
This curriculum introduces you to Web Application Hacking.Practical focusLearn how web application security flaws are foundDiscover leading industry standards and approachesUse this foundation to enhance your knowledgePrepare for more advanced web application topics
5-day advanced course teaches how to design, install, configure and manage Multi-Domain Security Management with Virtual System Extension
GETTING A STEP AHEAD OF THE UNKNOWN Zero-day and advanced persistent threats use the element of surprise to bypass traditional security, making these threats difficult to protect against—and very popular with hackers. Traditional sandboxing was designed to help with these types of threats, but cybercriminals have evolved their techniques, creating evasive malware that can avoid detection by many sandbox solutions. As a result, many organizations find themselves taking reactive steps to counteract infection, rather than preventing it in the first place. To get ahead, enterprises need a multi-faceted prevention strategy that combines proactive protection that eliminates threats before they reach users, and state-of-the-art CPU-level exploit detection to expose even the most highly camouflaged threats.COURSE GOAL: Provide an understanding of basic concepts and skills necessary to configure and implement Check Point SandBlast technology
Check Point Security Administration R80 provides an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades