Learning with Check Point

Learning with Check Point

Greetings to the readers of our blog from TS Solution, autumn has come, which means it's time to learn and learn something new for yourself. The regular audience is well aware that we pay great attention to products from Check Point, this is a large number of solutions for the comprehensive protection of your infrastructure. Today we will collect in one place the recommended and available cycles of articles and courses, make yourself comfortable, there will be mainly links to sources. 

Materials from TS Solution

Perhaps the primary and mandatory course, specially prepared in order to learn the basics of working with NGFW Check Point. It covers the functionality and goes into detail on the basic setup and administration steps. Recommended for familiarization with the initial level of training.

Check Point Getting Started R80.20

  1. Check Point Getting Started R80.20. Introduction

  2. Check Point Getting Started R80.20. Solution architecture

  3. Check Point Getting Started R80.20. Layout preparation

  4. Check Point Getting Started R80.20. Installation and initialization

  5. Check Point Getting Started R80.20. Gaia & CLI

  6. Check Point Getting Started R80.20. Getting started in SmartConsole

  7. Check Point Getting Started R80.20. Access control

  8. Check Point Getting Started R80.20. NAT

  9. Check Point Getting Started R80.20. Application Control & URL Filtering

  10. Check Point Getting Started R80.20. Identity Awareness

  11. Check Point Getting Started R80.20. Threat Prevention Policy

  12. Check Point Getting Started R80.20. Logs & Reports

  13. Check Point Getting Started R80.20. Licensing

After passing Check Point Getting Started, you may have a lot of questions in your head that need to be answered - this is a good reaction. Especially for the most curious and those who want to protect the infrastructure as much as possible, the following course has been prepared. It covers the "Best Practices" for configuring your NGFW (tuning the security profile, using stricter policies, best practices). Recommended for intermediate level students. 

Check Point to the maximum

  1. Check Point to the max. The Human Factor in Information Security

  2. Check Point to the max. HTTPS Inspection

  3. Check Point to the max. Content Awareness

  4. Check Point to the max. Checking Anti-Virus with Kali Linux

  5. Check Point to the max. IPS. Part 1

  6. Check Point to the max. IPS. Part 2

  7. Check Point to the max. Sandboxing

  8. How to improve network perimeter protection? Practical recommendations for Check Point and beyond

  9. Checklist for Check Point Security Settings

Current trends require network administrators or information security specialists to be able to organize remote access for employees. The Check Point Remote Access VPN course is about just that, it goes into great detail about the concept of VPN in the Check Point architecture, provides basic deployment scenarios, and explains the licensing procedure. Recommended for review after completing the course Check Point Getting Started.

Check Point Remote Access VPN

  1. Introduction

  2. Check Point RA VPN - Technology Brief

  3. Stand preparation (layout)

  4. Installation and basic configuration of the Check Point Gateway

  5. IPSec VPN

  6. SSL VPN (Mobile Access Portal)

  7. VPN for Android/iOS

  8. Two-factor authentication

  9. Secure Remote, L2TP

  10. Remote user monitoring

  11. Licensing

The next series of articles will introduce you to the latest 1500-series NGFW of the SMB family, it covers: device initialization process, initial configuration, wireless communication, types of management. Recommended reading for everyone.

Check Point NGFW (SMB)

  1. New line of CheckPoint 1500 Security Gateways

  2. Unpacking and setup

  3. Wireless data transmission: WiFi and LTE

  4. VPN

  5. SMP cloud management

  6. Smart-1 Cloud

  7. Tuning and general recommendations

The long-awaited series of articles on protecting the personal places of company users using the solution  Check Point Sandblast Agent and a new cloud management system - SandBlast Agent Management Platform. All the information presented is up-to-date, the stages of deployment, configuration and management are analyzed in detail, and the topic of licensing is also touched upon.

Check Point SandBlast Agent Management Platform

  1. Review

  2. Web Based Management Interface and Agent Installation

  3. Threat Prevention Policy

  4. Data Protection Policy. Deployment and Global Policy Setting

  5. Logs, Reports & Forensics. Threat Hunting

Investigation of information security incidents is a separate world of incidents, in a series of articles we analyzed specific events in different Check Point products (SandBlast Network, Sandblast Agent, Sandblast Mobile, CloudGuard SaaS).

Check Point Forensics

  1. Malware Analysis with Check Point Forensics. SandBlast Network

  2. Malware Analysis with Check Point Forensics. Sandblast Agent

  3. Malware analysis using Check Point forensics. SandBlast Mobile

  4. Malware analysis using Check Point forensics. CloudGuard SaaS

THE NOTE:

More material about Check Point products from TS Solution on link, write in the comments, if there is a need for a cycle, we will consider your request. 

External Sources

We recommend that you pay attention to the Udemy platform, where the vendor itself (Check Point) has posted free full-fledged courses:

Check Point Jump Start: Network Security

Link: https://www.udemy.com/course/checkpoint-jump-start/

Includes modules:

  1. Introduction to the Check Point Solution

  2. Deploying Check Point Security Management

  3. Deploying Check Point Security Gateways

  4. Creating a Security Policy

  5. Logs and Monitoring

  6. Support, Documentation, and Training

Additionally, it is proposed to take the Pearson Vue exam (#156-411).

Check Point Jump Start: Maestro part 1,2

Link:

https://www.udemy.com/course/check-point-jump-start-maestro-part-1/

https://www.udemy.com/course/check-point-jump-start-maestro-part-2/

The course talks about building a fault-tolerant and highly loaded Maestro complex, knowledge of the basics of NGFW, as well as network technologies, is recommended.

Check Point Jump Start: SMB Appliance Network Security

URL:

https://www.udemy.com/course/check-point-jump-start-smb-appliance/

A new course from Check Point for the SMB family, impressive content speaks of the depth of study:

  1. Introduction

  2. What's New

  3. Standalone Deployment

  4. Logging and Monitoring

  5. Features and Functionality

  6. Clustering

  7. HTTPS-SSL Inspection

  8. Central Management

  9. Threat Emulation

  10. Security Management Portal

  11. Zero Touch and Reach My Device

  12. VPN and Certificates

  13. Watchtower Mobile App

  14. VoIP

  15. DDOS

  16. Cloud Services and SD-WAN

  17. API

  18. Troubleshooting

Recommended for familiarization without any special requirements for the level of training. About the ability to control NGFW using a mobile device in the WatchTower application, we wrote in article.

THE NOTE:

Additionally, the same author's courses can be found on other educational platforms, all information on link.

Instead of a conclusion

Today we reviewed free training courses and a series of articles, keep it bookmarked and stay with us, there is a lot of interesting things ahead.

A large selection of materials on Check Point from TS Solution. Stay tuned (TelegramFacebookVKTS Solution BlogYandex.Zen).

Source: habr.com

Add a comment