Introducing Threat Prevention and Securing the Web Training Check Point Certification Trainings 2-day instructor-led course teaches how to fight today’s evolving security threats with Check Point’s Next
Generation Threat Prevention and Secure Web Gateway solutions. Learn how to activate Application Control, URL Filtering, Identity Awareness, IPS, Anti-Bot, and Anti-Virus protections through guided discussion and hands-on practice Persons attending this course should have 6 months experience working with Check Point security gateways; CCSA certification or equivalent knowledge, and general knowledge of TCP/IP, Windows and/or Unix, network technology and the Internet.

Prerequisites
Persons attending this course should have 6 months experience working with Check Point security gateways; CCSA certification or equivalent knowledge, and general knowledge of TCP/IP,
Windows and/or Unix, network technology and the Internet.

Course Objectives

  • Identify the Application Control Software Blade as part of a total
    security management solution.
  • Identify and address Web 2.0 application access issues including
    malware threats, bandwidth impact issues and productivity
    loss
  • Identify important aspects of Application Awareness blade
    management including how to detect and control application
    usage and educate users
  • Monitor all Facebook and Facebook Application traffic in your
    organization
  • Block YouTube and other streaming media applications
  • Update your local Application Database with the most recently
    added data and applications
  • View all current activity occurring in the Application Control Rule
    Base
  • Identify the IPS Software Blade as part of a total security management
    solution
  • Identify and address strategies for implementing the Check Point Intrusion Prevention software blade including sandbox mode, status at a glance and unified management
  • Identify important aspects of IPS software blade management including testing and deployment and activation of protections
  • Enable Identity Awareness on a gateway together with Application Control to create policy rules
  • Discuss the Threat landscape
  • Discuss how SensorNET collects and analyzes attack information
  • Understand the anatomy of a Bot
  • Discuss how Bots are used in an attack
  • Learn how Bots infect your computer
  • Explain how the Antivirus Software Blade stops incoming malicious
    files
  • Describe Check Point’s data mining process
  • Know how to leverage the ThreatWiki
  • Discuss the challenges and benefits of log management
    Describe how SmartLog transforms data into security intelligence

If you have questions related to the course minimum requirements being met, please email training@checkpoint.com  with the course date and location as the subject.

]]>
Seating is Limited. Register Today! 2013/12/02 2013/12/03 09 00 17 00 CET SEC Datacom A/S Gydevang 17-19 Allerød, Denmark 3450 #01539d #0b326e Partner Training