Checkpoint 80 Training in Nepal

Checkpoint 80 Training

Course Overview
Link Copied!

The Check Point 80 course is offered by Broadway Infosys for individuals seeking to become network security engineers. The course comprises both theoretical and hands-on labs. The topics covered include SmartConsole, firewall policy administration, VPN setup, NAT, and basic troubleshooting. It is a perfect course for any IT student or any IT professional willing to reinforce their knowledge. The classes are very flexible; you can attend evening or weekend classes, and they offer exam prep to help you with certification.

Benefits of Checkpoint 80 Training

  • Gain expertise in unified network security architecture and management
  • Learn to install, configure, and manage Security Gateways in distributed environments
  • Develop hands-on skills in backup, restore, and command-line configuration
  • Master firewall rule creation, policy evaluation, and optimization
  • Configure NAT, VPN tunnels, and secure remote access
  • Use SmartDashboard, SmartView Tracker, and SmartUpdate for real-time monitoring and upgrades
  • Implement Identity Awareness for granular access control
  • Troubleshoot security issues and analyze traffic with packet-level data
  • Prepare for roles in network security administration, infrastructure management, and cybersecurity

Benefits of Checkpoint 80 Training at Broadway Infosys

  • Learn from certified, industry-experienced security professionals
  • Get hands-on training with real-world lab setups and tools
  • Benefit from a structured, globally aligned curriculum
  • Access career support, including internships and job placement assistance
  • Train in a resourceful, interactive, and supportive learning environment
  • Earn a recognized certification to strengthen your cybersecurity career

Our graduates are hired by 350+ companies in Nepal

Time for you to be the next hire. With our advanced and industry relevant courses, you are on the right stage to start your dream career.
Our graduates are hired by

Lesson 1:

  • Describe Check Point's unified approach to network management and the key elements of this architecture.
  • Design a distributed environment using the network detailed in the course topology.
  • Install the Security Gateway version R77 in a distributed environment using the network
  • Detailed in the course topology.
  • Given network specifications, perform a backup and restore the current Gateway installation from the command line.
  • Identify critical files needed to purge or backup, import and export users and groups and add or delete administrators from the command line.
  • Deploy Gateways using sysconfig and cpconfig from the Gateway command line.
  • Given the network topology, create and configure network, host and gateway objects.
  • Verify SIC establishment between the Security Management Server and the Gateway using SmartDashboard.
  • Create a basic Rule Base in SmartDashboard that includes permissions for administrative users, external services, and LAN outbound use.
  • Evaluate existing policies and optimize the rules based on current corporate requirements.
  • Maintain the Security Management Server with scheduled backups and policy versions to
  • Ensure seamless upgrades and minimal downtime.
  • Configure NAT rules on Web and Gateway servers.
  • Use Queries in SmartView Tracker to monitor IPS and common network traffic and troubleshoot events using packet data.
  • Using packet data on a given corporate network, generate reports, troubleshoot system and security issues, and ensure network functionality.
  • Using SmartView Monitor, configure alerts and traffic counters, view a Gateway's status, monitor suspicious activity rules, analyze tunnel activity and monitor remote user access based on corporate requirements.
  • Monitor remote Gateways using SmartUpdate to evaluate the need for upgrades, new installations, and license modifications.
  • Use SmartUpdate to apply upgrade packages to single or multiple VPN-1 Gateways.
  • Upgrade and attach product licenses using SmartUpdate. Centrally manage users to ensure
  • Only authenticated users securely access the corporate network either locally or remotely.
  • Manage users to access to the corporate LAN by using external databases. Use Identity Awareness to provide granular level access to network resources.
  • Acquire user information used by the Security Gateway to control access.
  • Define Access Roles for use in an Identity Awareness rule.
  • Implementing Identity Awareness in the Firewall Rule Base
  • Configure a pre-shared secret site-to-site VPN with partner sites.
  • Configure permanent tunnels for remote access to corporate resources.
  • Configure VPN tunnel sharing, given the difference between host-based, subunit-based and
  • gateway-based tunnels.
  • Resolve security administration issues.
Earn a High Value Industry Certificate

Add this credential to your LinkedIn profile, resume, or CV to stand out to recruiters.