Szkolenia Check Point

Cel szkolenia szkolenie zdalne - dlearning

This course provides an understanding of basic concepts and skills necessary to configure Check Point vSEC products for use in Amazon Web Services.


Technical professionals who support, install, deploy or administer Check Point Software Blades.


  • Understand cloud computing and the advantages of deploying resources into a virtualized datacenter.
  • Discuss the various security challenges facing virtual environments and data centers.
  • Understand how Check Point vSEC protects virtual environments and data centers.
  • Understand how AWS services can be used to build a virtual environment secured by Check Point vSEC.
  • Understand how to plan and deploy a virtual network in AWS.
  • Recognize the two elastic licensing options for AWS.

Plan szkolenia Rozwiń listę

  1. The Check Point vSEC Security Solution
  2. Amazon Web Services
  3. Deployment and Licensing

Lab exercises:

  1. Create navigation shortcuts in the AWS Management Console.
  2. Navigate various landing pages of the AWS Management Console.
  3. Create a VPC using the VPC wizard.
  4. Configure a private subnet for the VPC.
  5. Deploy and configure a Check Point R80 management server.
  6. Launch and configure an NGINX web server instance.
  7. Launch a stack from the Check Point support center.
  8. Configure the cluster details.
  9. Configure a cluster and web server object to represent your AWS network in SmartConsole.
  10. Configure the policy to NAT traffic to the web server.
Pobierz konspekt szkolenia w formacie PDF

Dodatkowe informacje

Wymagania wstępne

Persons attending this course should have a:

  • CCSA
  • Basic knowledge of networking
  • 6 months to 1 year of experience with Check Point products recommended
Poziom trudności
Czas trwania 1 dzień

The participants will obtain certificates signed by Check Point Software Technologies Ltd. (course completion).


Authorized Check Point Software Technologies Ltd. Trainer.

Szkolenia powiązane tematycznie

Bezpieczeństwo Sieci

Bezpieczeństwo IT

Cloud Computing