وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Check Point Certified Security Administrator (CCSA) R81

سرفصل های دوره

1.Network and Security Refresher
  • 1.Introduction
  • 2.Topology and Traffic Flow
  • 3.Network Address Translation (NAT)
  • 4.Stateful vs Packet Filtering Firewalls
  • 5.Virtual LANs (VLANs)
  • 6.Virtual Private Network (VPN)
  • 7.Intrusion Prevention System (IPS)
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • Question 12-question.txt

  • 2.Getting To Know Check Point
  • 1.CCSA Exam Objectives and CheckMates
  • 2.Check Point Security Product Lineup
  • 3.Security Gateway Software Blades
  • 4.Check Point Deployment Methods
  • 5.Physical Check Point Security Gateway Features
  • 6.Check Point Licensing
  • 7.Validation
  • 8.Hands-On Lab or Other Video
  • 9.Hands-On Lab or Other Video
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • Question 12-question.txt
  • saved url-.txt
  • saved url-Check Point Security Gateway Models.txt
  • saved url-Check Point Security Product Lineup.txt

  • 3.Check Point Lab Setup
  • 1.Introduction
  • 2.Lab Topology and EVE-NG Overview
  • 3.Installing the Gaia OS
  • 4.Deploying A Windows OS In EVE-NG
  • 5.Deploying a TinyCore Linux Web Server
  • 6.Register For A Check Point Evaluation License
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • saved url-Check Point Gaia Image Download.txt
  • saved url-Check Point Support Portal.txt
  • saved url-Link to download Tiny Core Linux .txt

  • 4.Deploying SMS and SGs
  • 1.Introduction
  • 2.Deploying Our Security Gateways
  • 3.Touring the Security Gateway Interface
  • 4.Configuring A Default Route On Our SGs
  • 5.Deploying A Security Management Server (SMS)
  • 6.Validation
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • saved url-CLI R81 Reference Guide.txt

  • 5.Configuring Our SMS and SGs
  • 1.Introduction
  • 2.Installing the SmartConsole
  • 3.Touring the SmartConsole
  • 4.Adding HQ-SG-1 To Our HQ-SMS
  • 5.Configuring Hide NAT and Security Policies
  • 6.Adding Site A-SG To Our HQ-SMS
  • 7.Troubleshooting HQ-SMS To Site A-SG Communications
  • 8.Validation
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • Question 12-question.txt

  • 6.Licensing and Policies
  • 1.Introduction
  • 2.Requesting Evaluation Licenses
  • 3.Centralized Licensing Using SmartUpdate
  • 4.Using Local Licensing
  • 5.Access Control Policies
  • 6.Threat Prevention Policies
  • 7.Autonomous Policies
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • Question 12-question.txt
  • saved url-Check Point User Center.txt

  • 7.Intro To Access Control Policies
  • 1.Introduction
  • 2.Access Control Policies
  • 3.Enabling ICMP On Security Gateways
  • 4.Configuring Zone-Based ACPs
  • 5.Configuring Time-Based ACPs
  • 6.Inspection Profiles
  • 7.Configuring Outbound HTTPS Inspection
  • 8.Configuring Inbound HTTPS Inspection
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • Question 12-question.txt
  • Question 13-question.txt

  • 8.Managing Access Control Policies
  • 1.Introduction
  • 2.Using ACP Sections
  • 3.Using Policy Packages
  • 4.Policy Layers
  • 5.Inline Layers
  • 6.Lab Update
  • 7.Validation
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • policy rules.zip

  • 9.Advanced Access Control Policies
  • 1.Application Control Policies
  • 2.URL Filtering Policies
  • 3.Content Awareness Policies
  • 4.Configuring Identity Awareness
  • 5.Identity Awareness Policies
  • 6.Validation
  • 7.Hands-On Lab or Other Video
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt

  • 10.Threat Prevention Policies and IPS
  • 1.
  • 2.Introduction
  • 3.Threat Prevention Blades
  • 4.Threat Prevention Policy Rules
  • 5.Intrusion Prevention System (IPS) Policies
  • 6.Indicators of Compromise (IOC)
  • 7.IPS Protections
  • 8.Updating Your IPS
  • 9.Testing Your IPS
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • Question 12-question.txt
  • Question 13-question.txt
  • saved url-Check Point Threat Prevention Policies.txt

  • 11.Advanced Threat Prevention
  • 1.Introduction
  • 2.Configuring Anti-Bot & Anti-Virus
  • 3.Testing Anti-Bot & Anti-Virus
  • 4.Configuring Threat Emulation & Threat Extraction
  • 5.Zero Phishing Blade
  • 6.Configuring Zero Phishing
  • 7.Validation
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • saved url-Check Point Anti-Bot Testing Page.txt
  • saved url-Check Point CheckMe Testing Website.txt
  • saved url-EICARs Website.txt
  • saved url-Zero Phishing Bypass Updatable Obejct.txt

  • 12.Access Control & Threat Prevention Adv. Settings
  • 1.Introduction
  • 2.Advanced Inspection Settings
  • 3.App Control & URL Filtering Advanced Settings
  • 4.Content Awareness Advanced Settings
  • 5.Threat Prevention Advanced Settings
  • 6.Stealth Rules
  • 7.Anti-Spoofing
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • Question 12-question.txt

  • 13.Autonomous Policies and Email Security
  • 1.Introduction
  • 2.What Are Autonomous Policies
  • 3.Enabling Autonomous Threat Prevention
  • 4.Managing Autonomous Threat Prevention From the CLI
  • 5.Mail Filtering and MTA Gateways
  • 6.Anti-SPAM & Email Security
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • saved url-Manage ATP From the CLI.txt

  • 14.Managing IPSec VPNs
  • 1.Introduction
  • 2.IPSec Virtual Private Networks (VPNs)
  • 3.How VPNs Work
  • 4.IPSec VPN Terms
  • 5.Configuring An IPSec Site-To-Site VPN
  • 6.Managing IPSec VPNs From the CLI
  • 7.Validation
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt

  • 15.Mobile Access VPNs
  • 1.Introduction
  • 2.Types Of Mobile Remote Access VPNs
  • 3.Preparing Our Lab Environment For Mobile Access VPNs
  • 4.Installing the Mobile Access Blade
  • 5.VPN Community & Settings
  • 6.Testing Our SSL VPN Portal
  • 7.Access Control Policies For Remote Access
  • 8.Installing and Testing Our Mobile Access VPN
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • Question 12-question.txt
  • Question 13-question.txt
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 44811
    حجم: 1898 مگابایت
    مدت زمان: 762 دقیقه
    تاریخ انتشار: ۱۳ دی ۱۴۰۴
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید