This course provides hands-on training with Check Point’s security gateway to configure multi-layered protection for web based applications. Students will learn how to configure the Check Point gateways to block access to malicious malware, phishing, and dangerous applications.
Students should have a basic understanding of networking concepts, Microsoft Windows, Linux, and how Internet-based web applications work.
Through classroom exercises and hands-on labs, students will learn:
Configuration of a corporate web application profile.
How to setup application control to filter web based threats at the security gateway.
About user-based exceptions and other advanced policy configurations.
How to setup and test HTTPS inspection.
How to use Check Point’s data analysis tools (SmartLog, SmartEvent, and SmartReporter) to generate high-level reports and drill-down to interesting events.