Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Check Point Jump Start: SMB Network Security

Checkpoint via Coursera

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
This course introduces you to Check Point's Small and Medium Business (SMB) network security appliances. You will learn how to deploy, configure, manage, and monitor network security policy on the SMB appliance platform. When you complete this course, you will understand the features and functionality of the current Small / Medium Business (SMB) product, as well as the procedures for installing, upgrading, and maintaining the SMB appliance. In addition, this course will teach you how to configure and view network traffic and threat prevention log data, as well as how to monitor your SMB deployment. Other important concepts are covered, such as configuring clustering for high availability, enabling SSL inspection, and the process for enabling Virtual Private Networks for remote users and remote sites. Upon completion of this course, you will be prepared to deploy, configure, and administrate a Check Point Small/Medium Business Network Security appliance.

Syllabus

  • Introduction to Small / Medium Business Network Security
    • Meet your instructor, Daniel Niazov of Check Point Software Technologies, Ltd
  • What's New with Check Point's Small / Medium Business Network Security Products
    • Introducing the SMB appliance product, the embedded Gaia OS, and optional WiFi hotspot capabilities.
  • Standalone Deployment of the SMB Appliance
    • Understand the procedures for installing, upgrading, and maintaining the embedded Gaia OS
  • Logging and Monitoring
    • In this lesson we introduce the embedded Gaia logging facility
  • Features and Functionality of the SMB Appliance Product
    • This presentation explains the major features and functionality available on the SMB Network Security product, including the User Awareness feature.
  • Clustering and High Availability
    • Check Point's clustering support allows for high availability of network services.
  • SSL Inspection
    • Enabling URL filtering of HTTPS connections, and enabling SSL Interception to decrypt the SSL tunnel and expose the data within to security policy inspection.
  • Management
    • Learn how to move the SMB from local management to central management
  • Threat Emulation
    • In this lesson, the threat emulation feature is explained.  This feature allows unknown, potentially malicious files to be executed in a virtual "sandbox" environment in the cloud, monitoring for malicious activity to detect previously unknown threats.
  • Security Management Portal (SMP)
    • Learn how the cloud-based SMP service enables unified management and monitoring of multiple SMB appliances deployed for multiple customers among multiple sites.
  • Zero Touch and Reach My Device
    • This lecture will demonstrate two very useful SMB deployment management features.
  • Configuring Virtual Private Networks
    • Learn how to configure and manage site to site VPN connections to enable secure connectivity between multiple locations, as well as remote access VPN connections to enable secure access to internal resources and services by users outside the office. In addition, learn how to use digitally signed certificates to securely authenticate site to site and remote access VPN connections.
  • The Watchtower Mobile App
    • The Watchtower mobile app, available for iOS and Android, permits a security administrator to monitor and manage SMB deployments from their mobile devices.
  • Supporting Voice over IP Deployments
    • Voice over IP (VoIP) permits the deployment of scalable voice telecommunications over the Internet.  The SMB appliance may be configured to examine VoIP communication and control traffic to enforce security policy.
  • Detecting and Mitigating Distributed Denial of Service Attacks
    • Distributed Denial of Service (DDoS) attacks are a popular tool among cyber-criminals to force a target web site off of the Internet.  Learn how to mitigate these attacks on the SMB appliance.
  • Cloud Services and SD-WAN
    • Check Point provides multiple cloud-based services for SMB customers, including upgrades, threat prevention, and more. In addition, Software-Defined Wide Area Networking (SD-WAN) allows the SMB administrator to define custom routing based on application and other criteria.
  • The Application Programming Interface Feature
    • The integrated Application Programming Interface (API) support on SMB appliances permits the busy security administrator to automate routine management and monitoring tasks, enabling complex orchestration of business workflows.
  • Troubleshooting
    • Procedures for troubleshooting and debugging issues with embedded Gaia OS are demonstrated.

Taught by

Check Point Software Technologies

Reviews

4.5 rating at Coursera based on 11 ratings

Start your review of Check Point Jump Start: SMB Network Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.