Checkpoint Firewall

Duration: 22 Days (Normal Track) | 5 Weeks (Weekend Track)

When a host transmits data across a network to another device, data is encapsulated with several headers and trailer.

Courses Detail


Check Point software is designed to work across multiple platforms. Each installation differs depending on the product and the platform.
Stateful Inspection Technology – Standalone Deployment – Distributed Deployment – GAIA – Security Gateway – Security Management Server – Secure Internal Communication

Rule Base

The firewall rule base should be as simple as possible. The fewer rules you have the more efficient and less error prone the rule base will be.
Smart Dashboard – Node Object – Network Object – Service Object – Accept – Drop – Implied Rule- Stealth Rule

Network Address Translation

Network address translation (NAT) allows a router to modify packets to allow for multiple devices to share a single public IP address.
Overview – Static NAT – Hide Mode NAT – Manual NAT – Automatic NAT


Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be.
Overview – User Authentication – Session Authentication – Client Authentication

Virtual Private Network

A Virtual Private Network is a mechanism for providing secure communication over the Internet.
Overview – Cryptography – VPN Phases – ISAKMP – IPSec – Encapsulating Security Payload – Authentication Header – Site to Site VPN – Site to Client VPN


A cluster is two or more interconnected computers that create a solution to provide higher availability, higher scalability or both.
Security Cluster – Cluster Member – Cluster Synchronization – High Availability – Load Sharing

Backup and Restore

Protecting database against data loss and reconstructing the database after any kind of data loss.

Content Security

Content security extends data inspection to the highest level, protecting users from viruses while providing granular access control to the Internet.
Overview – Content Security for Web – Content Security for FTP – Content Security for SMTP


It is the process of moving from the use of one operating environment to another operating environment.
Overview – Migration from R75 to R77

Additional Server

Management High Availability – Primary Security Management Server – Secondary Security Management Server – Log Server


No: 32B, Vasudevapuram street, West Mambalam, Chennai - 600033.

2016 All rights reserved. Developed by Ajna Infotech    Web Design Company Chennai