0% found this document useful (0 votes)
48 views

Checkpoint Firewall: Exchange

The document discusses a Checkpoint Firewall course offered by Zoom Technologies. The course aims to teach network administrators and users how to handle challenges related to threats like viruses, trojans, spyware and spam. It covers topics like Checkpoint installation, configuration, rule bases, anti-spoofing, NAT, filtering, content analysis including URL filtering and antivirus inspection, user authentication, and IPSEC VPN. Attendees will learn how to protect valuable data and information with Checkpoint's firewall capabilities.

Uploaded by

Rama Krishna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views

Checkpoint Firewall: Exchange

The document discusses a Checkpoint Firewall course offered by Zoom Technologies. The course aims to teach network administrators and users how to handle challenges related to threats like viruses, trojans, spyware and spam. It covers topics like Checkpoint installation, configuration, rule bases, anti-spoofing, NAT, filtering, content analysis including URL filtering and antivirus inspection, user authentication, and IPSEC VPN. Attendees will learn how to protect valuable data and information with Checkpoint's firewall capabilities.

Uploaded by

Rama Krishna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Checkpoint Firewall

Today with the evolution of Internet and Information Technologies the serious concern is
to protect the valuable content (Data) present and developed in our Personal Computers
and Corporate Networks from various threats like Viruses, Trojans, Spyware, Spam etc.
As a Network Administrator or even as a user the need for management of these threats
has become a major challenge in the Industry.
The Firewall Course offered by Zoom Technologies will enable you to handle these
challenges with ease and protect your valuable data content and information.

Course Outline

checkpoint
firewall

Introduction to Checkpoint
Discussion on the modular nature of checkpoint firewall
Functionalities of Management module, fw-1 & GUI modules
Types of checkpoint installation
Hardware platform
Checkpoint Rule base
IP spoofing
Installation of Checkpoint on SPLAT
Initial Configuration of Splat
Web access to checkpoint
Installation of smart console
Accessing checkpoint through smart dashboard
Checkpoint objects description
Anti-spoofing configuration
Nat Configuration
Filter Configuration
Content Analysis
URL Filtering
Antivirus inspection
User Authentication
User Authentication
Session Authentication
Client Authentication
IPSEC VPN
Backup & Restore of config

www.zoomgroup.com
21408793_Zoom_Tech_Brochure.indd 29

11/1/2014 1:33:23 PM

You might also like