Module 1: Overview of Firewall Technologies
Module 2: Introduction to Checkpoint Technology
Introduction to Checkpoint Technology01:28:00
Module 3: Checkpoint Security Solutions and Licensing
Checkpoint Security Solutions and Licensing28:00
Module 4: Checkpoint Firewall Deployment
Checkpoint Firewall Deployment43:00
Module 5: Gaia OS Installation and Configuration
Gaia OS Installation and Configuration01:20:00
Module 6: Secure Internal communication (SIC)
Secure Internal communication (SIC)49:00
Module 7: Anti spoofing
Anti spoofing01:04:00
Module 8: Security Policy Management
Security Policy Management (PART 1)42:00
Security Policy Management (PART 2)31:00
Security Policy Management (PART 3)57:00
Module 9: Logging and Monitoring
Logging and Monitoring50:00
Module 10: HTTP Inspection
HTTP Inspection (PART 1)48:00
HTTP Inspection (PART 2)33:00
Module 11: Application Control and URL Filtering
Application Control and URL Filtering47:00
Module 12: Zone Based Security Rule
Zone Based Security Rule19:00
Module 13: Inline Layer Policy
Inline Layer Policy22:00
Module 14: Suspicious Activity Rules
Suspicious Activity Rule22:00
Module 15: Network Address Translation – NAT
Network Address Translation (PART 1)01:10:00
Network Address Translation (PART 2)01:33:00
Network Address Translation (PART 3)01:20:00
Module 16: Managing User Access
Managing User Access (PART 1)54:00
Managing User Access (PART 2)52:00
Module 17: Threat Prevention Solution
Threat Prevention Solution18:00
Module 18: Intrusion Prevention System (IPS)
Intrusion Prevention System (IPS)46:00
Module 19: Anti Virus and Anti Bot
Anti Virus and Anti Bot09:00
Module 20: Sand Blast
Sand Blast11:00
Module 21: Adding a Second Security Gateway
Adding a Second Security Gateway56:00
Module 22: Virtual Private Network
Virtual Private Network (PART 1)01:02:00
Virtual Private Network (PART 2)40:00
Module 23: IPsec site to Site VPN Configuration
IPsec site to Site VPN Configuration48:00
Module 24: IPsec S2S VPN between Checkpoint and Cisco
: IPsec S2S VPN between Checkpoint and Cisco25:00
Module 25: Troubleshooting IPsec VPN
Troubleshooting IPsec VPN33:00
Module 26: Remote Access VPN
Remote Access VPN01:17:00
Module 27: Backup and Snapshot
Backup and Snapshot45:00
Module 28: CLI and Troubleshooting
CLI and Troubleshooting01:09:00
Module 29: Packet Flow
Packet Flow30:54
Overview of Firewall Technologies