課程簡介
		
	     隨著網絡科技不斷進步及和互聯網的普及,以現時的電腦網絡系統來看,不論是硬件設備抑或是軟件的支援,穩定程度已達至很高水平。但如果缺乏了一個良好的保安系統保護,一旦被電腦入侵者 
	     (俗稱“黑客”) 
	     入侵或破壞,整個企業的系統就會陷於停頓,對公司和客戶有無可估計的損失。因此,網絡保安對任何一個企業是都相當重要,要是在網絡系統上加設一個絕佳的安全保護,就必須安裝 
	     Firewall。
	     
	     對電腦網絡保安有所認識的人,都應該聽過 Check Point 這個名字。它們自從在 1993 年開發了 Check Point 
	     FireWall-1 防火牆軟件及 Stateful Inspection Engine 技術後,在全球的網絡保安軟件市場中一直都穩佔領先位置。
	     
	     Check Point 已經是全球防火牆軟件市場的龍頭,其推出的產品 VPN-1/FireWall-1 (防火牆軟件),市場佔有率已超過 
	     60%,是目前市面所能找到最綜合性的網絡安全產品。同時由 Check Point 制定的考試及頒發的 CCSA 及 CCSE 
	     國際認可證書,亦因為該產品擁有很高的市場佔有率,吸引了不少專業人士考取及被業界廣泛認可。 
		
		
			題庫只有 180 條題目,容易溫習及通過考試!
![]()
	     
	     
		
		
                                                 
		Check Point Firewall Corporate Network
		
		
                                                           
		Check Point Firewall VPN Network
		
		
		
		
                                                         
		Check Point SmartDashboard Policy
		
		
                                                         
		Check Point SmartDashboard Overview
		
		
	 
適合人仕: 
有志投身 
		I.T 網絡保安範疇的人仕
系統工程師,網絡管理員,網絡保安人員
已考取 
		CCNA / MCSA / MCSE 證書的同學
	 
修讀條件:
對 
		Windows Server 系統有基本操作經驗
對互聯網及 
		TCP/IP 有一定程度的認識
對網絡保安具有濃厚興趣
			
課程包括:
導師精心編製 Check Point CCSA R81 課程筆記
Check Point 
			CCSA R81 Student and Lab Manual
Check Point 
			CCSA R81 電子書 
Check 
				Point Firewall R81 Gaia 試用版光碟
課程資源下載鏈結 (包括 PDF 筆記、電子書、模擬試題、應用軟件等),隨時掌握最新學習內容
全新 
				4 月份更新的模擬試題連參考答案 (模擬試題 "一年" 免費更新保證,考試更有彈性)
由擁有 
					CCSA / CCSE / CISSP 及多年豐富網絡工作經驗之導師任教
					
				
 
				   
				
				
				
				 
 
				
				 
				
				
				
				
				                                         Visual 
				Cert Exam (VCE) 模擬考試軟件,增強考試能力!
 
			
課程電腦設備:
     
			
			
授課語言:
			
課程全長:
4 堂 x 3 小時 ( Instructor-Led 導師主導課堂 : 理論 + 實戰 ) 及 3 小時 ( 自修研習時段 ) , 合共 15 小時          
			
			 
			
![]()  | 
      
         
  | 
    
![]()
( 登記成為 基本會員 或 金會員 或 365 特級會員 即可 免費報讀 本課程 (自選日程) , 詳情按此 )
HK$ 3,480 ( 正價 )
            HK$ 2,980 ( 優惠價 )
請即致電 2380 9888 ( 來電請設有 來電顯示) / WhatsApp 確認優惠 . * 每學員優惠使用次數不限  . 優惠不可重疊使用 . 優惠詳情請參閱課程內頁相關說明 .  | 
  
試題數量: 100 題
考試時間: 120 分鐘
合格分數: 70 %
模擬試題參考
			   
			
			題庫只有 180 條題目,容易溫習及通過考試!
			 
			
成功通過考試後獲得的國際認可證書及資格:
Chapter 
				1 - Introduction to Check Point Technology• Describe Check Point’s unified approach to network management 
			and elements of this architecture
			• Design a distributed environment using the network detailed in the 
			course topology
			• Install the Security Gateway R81 in a distributed environment
Chapter 
				2 - Deployment Platforms• Given network specifications, perform a backup and restore the 
			current Gateway installation
			• Identify critical files needed to purge or backup, import and 
			export users and groups
			• Deploy Gateways using sysconfig and cpconfig from the Gateway 
			command line
Chapter 
					3 - Introduction to the Security Policy• Given the network topology, create and configure network, host and gateway objects
• Verify SIC establishment between the Security Server and the Gateway using SmartDashboard
• Create a basic Rule Base in SmartDashboard
• Configure NAT rules on Web and Gateway servers
• Evaluate existing policies and optimize the rules based on current corporate requirements
• Maintain the Security Management Server with scheduled backups and policy versions
Chapter 
					4 - Monitoring Traffic and Connections• Use Queries in SmartView Tracker to monitor IPS and common network traffic
• Using packet data on a given corporate network, generate reports, troubleshoot system
• Using SmartView Monitor to configure alerts and traffic counters, view a Gateway’s status
• Using SmartView Monitor to monitor suspicious activity rules, analyze tunnel activity
Chapter 
					5 - Using SmartUpdate• Monitor remote Gateways using SmartUpdate to evaluate the need for upgrades
• Use SmartUpdate to apply upgrade packages to single or multiple VPN-1 Gateways
• Upgrade and attach product licenses using SmartUpdate
Chapter 
					6 - User Management and Authentication• Centrally manage users to ensure only authenticated users securely access the corporate network
• Manage users to access the corporate LAN by using external databases
Chapter 
					7 - Identity Awareness• Acquire user information used by the Security Gateway to control access
• Define Access Roles for use in an Identity Awareness rule
• Implement Identity Awareness in the Firewall Rule Base
Chapter 
			8 - Introduction to Check Point VPNs• Configure a pre-shared secret site-to-site VPN with partner sites
• Configure permanent tunnels for remote access to corporate resources
• Configure VPN tunnel sharing between host-based, subunit-based and gateway-based tunnels














   
		