This is a special practical course, composed of the combination of “Administrator” and “Expert” (CCSA+CCSE) trainings in the List of Check Point Trainings. Participants will not only learn security management systems of Check Point, gateway security [...]
The goal of this course is to help you master an ethical hacking methodology that can be used in penetration testing to lawfully assess the security of a system. EC Council security experts have designed over 140 labs, which mimic real-time scenarios[...]
Advance your knowledge on the GAiA operating system! This course covers everything you need to start-up, configure and manage daily operations of Check Point Security Gateway and Management Software Blades systems on the GAiA operating system.
Check Point Security Engineering is an advanced course that teaches how to effectively build, modify, deploy and troubleshoot Check Point Security systems on the Gaia OS. We will study firewall processes and take a close look at user and kernel proce[...]
This course is intended for customers and partners who want to learn the advanced skills to troubleshoot and configure Check Point Security Gateway and Management Software Blades.
If you are ready to take your security career to the next level, our Certified Information Systems Security Professional (CISSP) exam preparation course will help get you there. Get instruction from our experts with real-world experience as you cover[...]
In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, yo[...]
If you're concerned about the integrity of your network's infrastructure, this course will teach you the ethical hacking tools and techniques needed to enhance your network's defenses. You'll begin by learning how perimeter defenses w[...]
Log Management and Analysis training is aimed at demonstrating the benefits of logging in terms of security to participants and ensuring product independence in order to reveal the true importance and value of logging in corporate business environmen[...]