The course teaches infrastructure security concepts, including the techniques on how to attack and how to respond with an appropriate countermeasure implementation. Our course has been developed around professional penetration testing and security aw[...]
This is a special practical course, composed of the combination of “Administrator” and “Expert” (CCSA+CCSE) trainings in the List of Check Point Trainings. Participants will not only learn security management systems of Check Point, gateway security [...]
As powerful as cloud computing is for the organization, understanding its information security risks and mitigation strategies is critical. Legacy approaches are inadequate, and organizations need competent, experienced professionals equipped with th[...]
The goal of this course is to help you master an ethical hacking methodology that can be used in penetration testing to lawfully assess the security of a system. EC Council security experts have designed over 140 labs, which mimic real-time scenarios[...]
Advance your knowledge on the GAiA operating system! This course covers everything you need to start-up, configure and manage daily operations of Check Point Security Gateway and Management Software Blades systems on the GAiA operating system.
Check Point Security Engineering is an advanced course that teaches how to effectively build, modify, deploy and troubleshoot Check Point Security systems on the Gaia OS. We will study firewall processes and take a close look at user and kernel proce[...]
This course is intended for customers and partners who want to learn the advanced skills to troubleshoot and configure Check Point Security Gateway and Management Software Blades.
If you are ready to take your security career to the next level, our Certified Information Systems Security Professional (CISSP) exam preparation course will help get you there. Get instruction from our experts with real-world experience as you cover[...]
In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, yo[...]
If you're concerned about the integrity of your network's infrastructure, this course will teach you the ethical hacking tools and techniques needed to enhance your network's defenses. You'll begin by learning how perimeter defenses w[...]